race_const_cmp4+0x16/0x20 [ 731.261093] should_fail.cold+0xa/0x15 [ 731.265001] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.270089] ? ___might_sleep+0x1e7/0x310 [ 731.274238] ? arch_local_save_flags+0x50/0x50 [ 731.278807] __should_failslab+0x121/0x190 [ 731.283038] should_failslab+0x9/0x14 [ 731.286854] __kmalloc+0x2dc/0x740 [ 731.290423] ? kmem_cache_alloc_trace+0x354/0x760 [ 731.295247] ? __lock_is_held+0xb6/0x140 [ 731.299301] ? alloc_pipe_info+0x286/0x580 [ 731.303518] alloc_pipe_info+0x286/0x580 [ 731.307583] ? pipe_read+0x940/0x940 [ 731.311287] ? __might_sleep+0x95/0x190 [ 731.315273] splice_direct_to_actor+0x795/0x9d0 [ 731.319939] ? avc_policy_seqno+0xd/0x70 [ 731.323999] ? generic_pipe_buf_nosteal+0x10/0x10 [ 731.328870] ? selinux_file_permission+0x92/0x550 [ 731.333715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.339244] ? do_splice_to+0x190/0x190 [ 731.343221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.348748] ? rw_verify_area+0x118/0x360 [ 731.352889] do_splice_direct+0x2c7/0x420 [ 731.357022] ? splice_direct_to_actor+0x9d0/0x9d0 [ 731.361880] ? rcu_read_lock_sched_held+0x110/0x130 [ 731.366926] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 731.371737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.377262] ? __sb_start_write+0x1ac/0x360 [ 731.381593] do_sendfile+0x61a/0xe60 [ 731.385301] ? do_compat_pwritev64+0x1c0/0x1c0 [ 731.389866] ? fput+0x128/0x1a0 [ 731.393135] ? do_syscall_64+0x8c/0x800 [ 731.397108] ? do_syscall_64+0x8c/0x800 [ 731.401079] __x64_sys_sendfile64+0x1f8/0x240 [ 731.405570] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 731.410172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 731.414953] do_syscall_64+0x1a3/0x800 [ 731.418831] ? syscall_return_slowpath+0x5f0/0x5f0 [ 731.423753] ? prepare_exit_to_usermode+0x232/0x3b0 [ 731.428772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 731.433609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 731.438794] RIP: 0033:0x457ec9 [ 731.441986] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 731.460980] RSP: 002b:00007efdca55ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 08:55:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xc4f87dc77b000000]}}, 0x1c) 08:55:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4907000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:15 executing program 4 (fault-call:4 fault-nth:2): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) [ 731.468668] RAX: ffffffffffffffda RBX: 00007efdca55ec90 RCX: 0000000000457ec9 [ 731.475915] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 731.483200] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 731.490459] R10: 0000000000000001 R11: 0000000000000246 R12: 00007efdca55f6d4 [ 731.497712] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000005 08:55:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, 0x0) 08:55:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xe0ffffff, 0x0) 08:55:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000110000000000000000000000", 0x28}], 0x1) 08:55:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xdc7f000000000000]}}, 0x1c) [ 731.658768] FAULT_INJECTION: forcing a failure. [ 731.658768] name failslab, interval 1, probability 0, space 0, times 0 [ 731.722460] CPU: 0 PID: 5551 Comm: syz-executor4 Not tainted 4.20.0+ #13 [ 731.729346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.738710] Call Trace: [ 731.741307] dump_stack+0x1db/0x2d0 [ 731.744942] ? dump_stack_print_info.cold+0x20/0x20 [ 731.749975] ? print_usage_bug+0xd0/0xd0 [ 731.754050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.759682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.765262] should_fail.cold+0xa/0x15 [ 731.769164] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.774289] ? ___might_sleep+0x1e7/0x310 [ 731.778457] ? arch_local_save_flags+0x50/0x50 [ 731.783055] __should_failslab+0x121/0x190 [ 731.787304] should_failslab+0x9/0x14 [ 731.791122] kmem_cache_alloc_node_trace+0x270/0x720 [ 731.796699] ? lock_downgrade+0x910/0x910 [ 731.800861] ? kasan_check_read+0x11/0x20 [ 731.805019] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 731.810349] __kmalloc_node+0x3d/0x70 [ 731.814185] kvmalloc_node+0x68/0x100 [ 731.818011] iov_iter_get_pages_alloc+0x87f/0x15a0 [ 731.822958] ? kernel_text_address+0x73/0xf0 [ 731.827372] ? __kernel_text_address+0xd/0x40 [ 731.831887] ? iov_iter_revert+0xaa0/0xaa0 [ 731.836236] ? save_stack+0xa9/0xd0 [ 731.839916] ? save_stack+0x45/0xd0 [ 731.843558] ? kasan_kmalloc+0xcf/0xe0 [ 731.847451] ? __kmalloc+0x15c/0x740 [ 731.851213] ? alloc_pipe_info+0x286/0x580 [ 731.855453] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 731.860477] ? iov_iter_pipe+0xba/0x2f0 [ 731.865383] default_file_splice_read+0x1b1/0xac0 08:55:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 731.870236] ? add_lock_to_list.isra.0+0x450/0x450 [ 731.875192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.880783] ? iter_file_splice_write+0xfc0/0xfc0 [ 731.885659] ? __lock_is_held+0xb6/0x140 [ 731.889736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.895293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.900886] ? fsnotify+0x4f5/0xed0 [ 731.904524] ? arch_local_save_flags+0x50/0x50 [ 731.909138] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.914687] ? __fsnotify_parent+0xe2/0x450 [ 731.919019] ? fsnotify_first_mark+0x350/0x350 [ 731.923605] ? init_wait_entry+0x1c0/0x1c0 [ 731.927885] ? avc_policy_seqno+0xd/0x70 [ 731.931943] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 731.936987] ? selinux_file_permission+0x92/0x550 [ 731.941864] ? security_file_permission+0x94/0x320 [ 731.946812] ? rw_verify_area+0x118/0x360 [ 731.950985] ? iter_file_splice_write+0xfc0/0xfc0 [ 731.955853] do_splice_to+0x12a/0x190 [ 731.959701] splice_direct_to_actor+0x31b/0x9d0 [ 731.964378] ? generic_pipe_buf_nosteal+0x10/0x10 [ 731.969224] ? do_splice_to+0x190/0x190 [ 731.973222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.978766] ? rw_verify_area+0x118/0x360 [ 731.982933] do_splice_direct+0x2c7/0x420 [ 731.987099] ? splice_direct_to_actor+0x9d0/0x9d0 [ 731.991979] ? rcu_read_lock_sched_held+0x110/0x130 [ 731.997001] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 732.001754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.007351] ? __sb_start_write+0x1ac/0x360 [ 732.011674] do_sendfile+0x61a/0xe60 [ 732.015421] ? do_compat_pwritev64+0x1c0/0x1c0 [ 732.020017] ? fput+0x128/0x1a0 [ 732.023297] ? do_syscall_64+0x8c/0x800 [ 732.027281] ? do_syscall_64+0x8c/0x800 [ 732.031282] __x64_sys_sendfile64+0x1f8/0x240 [ 732.035787] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 732.040409] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 732.045210] do_syscall_64+0x1a3/0x800 [ 732.049116] ? syscall_return_slowpath+0x5f0/0x5f0 [ 732.054046] ? prepare_exit_to_usermode+0x232/0x3b0 [ 732.059077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 732.063955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.069154] RIP: 0033:0x457ec9 [ 732.072347] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.091357] RSP: 002b:00007efdca55ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 732.099063] RAX: ffffffffffffffda RBX: 00007efdca55ec90 RCX: 0000000000457ec9 [ 732.106343] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 732.113652] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 732.120917] R10: 0000000000000001 R11: 0000000000000246 R12: 00007efdca55f6d4 [ 732.128196] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000005 08:55:15 executing program 4 (fault-call:4 fault-nth:3): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000300000000000000000000000", 0x28}], 0x1) 08:55:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xe0a9131300000000]}}, 0x1c) 08:55:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6558000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, 0x0) 08:55:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff, 0x0) [ 732.336035] FAULT_INJECTION: forcing a failure. [ 732.336035] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 732.388839] CPU: 1 PID: 5574 Comm: syz-executor4 Not tainted 4.20.0+ #13 [ 732.395692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.405080] Call Trace: [ 732.407676] dump_stack+0x1db/0x2d0 [ 732.411315] ? dump_stack_print_info.cold+0x20/0x20 [ 732.416342] ? is_bpf_text_address+0xd3/0x170 [ 732.420848] should_fail.cold+0xa/0x15 [ 732.424747] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 732.429874] ? arch_local_save_flags+0x50/0x50 [ 732.434461] ? lock_release+0xc40/0xc40 [ 732.438451] should_fail_alloc_page+0x50/0x60 [ 732.442987] __alloc_pages_nodemask+0x323/0xdc0 [ 732.447682] ? add_lock_to_list.isra.0+0x450/0x450 [ 732.452629] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 732.457686] ? __kmalloc_node+0x3d/0x70 [ 732.461672] ? rcu_read_lock_sched_held+0x110/0x130 [ 732.466696] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 732.472259] alloc_pages_current+0x107/0x210 [ 732.476726] push_pipe+0x3fc/0x7a0 [ 732.480295] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 732.485247] ? kernel_text_address+0x73/0xf0 [ 732.489694] ? __kernel_text_address+0xd/0x40 [ 732.494209] ? iov_iter_revert+0xaa0/0xaa0 [ 732.498468] ? save_stack+0xa9/0xd0 [ 732.502111] ? save_stack+0x45/0xd0 [ 732.505792] ? kasan_kmalloc+0xcf/0xe0 [ 732.509715] ? __kmalloc+0x15c/0x740 [ 732.513556] ? alloc_pipe_info+0x286/0x580 [ 732.517815] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 732.522842] ? iov_iter_pipe+0xba/0x2f0 [ 732.526851] default_file_splice_read+0x1b1/0xac0 [ 732.531696] ? add_lock_to_list.isra.0+0x450/0x450 [ 732.536640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.542204] ? iter_file_splice_write+0xfc0/0xfc0 [ 732.547056] ? __lock_is_held+0xb6/0x140 [ 732.551143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.556702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.562247] ? fsnotify+0x4f5/0xed0 [ 732.565899] ? arch_local_save_flags+0x50/0x50 [ 732.570502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.576063] ? __fsnotify_parent+0xe2/0x450 [ 732.580409] ? fsnotify_first_mark+0x350/0x350 [ 732.585029] ? init_wait_entry+0x1c0/0x1c0 [ 732.589302] ? avc_policy_seqno+0xd/0x70 [ 732.593383] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 732.598409] ? selinux_file_permission+0x92/0x550 [ 732.603263] ? security_file_permission+0x94/0x320 [ 732.608204] ? rw_verify_area+0x118/0x360 [ 732.612356] ? iter_file_splice_write+0xfc0/0xfc0 [ 732.617201] do_splice_to+0x12a/0x190 [ 732.621053] splice_direct_to_actor+0x31b/0x9d0 [ 732.625727] ? generic_pipe_buf_nosteal+0x10/0x10 [ 732.630595] ? do_splice_to+0x190/0x190 [ 732.634577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.640140] ? rw_verify_area+0x118/0x360 [ 732.644327] do_splice_direct+0x2c7/0x420 [ 732.648501] ? splice_direct_to_actor+0x9d0/0x9d0 [ 732.653421] ? rcu_read_lock_sched_held+0x110/0x130 [ 732.658483] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 732.663265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.668818] ? __sb_start_write+0x1ac/0x360 [ 732.673181] do_sendfile+0x61a/0xe60 [ 732.676950] ? do_compat_pwritev64+0x1c0/0x1c0 [ 732.681541] ? fput+0x128/0x1a0 [ 732.684828] ? do_syscall_64+0x8c/0x800 08:55:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000003f0000000000000000000000", 0x28}], 0x1) 08:55:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c) 08:55:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000400000000000000000000000", 0x28}], 0x1) 08:55:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c) 08:55:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000600000000000000000000000", 0x28}], 0x1) 08:55:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c) [ 732.688816] ? do_syscall_64+0x8c/0x800 [ 732.692836] __x64_sys_sendfile64+0x1f8/0x240 [ 732.697354] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 732.701960] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 732.706736] do_syscall_64+0x1a3/0x800 [ 732.710685] ? syscall_return_slowpath+0x5f0/0x5f0 [ 732.715618] ? prepare_exit_to_usermode+0x232/0x3b0 [ 732.715637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 732.715662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 732.715674] RIP: 0033:0x457ec9 [ 732.715688] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 732.715696] RSP: 002b:00007efdca55ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 732.715709] RAX: ffffffffffffffda RBX: 00007efdca55ec90 RCX: 0000000000457ec9 [ 732.715721] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 732.725549] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 732.725569] R10: 0000000000000001 R11: 0000000000000246 R12: 00007efdca55f6d4 08:55:16 executing program 4 (fault-call:4 fault-nth:4): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000780000000000000000000000", 0x28}], 0x1) 08:55:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c) 08:55:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6800000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 732.725577] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000005 08:55:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, 0x0) 08:55:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff, 0x0) 08:55:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000007e0000000000000000000000", 0x28}], 0x1) 08:55:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c) 08:55:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:16 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:16 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x2) 08:55:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7400000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c) 08:55:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000007f0000000000000000000000", 0x28}], 0x1) 08:55:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, 0x0) 08:55:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:16 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x3) 08:55:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, 0x0) 08:55:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c) 08:55:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000fe800000000000000000000000", 0x28}], 0x1) 08:55:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8100000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c) 08:55:17 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x5) 08:55:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000fec00000000000000000000000", 0x28}], 0x1) [ 733.453760] validate_nla: 14 callbacks suppressed [ 733.453765] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 733.473257] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, 0x0) 08:55:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff, 0x0) 08:55:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xff0f000000000000]}}, 0x1c) 08:55:17 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x8) 08:55:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000005dc0000000000000000000000", 0x28}], 0x1) 08:55:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x9effffff00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 733.786152] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, 0x0) 08:55:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000e00000000000000000000000", 0x28}], 0x1) 08:55:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 733.886579] net_ratelimit: 13 callbacks suppressed [ 733.886589] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:17 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x10) 08:55:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, 0x0) 08:55:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0xffffffff00000000]}}, 0x1c) [ 734.023255] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:17 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x300) 08:55:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 734.086684] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000fc0000000000000000000000", 0x28}], 0x1) 08:55:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, 0x0) 08:55:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 08:55:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, 0x0) [ 734.226306] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000080fe0000000000000000000000", 0x28}], 0x1) 08:55:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:17 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x7ffff000) 08:55:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c) 08:55:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, 0x0) [ 734.379819] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 734.416025] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000c0fe0000000000000000000000", 0x28}], 0x1) 08:55:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfdffffff, 0x0) 08:55:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c) 08:55:18 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0xffff88809f64d001) 08:55:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000ff0000000000000000000000", 0x28}], 0x1) [ 734.582340] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff4, 0x0) 08:55:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c) 08:55:18 executing program 4: clone(0x2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x28) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r2, 0x6bb0}, 0x8) exit(0x0) sendfile(r0, r1, 0x0, 0x0) 08:55:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, 0x0) [ 734.740789] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 734.768798] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000400300000000000000000000", 0x28}], 0x1) 08:55:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x6]}}, 0x1c) 08:55:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff5, 0x0) 08:55:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000400000000000000000000", 0x28}], 0x1) 08:55:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c) 08:55:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, 0x0) 08:55:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000001000000000000000000000", 0x28}], 0x1) 08:55:19 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x101000, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000240)={0xf5, 0x0, [0x5, 0x5, 0x8, 0x1000]}) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x5}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) write$sndseq(r2, &(0x7f0000000100)=[{0x2, 0x8, 0x71c, 0x7ff, @tick=0x10000, {0x3, 0x7}, {0x7, 0xfffffffffffffff8}, @ext={0x6b, &(0x7f0000000040)="f58babb6e5315be99bf6e779cde131c43d68b89340e6ced073dd37b317e635002fd9971a1ff55466ff2e99e3d5cf3b763a4c73eeea486fb3ff5351846173f14f06a92923baca05daf0727326693ddf10c255dba7130a32b351eb966ee0d7157c93ca7a4617c02c0b169947"}}, {0x80000000, 0x2, 0x3c31dd66, 0x2, @time={r3, r4+10000000}, {0x1f, 0x6}, {0xf4, 0x4}, @time=@tick=0x2b98a97a}, {0x100000001, 0x4, 0x8, 0x401, @tick=0x9, {0xfff, 0x5a}, {0x0, 0xff}, @connect={{0x1, 0x7ff}, {0xffffffff, 0x4}}}], 0x90) sendfile(r1, r2, 0x0, 0x1) 08:55:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x1c) 08:55:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, 0x0) 08:55:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, 0x0) 08:55:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000034000000000000000000000", 0x28}], 0x1) 08:55:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000006b6b6b00000000000000000000", 0x28}], 0x1) 08:55:19 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) r2 = socket$nl_crypto(0x10, 0x3, 0x15) close(r2) sendfile(r0, r1, 0x0, 0x1) 08:55:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c) 08:55:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffb, 0x0) 08:55:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, 0x0) 08:55:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000001000000000000000000", 0x28}], 0x1) 08:55:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c) 08:55:19 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000080)={0x1b, {0x3, 0x7, 0xff, 0x8, 0x0, 0x100}}) exit(0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) sendfile(r0, r1, 0x0, 0x1) 08:55:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c) 08:55:19 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') dup2(r0, r0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000002000000000000000000", 0x28}], 0x1) 08:55:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, 0x0) 08:55:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, 0x0) 08:55:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x1c) 08:55:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x54]}}, 0x1c) 08:55:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000003000000000000000000", 0x28}], 0x1) 08:55:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r2, r3, 0x0, 0x1) 08:55:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, 0x0) 08:55:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, 0x0) 08:55:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c) 08:55:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000004000000000000000000", 0x28}], 0x1) 08:55:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, 0x0) 08:55:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c) 08:55:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000005000000000000000000", 0x28}], 0x1) 08:55:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff97, 0x0) 08:55:21 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp\x00') exit(0x0) ioctl$VIDIOC_ENUMAUDOUT(r0, 0xc0345642, &(0x7f0000000100)={0x1ff, "55824194f0a6909352d0629f567d1edd6c1f6b7c3b1cc51447bd2bf03a6f707e", 0x2, 0x1}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x9, 0x4}) sendfile(r2, r3, 0x0, 0x1) 08:55:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x218]}}, 0x1c) 08:55:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000006000000000000000000", 0x28}], 0x1) 08:55:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) 08:55:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffe0, 0x0) 08:55:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000007000000000000000000", 0x28}], 0x1) 08:55:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x240]}}, 0x1c) 08:55:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff4, 0x0) 08:55:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, 0x0) 08:55:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:21 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0xafa) sendfile(r0, r1, 0x0, 0x1) 08:55:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000008000000000000000000", 0x28}], 0x1) 08:55:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x300]}}, 0x1c) 08:55:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 737.747046] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000009000000000000000000", 0x28}], 0x1) 08:55:21 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000080)) write$tun(r0, &(0x7f0000000040)={@void, @val={0x2, 0x87, 0x800, 0xb843, 0x4, 0x100000001}, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @multicast1, @empty, @broadcast}}, 0x26) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='numa_maps\x00') exit(0x0) r3 = msgget$private(0x0, 0x2) msgctl$MSG_INFO(r3, 0xc, &(0x7f00000000c0)=""/186) sendfile(r0, r2, 0x0, 0x1) 08:55:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c) 08:55:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000a000000000000000000", 0x28}], 0x1) 08:55:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff5, 0x0) 08:55:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x7ffffffffffff, 0x0) 08:55:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c) 08:55:21 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000e000000000000000000", 0x28}], 0x1) [ 738.070156] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x600]}}, 0x1c) 08:55:21 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x80, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @dev={0xac, 0x14, 0x14, 0xc}}, 0x8) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') exit(0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x1) 08:55:21 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000010000000000000000000", 0x28}], 0x1) 08:55:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000000000, 0x0) 08:55:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 738.239772] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, 0x0) 08:55:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c) 08:55:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:22 executing program 4: clone(0x1ffffffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000001400)='comm\x00') ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001200)=0x0) write$P9_ROPEN(r1, &(0x7f00000001c0)={0x18, 0x71, 0x1, {{0xc, 0x4, 0x2}, 0x7}}, 0x18) r3 = syz_open_procfs(r2, &(0x7f00000012c0)='net/ip6_mr_cache\x00') exit(0x0) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000001300)=""/233) clone(0x800000, &(0x7f0000000200)="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", &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="687539e7ba5eeedb0a856ffad3cc76021982068c08e21f6d891f994405ce6c1d44678a2b979f25d460938b3affdfd58b76d3781cbbf9fb291b2052e5bb3a3378ff89af0d955ac55fdbc33e971a64181a355bcdbed915d2916692ac4ab994d9090d1066266b1b477043367edec1755b186733fff512b33bd67e0c72a701843b302670a9d8a6625d56bfbddeb0aa7d9b52a82c22775b20df4414d6e46f85f7290b31a727318f3710c925c3152f4f7e98b5d4e2bf3e0721c3e532b06437618c3cd7ebf9cb7dc44d617b3a38652a35223a06d3f24d8f5ebe262bc95d1246f1a543c2ca47acc1130458051e23f84d23") sendfile(r1, r3, 0x0, 0x1) 08:55:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000020010010000000000000000000", 0x28}], 0x1) [ 738.442051] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 738.455382] validate_nla: 20 callbacks suppressed [ 738.455390] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) [ 738.493489] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000000000, 0x0) 08:55:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000011000000000000000000", 0x28}], 0x1) [ 738.570739] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffb, 0x0) 08:55:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c) 08:55:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000010000120000000000000000000", 0x28}], 0x1) [ 738.788016] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 738.811602] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00000000, 0x0) 08:55:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c) [ 738.987663] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 739.051320] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:23 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffd, 0x0) 08:55:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000030000000000000000000", 0x28}], 0x1) 08:55:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x1802]}}, 0x1c) 08:55:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, 0x0) [ 739.402472] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x749}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000003f000000000000000000", 0x28}], 0x1) 08:55:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x2000]}}, 0x1c) 08:55:23 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x4) write$P9_RSTAT(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8a0000007d0100000083006109070000000000000000050000000000000000000104fe00000009000000010000000000000018002d656d313a707070302670707031656d315e2c5e707070301b006c6f776c616e3173656c66405b70726f632a6367726f7570272726070028657468305c3a160074727573746564656d31776c616e3065746830656d31e89b662f64f84e69b006f04e75a8ad5fba313445294372e1ab5063e2bfd9a6216914b93fffb6d66401f7a31f2a850dcf13708a363477f888ec5718c87a19ad0f02447745ba6eb8320fa249d59e937f6e692ff8b38b79e3b2f0ad3ea42b2e2a900094"], 0x8a) sendfile(r0, r1, 0x0, 0x1) 08:55:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, 0x0) [ 739.612383] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, 0x0) [ 739.675137] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000040000000000000000000", 0x28}], 0x1) 08:55:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x3f00]}}, 0x1c) 08:55:23 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x188, r1, 0x0, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x45}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xaa}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7803}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1b, 0x20}}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7ff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x96aa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffeff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xf1cb}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x863e}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6a}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x5}, 0x4010) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r2, 0x0, 0x1) 08:55:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, 0x0) [ 739.878967] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000060000000000000000000", 0x28}], 0x1) 08:55:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, 0x0) [ 739.957363] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c) 08:55:23 executing program 4: clone(0x8200800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) chown(&(0x7f0000000180)='./file0\x00', r1, r2) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000140)=0xcc, 0x4) r3 = getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r3, r0, 0x0, 0x8, &(0x7f0000000040)='\\md5sum\x00'}, 0x30) r5 = syz_open_procfs(r4, &(0x7f00000000c0)='net/arp\x00') fcntl$setstatus(r0, 0x4, 0x400) exit(0x0) r6 = geteuid() setuid(r6) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'bond_slave_0\x00', 0x200}) sendfile(r0, r5, 0x0, 0x9) 08:55:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000006b6b6b000000000000000000", 0x28}], 0x1) [ 740.135405] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 740.164258] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x4002]}}, 0x1c) 08:55:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, 0x0) 08:55:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000078000000000000000000", 0x28}], 0x1) 08:55:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, 0x0) [ 740.365713] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x5400]}}, 0x1c) 08:55:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) 08:55:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000007e000000000000000000", 0x28}], 0x1) 08:55:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 740.509960] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 740.538274] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:24 executing program 4: clone(0x7fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x9) sendfile(r0, r1, 0x0, 0x1) 08:55:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000007f000000000000000000", 0x28}], 0x1) 08:55:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x7fdc]}}, 0x1c) 08:55:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, 0x0) 08:55:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, 0x0) 08:55:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000ffffff8d000000000000000000", 0x28}], 0x1) 08:55:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x1c) 08:55:24 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) sendfile(r0, r1, 0x0, 0x1) 08:55:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x7ffffffffffff, 0x0) 08:55:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xb8ff]}}, 0x1c) 08:55:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4907}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000005dc000000000000000000", 0x28}], 0x1) 08:55:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, 0x0) 08:55:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c) 08:55:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:25 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x89948484, 0x2, [0xffff, 0x100000001]}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e22, 0x6, @remote, 0x66}}, [0x7, 0xff, 0x1, 0x20, 0xff, 0x3, 0x10001, 0x4, 0x6, 0x700000000000000, 0x4, 0x80000000, 0x5, 0x2, 0x7]}, &(0x7f0000000200)=0x100) 08:55:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000e0000000000000000000", 0x28}], 0x1) 08:55:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000000000, 0x0) 08:55:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5865}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xdc7f]}}, 0x1c) 08:55:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, 0x0) 08:55:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000fffffff5000000000000000000", 0x28}], 0x1) 08:55:25 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x388, r1, 0x24, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x40, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2a39}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x886}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_LINK={0x120, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x78}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb93b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x38e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x97}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_MEDIA={0xd8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x34}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xae00}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb5d867c}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x388}, 0x1, 0x0, 0x0, 0x41}, 0x8085) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x4) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) sendfile(r0, r2, 0x0, 0x1) 08:55:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c) 08:55:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000fc000000000000000000", 0x28}], 0x1) 08:55:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x6b6b6b00000000, 0x0) 08:55:25 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) r2 = getuid() getgroups(0x1, &(0x7f0000000140)=[0xee00]) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x8000, &(0x7f0000000280)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x6}}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_gt={'uid>', r4}}, {@smackfsroot={'smackfsroot', 0x3d, 'coredump_filter\x00'}}, {@fsname={'fsname', 0x3d, 'comm\x00'}}]}}) sendfile(r0, r1, 0x0, 0x1) 08:55:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c) 08:55:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000080fe000000000000000000", 0x28}], 0x1) 08:55:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, 0x0) 08:55:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:25 executing program 4: clone(0x8004001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000c0fe000000000000000000", 0x28}], 0x1) 08:55:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c) 08:55:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, 0x0) 08:55:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c) [ 742.154653] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, 0x0) 08:55:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000fffffffe000000000000000000", 0x28}], 0x1) 08:55:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, 0x0) 08:55:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c) 08:55:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000ff000000000000000000", 0x28}], 0x1) 08:55:26 executing program 4: clone(0x10003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$TIOCNOTTY(r1, 0x5422) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7ff, 0xfffffffffffff311}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={r2, 0x8}, 0x8) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, 0x0) 08:55:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c) 08:55:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000008dffffff000000000000000000", 0x28}], 0x1) 08:55:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, 0x0) 08:55:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000f5ffffff000000000000000000", 0x28}], 0x1) [ 743.096332] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xff0f]}}, 0x1c) 08:55:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000feffffff000000000000000000", 0x28}], 0x1) 08:55:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xb00000000000000, 0x0) 08:55:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:27 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) clone(0x7fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) signalfd4(r0, &(0x7f0000000100)={0x9}, 0x8, 0x80000) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000200)={'nlmon0\x00', &(0x7f0000000140)=@ethtool_gstrings={0x1b, 0x5, 0x3c, "3ebc88d43a14d2cbfc7b5e71f279a7667c8963b7e83238faef07a5544db085fd7df1643a2210f28ee5df7ef30ae54be68155dc6bcd9422f935f15f66"}}) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0x80000000, &(0x7f0000000080)=0x4) 08:55:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, 0x0) 08:55:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000004000000000000", 0x28}], 0x1) 08:55:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xffb8]}}, 0x1c) 08:55:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x170f000000000000, 0x0) 08:55:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x1dba0]}}, 0x1c) 08:55:27 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') r2 = add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="3c2f4dff108bb7d4e5c68331f34d474546282bde9de2c8a5e67e05efbee269b3eed379e03c7fc3d4", 0x28, 0xfffffffffffffffa) r3 = add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000001200)="d17f624ac5", 0x5, 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000100)=[{&(0x7f0000000200)="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", 0x1000}], 0x1, r3) exit(0x0) sendfile(r0, r1, 0x0, 0x1) [ 744.111054] validate_nla: 15 callbacks suppressed [ 744.111063] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000010000000000000", 0x28}], 0x1) 08:55:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000340000000000000", 0x28}], 0x1) [ 744.289365] cgroup: fork rejected by pids controller in /syz4 08:55:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, 0x0) 08:55:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x20000]}}, 0x1c) 08:55:28 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') timer_create(0x0, &(0x7f0000000040)={0x0, 0x1f, 0x1}, &(0x7f0000000080)=0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000440)={0x7, 0x8, 0xfa00, {r2, 0x73c}}, 0x10) timer_settime(r1, 0x1, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000280)={0x0, 0x2, 0x9, 0x1, 0x10000}) lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="00fb5c04007f73aa9d73cd96fb9f9305e3c73f70c915cd506388012912fe2c4d4c5325fed461ce68ca65ced531d567a035a7766a29a7b7317db09e62816e873be1b7491803f6209d880811411987761f3d1d01102f2d27dde0a843cbb9f0247fed1571a923120f442f1bdb336bb846c0887f46aa380b9de75263882fdab5220aeeaef544445235e39755eecb2bf5982169a97c0a0d46b118c19cd4ffede2b6441a23c843a0b8540fb08e604a4d54dc8ea1dd1f08ec4c0b358302f307ee910cdb8656a61b7b9474b6fbae9808813563"], 0x5c, 0x0) sendfile(r0, r3, 0x0, 0x1) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000240)=0x9) 08:55:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, 0x0) 08:55:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 744.439295] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000006b6b6b000000000000", 0x28}], 0x1) 08:55:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c) 08:55:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, 0x0) [ 744.527415] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:28 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x9, 0x6f9, 0x5, 0xffffffff, 0x81}, &(0x7f0000000100)=0x98) fcntl$setsig(r0, 0xa, 0x1b) setxattr$security_smack_entry(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.SMACK64\x00', &(0x7f0000000300)='posix_acl_accesscpusetvmnet0em0@\x00', 0x21, 0x2) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x3}, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r1, &(0x7f0000000240)=0x4) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r1, 0x9}, 0x8) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) sendfile(r0, r0, 0x0, 0x8000000000000004) 08:55:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, 0x0) [ 744.649883] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000010000000000", 0x28}], 0x1) 08:55:28 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) [ 744.705681] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x50000]}}, 0x1c) 08:55:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, 0x0) 08:55:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 744.824666] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x1c) [ 744.912104] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000020000000000", 0x28}], 0x1) 08:55:28 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0xf02e) sendfile(r0, r1, 0x0, 0x1) 08:55:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, 0x0) [ 745.017324] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x2000000]}}, 0x1c) 08:55:28 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$void(r0, 0xc0045878) exit(0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000001680)={0x3, 0x9, 0x100000001}, 0xc) r1 = semget(0x0, 0x0, 0x40) clock_gettime(0x0, &(0x7f0000001700)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000001740)={{0x2, 0x1, 0x8, 0x8, '\x00', 0x7}, 0x0, [0x20, 0x1f, 0x6, 0x7, 0x4, 0xfffffffffffffff9, 0x0, 0x40, 0x7, 0x4, 0x6000000000000, 0x5, 0xbc00000000000000, 0xb0, 0x5, 0xab, 0x9, 0xf6, 0x7, 0x5055, 0x419, 0x2, 0x1, 0x4, 0x2, 0x7f, 0x0, 0x1, 0x7ca, 0x100000000, 0x7, 0x8, 0x7, 0x6, 0x80000000, 0x7ff, 0x40, 0x3, 0x3, 0x42fe, 0x100, 0x3, 0x9, 0x80, 0x2e80000000000000, 0x7ff, 0x0, 0x8, 0x9, 0x1, 0x40, 0x2, 0x1, 0x5, 0x4, 0x20, 0x3ff, 0x4, 0x5, 0x3, 0x100000001, 0x0, 0x7, 0xfffffffffffff001, 0x0, 0x4, 0x0, 0x4, 0x80e0, 0x15f, 0x5, 0x7, 0x6, 0x7cb1, 0x6, 0x4, 0x81, 0x401, 0x2, 0x6a32, 0x1, 0x2, 0x1, 0x7, 0x5, 0xe17c, 0x2, 0x0, 0xffffffff, 0x101, 0xffffffffffffffff, 0x10000, 0x7ff, 0x9, 0x80000000, 0x7, 0x7, 0x10000, 0x5, 0x2, 0xfffffffffffeffff, 0x80000001, 0x80000000, 0x8, 0xba0d, 0x63, 0x394492d7, 0x6, 0x593addfc, 0x7, 0x9, 0x9, 0x950, 0x2, 0x800, 0xd0d, 0x100000001, 0x4dc9, 0x2400000000000, 0xffff, 0x9, 0x9, 0x10001, 0xafc, 0x7d0, 0x0, 0x9, 0x1], {r2, r3+30000000}}) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f0000000040)=""/9) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f00000000c0)=""/43, 0x2b}, {&(0x7f0000000100)=""/180, 0xb4}, {&(0x7f0000001200)=""/235, 0xeb}, {&(0x7f0000001300)=""/102, 0x66}, {&(0x7f0000001380)=""/201, 0xc9}, {&(0x7f0000001480)=""/170, 0xaa}, {&(0x7f0000001540)=""/76, 0x4c}], 0x9, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000016c0)) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000001c40), &(0x7f0000001c80)=0x4) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x1) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) 08:55:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, 0x0) 08:55:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000030000000000", 0x28}], 0x1) [ 745.138708] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 745.182220] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x1c) 08:55:28 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000040)={0x3, 0x1, 0x100, 0x7792f087, 0x80000000}, 0xc) sendfile(r0, r1, 0x0, 0x1) 08:55:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, 0x0) 08:55:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000040000000000", 0x28}], 0x1) [ 745.296803] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 745.370571] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, 0x0) 08:55:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c) [ 745.444153] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000050000000000", 0x28}], 0x1) 08:55:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:29 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0xb6f, 0x10000, 0x200, 0x8, 0x0, 0x6, 0x5, 0x5, r2}, &(0x7f0000000140)=0x20) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000180), &(0x7f0000000200)=0xc) exit(0x0) sendfile(r0, r1, 0x0, 0x1) [ 745.589409] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c) 08:55:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0) [ 745.671050] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, 0x0) 08:55:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:29 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000200)="82304013b3a3d2567bb68500464beb452f3edf54ed2c3dcce7985d77a8d1266aa8a2a9d1727ce6cf700b690db26fed87559b6146f68e54f95e2d4842b7228ea2be625f6aada477049735aed43c25449f82c584fa6eafa1db121cbe47ec3034034763745068b952c9ae845e993a6bd3a387577966dd241e6bd8afa712f2faf79ca187104662e18d3495871113c6e82c58cd7e5645d502b0094d677f76c1cad8c2a2ba7af189305084a6d88e8e3d03e3fc7147ed1b073ac76903d3af74abf6f2d38241e1e8605f38422f65064fadb14fad5769b95795a56afe8aa7fd742d239f490cdb17273cfdda6026b6e124e698d11f", 0xf0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x90, &(0x7f0000000300)=[@in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e22, 0x8, @empty, 0x1}, @in6={0xa, 0x4e21, 0x400, @remote, 0xbb}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x0, @empty, 0x1000}, @in6={0xa, 0x4e20, 0x7, @empty, 0x7fff}]}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000400)={0x9, 0x6, 0x8208, 0x7ff, 0x2, 0x6518, 0x6, 0x8, r2}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') clock_adjtime(0x3, &(0x7f0000000040)={0xffff, 0xf57c, 0x40, 0x1, 0x0, 0x8, 0x7, 0x1, 0x10001, 0x8, 0x3, 0xe0000000000000, 0x7ff, 0x6, 0x8, 0x8093, 0x6, 0x9, 0x9, 0x80, 0x3ff, 0x401, 0x0, 0x7, 0xff, 0x9}) exit(0x0) sendfile(r1, r3, 0x0, 0x1) [ 745.765220] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000060000000000", 0x28}], 0x1) 08:55:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x6000000]}}, 0x1c) [ 745.837146] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, 0x0) 08:55:29 executing program 4: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000080)={{0x0, @dev={0xac, 0x14, 0x14, 0x14}, 0x4e23, 0x2, 'wrr\x00', 0x20, 0x5, 0x3c}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x4e24, 0x0, 0x5, 0x3000000000}}, 0x44) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) [ 745.984739] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000070000000000", 0x28}], 0x1) 08:55:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xb00000000000000, 0x0) 08:55:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c) [ 746.074108] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:29 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x101500) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r3 = add_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0xffffffffffffffca, r2) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r3) exit(0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000280)=""/129) sendfile(r0, r1, 0x0, 0x1) 08:55:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, 0x0) 08:55:29 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000080000000000", 0x28}], 0x1) 08:55:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 746.204460] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x1c) 08:55:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000090000000000", 0x28}], 0x1) 08:55:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x170f000000000000, 0x0) 08:55:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000000a0000000000", 0x28}], 0x1) 08:55:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c) 08:55:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, 0x0) 08:55:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:30 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) r2 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, r2) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000300)={{0x3, 0x2, 0x4, 0xff, 0x1, 0xb60}, 0xd77, 0x0, 0x1f, 0x6, 0x0, "7a94b6e2f5e51bfd4ed1b55e387481c33f7ffcdcd5a2e3455f3380d2d92995ebfb6c2fbab8e32322124e31294ca1c73348aefd3c7143b28cbe997c3e5b4bc85d09d0b84c8c5abbab247b595e8e8edbf167a90333c9a0881eaa7c42d302b6ff3abe1acedff43f9fe52439bdb3fcffd1a1f2f6ee2c647d4fe33e9e49d242536ddf"}) write$sndseq(r1, &(0x7f0000000200)=[{0x200, 0x1, 0xff, 0xffffffffffffffff, @time={r3, r4+10000000}, {0x100000001, 0x4}, {0x2, 0x1}, @note={0x8, 0x80, 0x3734, 0x0, 0x7ff}}, {0x10000, 0xddfc, 0x8, 0x4225, @tick=0x40, {0x8, 0x47d}, {0x5, 0x100000000}, @raw32={[0x2, 0x9, 0x2]}}, {0x101, 0x9, 0x7, 0x4, @tick=0x2, {0x3, 0xfff}, {0x5, 0xb5}, @note={0x0, 0x10002000, 0x79af, 0xed71, 0x6}}, {0x1, 0x8001, 0x800, 0x76, @tick=0x40, {0x6, 0x7}, {0x5, 0xfffffffffffff000}, @queue={0xfff, {0x7f, 0x45e8ab5c}}}, {0x788136f1, 0x0, 0x1, 0x7, @time={r5, r6+30000000}, {0x9, 0x1ff}, {0x80, 0xfff}, @addr={0x456, 0x2}}], 0xf0) 08:55:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000000e0000000000", 0x28}], 0x1) 08:55:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c) 08:55:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, 0x0) 08:55:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, 0x0) 08:55:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c) 08:55:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000100000000000", 0x28}], 0x1) 08:55:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, 0x0) 08:55:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x1c) 08:55:31 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001d00)='/dev/autofs\x00', 0x20040, 0x0) connect$netlink(r0, &(0x7f0000001d40)=@unspec, 0xc) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000140)={0x10, 0x47f, {0x57, 0xfffffffffffff801, 0x5, {0x8, 0x8}, {0x8, 0x100}, @period={0x5d, 0x6, 0x2, 0x22efe70c, 0x4a161549, {0x8, 0x7, 0x0, 0x8}, 0x3, &(0x7f0000000040)=[0xff, 0x8000, 0x1a94a790]}}, {0x57, 0x269f, 0x1ff, {0x8000000000000003, 0x6}, {0x5, 0xff}, @ramp={0x2, 0x8000, {0x5, 0x0, 0x1ff, 0x3}}}}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000080)=0x1) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000200)={0x73c7fd95, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) fsetxattr(r0, &(0x7f0000000240)=@random={'osx.', 'coredump_filter\x00'}, &(0x7f0000000280)='coredump_filter\x00', 0x10, 0x3) sendfile(r1, r2, 0x0, 0x1) 08:55:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x49070000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, 0x0) 08:55:31 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000110000000000", 0x28}], 0x1) 08:55:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x1313a9e0]}}, 0x1c) 08:55:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, 0x0) 08:55:31 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000100001200000000000", 0x28}], 0x1) 08:55:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x18020000]}}, 0x1c) 08:55:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, 0x0) 08:55:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, 0x0) 08:55:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000300000000000", 0x28}], 0x1) 08:55:32 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x10000000080000) sendfile(r0, r1, 0x0, 0x1) 08:55:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x1fafff7b]}}, 0x1c) 08:55:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000003f0000000000", 0x28}], 0x1) 08:55:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, 0x0) 08:55:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0) 08:55:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x20000000]}}, 0x1c) 08:55:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000400000000000", 0x28}], 0x1) 08:55:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0) [ 749.149848] validate_nla: 10 callbacks suppressed [ 749.149858] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000600000000000", 0x28}], 0x1) 08:55:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x3f000000]}}, 0x1c) 08:55:33 executing program 4: clone(0x40000400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, 0x0) 08:55:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000780000000000", 0x28}], 0x1) 08:55:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c) 08:55:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, 0x0) [ 749.862957] net_ratelimit: 8 callbacks suppressed [ 749.862968] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 749.870790] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x40020000]}}, 0x1c) 08:55:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000007e0000000000", 0x28}], 0x1) 08:55:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 750.008891] IPVS: ftp: loaded support on port[0] = 21 08:55:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0) 08:55:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, 0x0) [ 750.108692] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x54000000]}}, 0x1c) [ 750.160323] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:33 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp6\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd\x00') exit(0x0) sendfile(r0, r0, 0x0, 0x1) pipe(&(0x7f0000000580)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) unlink(&(0x7f0000000900)='./file0/file0\x00') r2 = syz_open_dev$binder(&(0x7f00000007c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000480)={{&(0x7f0000000000)=""/63, 0x3f}, &(0x7f0000000100), 0x4}, 0x20) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x13, r3, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) r4 = mmap$binder(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x2000009, 0x100010, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000080)={r4}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x44, 0x0, &(0x7f0000000700)="2ba063fb309ec7fdbfb08e6e91baee7d7d4599fe14129a4d426834556ae420e087d59c0c7be7fcad1abb7e1f8f446f373f611ca1ee9c2231708e18a47bc68a2a79a0b489"}) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) socket$inet6(0xa, 0xe, 0x5) getpid() socket$inet_icmp_raw(0x2, 0x3, 0x1) stat(&(0x7f0000000400)='./file1\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r5) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x4, 0x9) 08:55:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000007f0000000000", 0x28}], 0x1) 08:55:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 750.311851] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x7bffaf1f]}}, 0x1c) 08:55:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff00000000, 0x0) [ 750.381849] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, 0x0) 08:55:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000ffffff8d0000000000", 0x28}], 0x1) 08:55:34 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000080)={0x0, 0x0, 0xff, &(0x7f0000000040)=0x401}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) [ 750.579945] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 750.602383] binder: send failed reply for transaction 21 to 6926:6931 [ 750.610044] binder: undelivered TRANSACTION_COMPLETE 08:55:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c) 08:55:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0) 08:55:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000005dc0000000000", 0x28}], 0x1) 08:55:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 750.640931] binder: undelivered TRANSACTION_ERROR: 29189 08:55:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, 0x0) [ 750.773476] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x91ffffff]}}, 0x1c) 08:55:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000e00000000000", 0x28}], 0x1) 08:55:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) [ 750.925892] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, 0x0) [ 751.091286] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:35 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') read(r0, &(0x7f0000000040)=""/13, 0xd) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r2, 0x0, 0x1) 08:55:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000fffffff50000000000", 0x28}], 0x1) 08:55:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xa0db0100]}}, 0x1c) 08:55:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff00000000, 0x0) 08:55:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, 0x0) [ 751.672569] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 751.691560] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000fc0000000000", 0x28}], 0x1) 08:55:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xb8ff0000]}}, 0x1c) 08:55:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, 0x0) 08:55:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, 0x0) 08:55:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 751.925353] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 751.941502] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:36 executing program 4: clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/if_inet6\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x7f, 0x1ff}) exit(0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0x2, 0x2, {0x3, 0x3, 0x24, 0x1, 0x7ff}}) sendfile(r0, r1, 0x0, 0x1) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000100)={0x7, 0x8, 0x0, 0x2, 0x3}) 08:55:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000080fe0000000000", 0x28}], 0x1) 08:55:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xdc7f0000]}}, 0x1c) 08:55:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0) 08:55:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0) 08:55:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 752.625217] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000c0fe0000000000", 0x28}], 0x1) 08:55:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xe0a91313]}}, 0x1c) 08:55:36 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, 0x0) 08:55:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0) 08:55:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000fffffffe0000000000", 0x28}], 0x1) 08:55:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c) 08:55:36 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000ff0000000000", 0x28}], 0x1) 08:55:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 753.138824] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0) 08:55:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0) 08:55:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xeffdffff]}}, 0x1c) 08:55:37 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='coredump_filter\x00') fgetxattr(r2, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/36, 0x24) exit(0x0) sendfile(r0, r2, 0x0, 0x1) write$P9_ROPEN(r2, &(0x7f0000000040)={0x18, 0x71, 0x2, {{0x10, 0x4, 0x3}, 0x6}}, 0x18) 08:55:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000ffffffff0000000000", 0x28}], 0x1) 08:55:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c) 08:55:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0) 08:55:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x97ffffff00000000, 0x0) [ 753.777480] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000020000000000000000000000", 0x28}], 0x1) 08:55:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}, 0x1c) 08:55:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xe0ffffffffffffff, 0x0) 08:55:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0) 08:55:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:38 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) r2 = mmap$binder(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x3000002, 0x10, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000140)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x80, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="08631040", @ANYRES64=r2, @ANYBLOB="020000000000100006630440030000007beb9d016348400400000000000004030000bdec80ca60bdd6735047df9e01000000000000000000000000000000000000000048000000000000000800000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB="852a747000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="0100000000000000030000000000000037000000000000008561646600000000030000000000000004000000000000001600000000000000"], @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="2aa00fcb4f4f33bf"], @ANYBLOB="030000000000000008631040", @ANYRES64=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\vc\x00\x00'], 0xbe, 0x0, &(0x7f0000000280)="56c9bd1b1bebf6ecf1f706358b6f5d1eee4fc4244f621243d8dda4e2334e6ec59cd25c78bb2d2d23a94091255402ce1ade56d8c9921f1666f588aaedbde790993b4ae07ea3ca69b3442477bec80dcfca02a9e66548abd1653dae99f2614afab48945bb7a78a12406b246978fd8f465e45fb2a85ed323728070d315650ee2233b8f6f35deb89fe42a2fa6989f850592b0c32142ab2a85b3c1eaecf2d46d1f94ab8ddbdd27183626aa098fc280a82902b4a3ef52735dd32e51f4444d33bc3a"}) 08:55:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000030000000000000000000000", 0x28}], 0x1) 08:55:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c) 08:55:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff00000000, 0x0) 08:55:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffff0700, 0x0) [ 754.712856] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 754.726092] validate_nla: 12 callbacks suppressed [ 754.726100] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfe800000]}}, 0x1c) 08:55:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000040000000000000000000000", 0x28}], 0x1) 08:55:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000050000000000000000000000", 0x28}], 0x1) [ 754.884278] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 754.884954] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffff7f, 0x0) 08:55:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 755.043517] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 755.066996] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:39 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) getsockopt$rose(r1, 0x104, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x4) 08:55:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0) 08:55:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c) 08:55:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000060000000000000000000000", 0x28}], 0x1) 08:55:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 755.628782] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 755.645909] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000070000000000000000000000", 0x28}], 0x1) 08:55:39 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x10000, 0x0, 0x10001, 0x76}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000080)={r1, 0x7fffffff}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x2, 0x4) 08:55:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c) 08:55:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:39 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000040)) 08:55:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) 08:55:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000080000000000000000000000", 0x28}], 0x1) 08:55:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xff0f0000]}}, 0x1c) [ 755.882748] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 755.908247] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000040)={0x0, {0x5, 0x9}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000080)={'nat\x00', 0x4, [{}, {}, {}, {}]}, 0x68) socket$tipc(0x1e, 0x5, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000100)) getpeername$llc(r0, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x10) 08:55:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff00000000, 0x0) [ 756.032476] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000090000000000000000000000", 0x28}], 0x1) 08:55:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfffffdef]}}, 0x1c) [ 756.103020] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000a0000000000000000000000", 0x28}], 0x1) 08:55:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2000000000000004) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xa0f, 0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x4, 0x20000) [ 756.239020] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:40 executing program 4: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000280)={0x0, 0x0, 0x3f, [], &(0x7f0000000240)=0x7}) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r2, r1, 0x0, 0x6) setxattr$security_smack_transmute(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='TRUE', 0x4, 0x2) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000400)={@multicast1, @local, 0x0}, &(0x7f0000000440)=0xc) recvfrom$packet(r1, &(0x7f0000000300)=""/250, 0xfa, 0x40000100, &(0x7f0000000480)={0x11, 0x1a, r3, 0x1, 0xaa, 0x6, @random="cb5473c80c9e"}, 0x14) socketpair(0xa, 0x5, 0x3f, &(0x7f00000006c0)) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000040)={0x6c, "40fe584ecd477cc9596f28340e8630370bfc077548a6f3586edec43ed60f672bc7320bee7da9d7bc8adeba92f7b171857fe65b6df38264ad2f9d8c087b5a3c95cee4d7a251af48a4a270d80726be3fd2a9ee64f33e0f3d94b8a0a266474538b6d7f8ab911fde1e5602f000e454311f9f072b9bd311a8708e0a754eaea47ec36e"}) r4 = gettid() getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video2\x00', 0x2, 0x0) sendto$packet(r0, &(0x7f00000004c0)="3c384397da81b5764c495a2d3f4eb4f2fd04042953b67570de9b8fc6476dda8b4c4b36fe9bb7be2ef5e8f5a2dd647208a3f6df2b1821f25f1a659a99cea31406969ac8ae78fb917f32c451ce612ee8ce1f7893287d03d51efb898b2d6ed07ac5e7bcd98396cf18077d40b6109834af57fa300f6891ee366fdf3968558afed0c2f2b278bfdb2c5cfa41fb2c26fb01727614b2f82e26b873af40923412d9277886af6b12bdb8bb9d3b70bd145ed9f9117bd8e6c65b20aeb5a5c44e7f273520b37d6a5c4ad78e383108fa3872752e2eedb2b92e7f55cc1f69cada3d006e11c8", 0xde, 0x10, &(0x7f00000005c0)={0x11, 0x1e, r3, 0x1, 0x3, 0x6, @local}, 0x14) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000200)={0x7, 0x7, r4, 0x0, r5, 0x0, 0x8, 0x66d0}) 08:55:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c) 08:55:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, 0x0) 08:55:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000e0000000000000000000000", 0x28}], 0x1) 08:55:40 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000680)='/dev/qat_adf_ctl\x00', 0x410000, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000700)={0x0, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @loopback}, {0x2, 0x4e22, @rand_addr=0x2}, 0x10, 0x0, 0x0, 0x0, 0x80000001, &(0x7f00000006c0)='veth0\x00', 0x65, 0x3a4cb6af, 0x7}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x48) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) lstat(0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000640)=[&(0x7f0000000540)='-[lo\x00', &(0x7f0000000600)='++cpuset.security\x00'], &(0x7f00000008c0), 0x0) fchown(r2, 0x0, 0x0) execve(0x0, &(0x7f0000000880)=[&(0x7f00000003c0)='\x00'], 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x40, 0x100) r3 = socket(0x8, 0xa, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) r4 = syz_open_pts(0xffffffffffffffff, 0x40) ioctl$TIOCMGET(r4, 0x5415, &(0x7f0000000100)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x801, 0x0) write$uinput_user_dev(r5, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r5, 0x5501, &(0x7f00000001c0)={{}, 'syz*\x00', 0x4c}) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) io_setup(0x1f, &(0x7f00000000c0)=0x0) io_submit(r6, 0x1, &(0x7f00000011c0)=[&(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, 0x3}]) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), 0x4) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000100)={0x38, 0x400, 0x7, "09be8db36819c60510d15d87538edd8299ac259fe75cd64f2fcdd0997edd9412a7985032a87a3dfe84cf6da382552d65634eb8502854ecfb"}) r7 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x101, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0xa1) [ 756.797448] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000100000000000000000000000", 0x28}], 0x1) 08:55:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xffffff91]}}, 0x1c) [ 756.883041] input: syz1 as /devices/virtual/input/input9 08:55:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0) 08:55:40 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0xa) write$nbd(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) write$selinux_validatetrans(r0, &(0x7f00000000c0)={'system_u:object_r:xen_device_t:s0', 0x20, 'system_u:object_r:passwd_exec_t:s0', 0x20, 0x0, 0x20, '/sbin/dhclient\x00'}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) [ 756.972793] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000110000000000000000000000", 0x28}], 0x1) 08:55:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c) 08:55:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000300000000000000000000000", 0x28}], 0x1) 08:55:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xe8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="034a0db5b6fe01bad0c699fad9f495bfa14132c7672268ca845f5c14857527d0d648b5b9656ac1864623756d516fdb0253b0750ced35e7ec39b716f84781e1b3f9e256ebf4d0d02b", 0x48, 0x3f}, {&(0x7f0000000100)="34f682516e8638edacae4edd8cc70d1b378481211d5eacf24e321e9810c399807842d7126af34aa1cbb5d95981b118e045628a091515b45b2c7ec67d14621e9db43c02b11628e32aa84b0987819ca50dde8e0de16a7675ea570e2ada7498a94b1d1a3fc9c1675bad94da0ed274aa1e44212144ad09ad94ae71ca0d4abdd0a9c7bc950d0fac727cf179d02cba80e2f2b08884c6ecb99f64e6c219c0c62aaaf5e5d62f0383571857912ff25d441492f9c6fa2015789b993845f00e8fcc42153bdbfde50707d631b3ae70788edc2f6b5e0195f20e6b1d3969", 0xd7, 0x1}], 0x180004, &(0x7f00000004c0)={[{@nobarrier='nobarrier'}], [{@euid_gt={'euid>', r1}}, {@context={'context', 0x3d, 'system_u'}}, {@smackfshat={'smackfshat', 0x3d, 'wlan1'}}, {@fowner_gt={'fowner>', r2}}, {@fsname={'fsname', 0x3d, 'em1#\\'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) 08:55:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfdffffff00000000, 0x0) 08:55:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000600000000000000000000000", 0x28}], 0x1) 08:55:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x7bc77df8c4]}}, 0x1c) 08:55:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x20000000000]}}, 0x1c) 08:55:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000780000000000000000000000", 0x28}], 0x1) 08:55:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0) 08:55:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'\x00', 0x7fff}, 0x28, 0x3) 08:55:42 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f00000002c0)=0x81, &(0x7f0000000300)=0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f00000000c0)=0x9, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x24000801) write$selinux_attr(r2, &(0x7f0000000040)='system_u:object_r:apt_lock_t:s0\x00', 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r2, r4, 0x0, 0x1) 08:55:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4907000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000007e0000000000000000000000", 0x28}], 0x1) 08:55:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x7ffffffff000]}}, 0x1c) [ 758.766267] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 758.777995] audit: type=1400 audit(1546851342.416:122): avc: denied { map } for pid=7363 comm="syz-executor4" path="/sys/kernel/debug/kcov" dev="debugfs" ino=71 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 08:55:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0) 08:55:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000e00000000000000000000000", 0x28}], 0x1) [ 758.961375] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 759.010501] IPVS: ftp: loaded support on port[0] = 21 08:55:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c) 08:55:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x400441, 0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x2000440, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@access_any='access=any'}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@access_client='access=client'}], [{@appraise='appraise'}, {@context={'context', 0x3d, 'system_u'}}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r3}}, {@measure='measure'}, {@euid_gt={'euid>', r4}}, {@fsname={'fsname', 0x3d, '/proc/sys/net/ipv4/vs/sync_refresh_period\x00'}}, {@dont_appraise='dont_appraise'}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) statx(r5, &(0x7f0000000040)='./file0\x00', 0x6000, 0x21, &(0x7f0000000080)) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0) [ 759.106785] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000fc0000000000000000000000", 0x28}], 0x1) [ 759.252170] 9pnet: Insufficient options for proto=fd [ 759.328397] chnl_net:caif_netlink_parms(): no params data found [ 759.398308] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.407238] bridge0: port 1(bridge_slave_0) entered disabled state [ 759.419264] device bridge_slave_0 entered promiscuous mode [ 759.430926] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.437478] bridge0: port 2(bridge_slave_1) entered disabled state [ 759.444854] device bridge_slave_1 entered promiscuous mode [ 759.469046] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 759.480213] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 759.516581] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 759.530009] team0: Port device team_slave_0 added [ 759.538067] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 759.551269] team0: Port device team_slave_1 added [ 759.558963] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 759.572078] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 759.646930] device hsr_slave_0 entered promiscuous mode [ 759.684235] device hsr_slave_1 entered promiscuous mode [ 759.724469] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 759.731399] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 759.767847] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 759.858960] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 759.869224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 759.883785] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 759.902141] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 759.920243] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 759.933109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 759.948394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 759.961885] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 759.973267] 8021q: adding VLAN 0 to HW filter on device team0 [ 759.992308] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 760.002822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 760.019609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 760.030084] bridge0: port 1(bridge_slave_0) entered blocking state [ 760.036515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 760.052546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 760.061969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 760.078051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 760.090382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 760.102880] bridge0: port 2(bridge_slave_1) entered blocking state [ 760.109321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 760.142539] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 760.169215] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 760.183597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 760.192870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 760.213404] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 760.233221] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 760.239443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 760.255717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 760.280545] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 760.310493] 8021q: adding VLAN 0 to HW filter on device batadv0 08:55:44 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) exit(0x0) sendfile(r0, r0, 0x0, 0x7ffffff9) 08:55:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x5000000000000]}}, 0x1c) 08:55:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6558000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000300000000000000000000", 0x28}], 0x1) 08:55:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00', &(0x7f0000000080)=""/100, 0x64) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0) [ 760.531882] validate_nla: 10 callbacks suppressed [ 760.531890] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 760.558548] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000500000000000000000000", 0x28}], 0x1) 08:55:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xf0ffffff7f0000]}}, 0x1c) 08:55:44 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_names\x00') ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f00000000c0)={0x7, 0x0, 0x100000000}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000100)=0xffffffff) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) exit(0x0) sendfile(r1, r2, 0x0, 0x1) 08:55:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) accept$packet(0xffffffffffffffff, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001280)=0x14) r3 = getuid() ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000012c0)={'bond_slave_1\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001300)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001400)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001440)={'veth0_to`jond\x00', 0x0}) sendmsg$nl_xfrm(r1, &(0x7f0000001700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000016c0)={&(0x7f0000001480)=@updsa={0x220, 0x1a, 0x300, 0x70bd29, 0x25dfdbfd, {{@in6, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e21, 0x1, 0x4e21, 0x0, 0x2, 0x80, 0x20, 0x0, r2, r3}, {@in6=@mcast2, 0x4d5, 0x3b}, @in=@multicast2, {0x5, 0xff, 0x7fffffff, 0x9, 0x75, 0x9, 0x8}, {0xe0, 0x5, 0x9, 0x100000001}, {0x7, 0xfffffffffffffffb, 0x6}, 0x70bd2c, 0x3507, 0xa, 0x6, 0x5, 0x10}, [@user_kmaddress={0x2c, 0x13, {@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@remote}}, @encap={0x1c, 0x4, {0xfffffffffffffffe, 0x4e21, 0x4e23, @in=@multicast1}}, @address_filter={0x28, 0x1a, {@in6=@remote, @in6=@remote, 0xa, 0x6, 0x2}}, @policy={0xac, 0x7, {{@in=@broadcast, @in=@rand_addr=0x74cf, 0x4e21, 0xfffffffffffff00f, 0x4e23, 0x1ff, 0xa, 0x80, 0x0, 0x2f, r4, r5}, {0x7, 0x6, 0x7fff, 0x7f, 0x3ff, 0x4eef, 0x7, 0xf578}, {0x7, 0xceb, 0x5c0, 0x7}, 0xffffffff, 0x6e6bb6, 0x2, 0x1, 0x0, 0x3}}, @output_mark={0x8, 0x1d, 0x3}, @offload={0xc, 0x1c, {r6, 0x1}}]}, 0x220}}, 0x0) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffff0700, 0x0) [ 760.732252] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 760.750884] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c) 08:55:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000dc0500000000000000000000", 0x28}], 0x1) 08:55:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:44 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000040)={0x7, 0x1d, 0x10000, 0x3, 0x44d, 0x4}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) prctl$PR_SET_UNALIGN(0x6, 0x1) [ 760.921591] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 760.945919] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, 0x1c) 08:55:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000600000000000000000000", 0x28}], 0x1) 08:55:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:44 executing program 4: timer_create(0x7, &(0x7f0000000140)={0x0, 0x2d, 0x2, @thr={&(0x7f0000000040)="b1cf20e134682d85601982c584c25c0b749b77d124ecba252b3a3129b93f0b5db2d323423eed7d5dff08539c9abbe8975e0f5a9178c0bcbfcb7b7cf63232f37fec658417cf8f89009e1cb4271f1890bcb6352339c84aa01812ac5c15f2fc64e7c4f709c70385a8d59c843354e04b99474b45a20ffb89ac686b788dce16390fd2d1a12cca620e56e2beb653eb1d9d3843a07d08a171fda7288dadab504ff8ca1d007bdca4f6a53cddd29589503dfe782039a0565a268cf9b4e72f67b72ab0ad03eb079e7d7f", &(0x7f0000000200)="cdddccc0b23a8244b49f70ae8b73ce2509136ada735a97eab125ef5a612453ad352572a0eca6dfceb56f46f312e49ce229afdc496815b50a3e8942bed8ab0ae0680fa1633068ca34fa47e6a7d14cb373ad0b1ec47dde284541e43d60e3a16ffb20ce6738fea2806edf54766c5a490e24bb2218c4a68ddc0d0ee745674980e004559fe400f8c9a474ebda9ce8402b9cec0ef3c2dbf46346bf59fc0ec5bdefd9238a0c6fb4"}}, &(0x7f0000000180)=0x0) timer_getoverrun(r0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) 08:55:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffff7f, 0x0) 08:55:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffff9c, 0x10, &(0x7f0000000040)={&(0x7f0000000000)=""/39, 0x27, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r1, 0x0) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 761.083540] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 761.114733] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 761.128353] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000700000000000000000000", 0x28}], 0x1) 08:55:44 executing program 4: setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:ptchown_exec_t:s0\x00', 0x24, 0xf0e0b4e321a08042) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}, 0x1c) 08:55:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffe0, 0x0) 08:55:45 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) r1 = semget$private(0x0, 0x3, 0x141) semop(r1, &(0x7f0000000200)=[{0x3, 0x1ff, 0x800}, {0x3, 0x2, 0x800}, {0x0, 0x81, 0x800}, {0x0, 0x96, 0x1000}, {0x2, 0x9, 0x1800}], 0x5) getpriority(0x0, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r4, &(0x7f0000000100)='net/arp\x00') exit(0x0) sendfile(r2, r3, 0x0, 0xa86e) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r3, 0x40085618, &(0x7f0000000080)=r5) 08:55:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 761.350800] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 761.362614] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000900000000000000000000", 0x28}], 0x1) 08:55:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c) 08:55:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x1f, 0x9, 0x681e, 0xfffffffffffffffa}, {0x7, 0x8e3, 0x7, 0x2a}]}, 0x10) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000180)=0x45ae) [ 761.488877] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 761.517501] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 761.528504] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:45 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000100)='\x00\x00\x00\a\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40, 0x0) ioctl$KDDELIO(r3, 0x4b35, 0x4) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f0000000080)) sendfile(r1, r2, 0x0, 0x1) 08:55:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:55:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c) 08:55:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000a00000000000000000000", 0x28}], 0x1) 08:55:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) getpgid(r2) sendfile(r0, r1, 0x0, 0x1) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0x7f, 0x4) 08:55:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 761.685036] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 761.697567] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:45 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x44000, 0x0) flock(r0, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf7) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}, 0x1c) 08:55:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000e00000000000000000000", 0x28}], 0x1) [ 761.830906] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400000, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080), 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lapb0\x00', 0x10) 08:55:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:45 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xffff, 0x20400) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x80, 0x0) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000040)=0x80800000000000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 761.925315] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) 08:55:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000001100000000000000000000", 0x28}], 0x1) 08:55:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfcffffff00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000003000000000000000000000", 0x28}], 0x1) [ 762.140685] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@empty, @dev={0xac, 0x14, 0x14, 0x14}, @rand_addr=0x7}, 0xc) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:46 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xffffffff, 0x38880) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0x4, 0x5}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) 08:55:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000000)={0x1, 0x2, 'client0\x00', 0x1, "ef1418590d06bd89", "e0925789521299319c21ca7511be6940cc05b6de9cc5d0f9032f4804414dee5b", 0xf17, 0x6}) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x1c) 08:55:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000003f00000000000000000000", 0x28}], 0x1) [ 762.756224] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000004000000000000000000000", 0x28}], 0x1) 08:55:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c) 08:55:46 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="4fd7f4d975fc26a254dd70d200eb1fd5", 0x10) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)=""/79, 0x4f}], 0x1, &(0x7f0000000140)}, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:46 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r2, 0x0, 0x1) 08:55:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x5}, 0x28, 0x2) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c) 08:55:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000006000000000000000000000", 0x28}], 0x1) 08:55:46 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000240)={0x7, 0x2, 0x1, r1}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="98000000", @ANYRES16=r2, @ANYBLOB="000028bd7000ffdbdf25080000007400050020ceed007564700008000100696200004c0002000800010024000000080002000300000008000100070000000800010014ba2ca898110000000800010020000000080004000200000008000200d40b000008000300aa00000008000300060000000c00020008000200040000000800010075647000100004000c00010073797a"], 0x98}, 0x1, 0x0, 0x0, 0x4}, 0x2004c0c0) 08:55:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x3, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:46 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x5) membarrier(0x41, 0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c) 08:55:46 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000007800000000000000000000", 0x28}], 0x1) 08:55:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 763.263797] netlink: 28 bytes leftover after parsing attributes in process `syz-executor0'. 08:55:46 executing program 3: prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffa000/0x4000)=nil) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RRENAMEAT(r1, &(0x7f00000000c0)={0x7, 0x4b, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) openat(r2, &(0x7f0000000040)='./file0\x00', 0x2000, 0x10d) 08:55:47 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000080)={0x5, 0x0, [{0x361, 0x0, 0xb1}, {0xbff, 0x0, 0x2}, {0x0, 0x0, 0x74}, {0xc001163a, 0x0, 0xd08}, {0x834c44dc091f21bc, 0x0, 0x4}]}) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) 08:55:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x1c) 08:55:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x1c, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000007e00000000000000000000", 0x28}], 0x1) 08:55:47 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x5, &(0x7f0000000040)='comm\x00'}, 0xfffffffffffffdff) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/rt_acct\x00') exit(0x0) sendfile(r0, r2, 0x0, 0x1) 08:55:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}}, 0x1c) 08:55:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x52, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={0x0, 0x2, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={r2, 0x78, &(0x7f0000000200)=[@in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e20, 0xe66, @dev={0xfe, 0x80, [], 0x16}, 0x1}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e23, 0x200, @empty, 0x9}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e24, @loopback}]}, &(0x7f00000002c0)=0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000140)={@remote, 0x2, 0x1, 0xff, 0xc, 0x95e}, 0x20) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) getpeername$unix(r3, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000007f00000000000000000000", 0x28}], 0x1) 08:55:47 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000200)={0x1, 0x38416761, 0x1, @discrete={0x6, 0x278c000000000}}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r0, 0x0, 0x1) write$P9_RWALK(r0, &(0x7f0000000040)={0x4a, 0x6f, 0x1, {0x5, [{0x10, 0x2}, {0x0, 0x1}, {0x0, 0x4}, {0x1, 0x0, 0x1}, {0x68, 0x0, 0x3}]}}, 0x4a) [ 763.611804] netlink: 28 bytes leftover after parsing attributes in process `syz-executor0'. 08:55:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x7ffff, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000fe8000000000000000000000", 0x28}], 0x1) 08:55:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}, 0x1c) 08:55:47 executing program 4: clone(0x54062000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ppoll(&(0x7f0000000000)=[{r0, 0x2000}, {r0, 0x2021}, {r0}, {r0, 0x10}, {r0, 0x20}, {r0, 0x1}, {r0, 0x2000}, {r0}, {r0, 0x8}], 0x9, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={0x7}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) kcmp(r1, r2, 0x1, r0, r0) socket$inet_smc(0x2b, 0x1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 08:55:47 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000210000, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 763.797509] netlink: 28 bytes leftover after parsing attributes in process `syz-executor0'. 08:55:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000fec000000000000000000000", 0x28}], 0x1) 08:55:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x2, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 763.898279] IPVS: ftp: loaded support on port[0] = 21 08:55:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, 0x1c) 08:55:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000005dc00000000000000000000", 0x28}], 0x1) 08:55:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x33, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:47 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x280002) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}, 0x1c) 08:55:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x52, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000e000000000000000000000", 0x28}], 0x1) [ 764.653298] IPVS: ftp: loaded support on port[0] = 21 08:55:48 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0xcb) sendfile(r0, r1, 0x0, 0x1) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0xf60, 0x401]) 08:55:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x4002000000000000]}}, 0x1c) 08:55:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x801, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2000, 0x0) fcntl$addseals(r0, 0x409, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x254003, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)) restart_syscall() 08:55:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000fc00000000000000000000", 0x28}], 0x1) 08:55:48 executing program 5: r0 = request_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffffff) keyctl$invalidate(0x15, r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x20000) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1f) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000080fe00000000000000000000", 0x28}], 0x1) 08:55:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x5400000000000000]}}, 0x1c) 08:55:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, '\neth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x14) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000080)=@can={0x1d, r1}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)="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", 0xfb}, {&(0x7f0000000200)="dd9d6618fe283f7347beab7ac26cfd401c308d053324b00e1e3eb3009a7d345e0ad72984c1e832aac445f83211504cb9885156b50f1e5ca7156907019c68d29a8c697648763485c4d87006a7c257f9fd3f1c343c3852e50dda83fcd8e898045483260442400c3bdabebbd6878286f5f10fa2c04f326aa8e26ed910324c00f4719a3230369ff2938fc756178732678ab82079975918eed7d0b3b10e", 0x9b}, {&(0x7f00000002c0)="80d667ab2eb8f17e45f528e7be6815313de96a1028efa4b49f78699c1596753d7a3e05e39b6db2a9850264381b58fafe0d2dd436dd04bdbd390328fbd6dda0ef45afb079446616803b9181442873b7fdf59a6d213343333643af3d88865da322b59ae5d9", 0x64}], 0x3}, 0x8085) 08:55:48 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) connect$can_bcm(r1, &(0x7f0000000140)={0x1d, r3}, 0x10) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={r2, 0x2}, 0x8) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x100000001) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000140)=0xffffffffffffffd1, 0x4) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'rose0\x00', 0x0}) getpeername$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x14) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0}, &(0x7f0000000380)=0x14) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000100)) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={0x0, @local, @empty}, &(0x7f0000000400)=0xc) r7 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_SET_XSAVE(r7, 0x5000aea5, &(0x7f0000000780)={"6f69a09fda07ebf88260e8f1af686a013cc754d7842e2c0f56ade31a15ef39d70e32512d5bbcec3dcd01e0ff61cad6d2c5b442405328aacee500d0069a3afd1dc818f33162cf1523730c507b0b8c24c5cf492f5a007e03368b541e8f58e91a85ae3988c78932e6300c32c88ba48f86a04adbfbbf14cd55811467c97375f8a6c9270c7f3a154150c3799147d540bdeb6c485d9d19752d88a17e8d5930bf378fea42c5c31667ea2ca49fb667fd1301496f2789ccad5f8e9d8292111be7c35b680009c3e605048c07a1526ffd38b24451b378e13b1ced3957ab5a306aa2eec11f80fd1fe7c9f062b3390d96a5db554cabbd2d33f9557a0e0ce321b56657d0ba08df838893976f5bcb8cf1b7d0d8c236abdd6d81410df6fab1c2eab33cc97ca77e711d5855b222a87afb6cc48db22bbcd231784f5763224653b9ed34748714ecadf1bdb2b4c1c7465942d2445d26838252dd6b545ac980398601faa752781a07120d7de1fc6483e08badd9597cb1cfd52809fa980c0b4faf307be6ec9abd4ebbe2929c6657d5b427a82d909eec6bdac12d543a2a0dec11994aae31213a32a34597f13dea1c4225c4cc15fd43f9069ec22c9f239af316b70030dab19c394028f2058f98950c375a1b1da33d6343dde1ddbdc7a87d4b5530026663e43cba9959120d690a909943d1a625efe2ef6ef18c02e1bb366f3647028385f85213e200a7e882bce67debf1bd6b239852abc5e48746c7b02d1e4ee9218c873af8d97f19a7233aa4dd8f3c10346609c9800bd4aa169f2f6fdf38c4b2b17b2ebb7115c06b51dfaa9d93d65ae3ec572b86bdd52d47070a82ea55ed8ec859a745919860a9eb47e0fec2460cf334d16b310962e39802e184084fd5d1b98193afefe25bbc7392a109ad373b4cc567c83cecfd7cc7ecfc87258da747dea7abfd5ff58d2e60a586a6d7def56d2e5b6fbb27bdbebb819d45bfc80a673a6d451dc029fb586a1bd351efb847dbd9ab627c499d313d0c7928ded0ae92506b93552104af9c320a06d6b8d587a7e5d428b7619681c5e0f42c11fb57457e55c6a8a90f705947a37c3b202e291ced2481f9869d312e2824afba11f602f058a946b32a4b7f5aeeb6aa6e928840ef46d17314245275292dd9a9f512315ef8d7b38618ab29498b1163faeaadc26c351f2c8ec702b41564b53b5217f116b7fc9cd7d18d2cd5f1f83a4c3c242dfd010fea0673e984fd232534374968386c22f3be6c43881ae92f832d1bbd9eac15a95ff526a72a84dc290dab5ca7e86e9e4e733a258693afe8ad1bf5d931f14e00e834164b5afb9f6ef257a1c8d28c872809f9b44a49c7f8dba84228b7650dfab74dd2d6874937d2c8fe4cd6d4b1e7cda32718c24273e5b7b12c79191829a7377699b2412eb7c3690a48addd2cd1f672b07903dbe10fe115c9fae02ff7012e5fb540ee36bc"}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000740)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x811000}, 0xc, &(0x7f0000000700)={&(0x7f0000000480)={0x244, r2, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x228, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x693a}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}]}}]}, 0x244}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) 08:55:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, '%eth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000c0fe00000000000000000000", 0x28}], 0x1) 08:55:48 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x7bffaf1f00000000]}}, 0x1c) 08:55:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8000000000000) r2 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@rose, @rose, @default, @rose, @rose, @default, @bcast, @netrom]}, &(0x7f0000000080)=0x48, 0x80800) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7, [@default, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x500, 0x0) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:48 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x181602, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000040)=0x7fffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000ff00000000000000000000", 0x28}], 0x1) 08:55:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'v\nth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c) 08:55:49 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000080)={r0, 0x1, 0xa000}) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1', "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"}, 0x1004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x70, 0x0, 0x6, 0x800, 0x1, 0x0, 0x3, 0x400, 0xd, 0x800, 0x3f, 0x7fffffff, 0x4, 0x6, 0xa3, 0xa4, 0x1, 0x0, 0x1f, 0x3, 0x4, 0x5, 0x9, 0xaa36, 0x7ff, 0xffffffffffffffe1, 0xfffffffffffffe01, 0x3f, 0x9, 0xe6c1, 0x70, 0xdbf, 0x0, 0x10000, 0x5, 0x9, 0x4, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x20, 0xec, 0x0, 0xc0f8d091d77c4d21, 0x1, 0x3ff, 0x3ff}, r1, 0x1, 0xffffffffffffffff, 0x3) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000002300)=[{&(0x7f0000000100)="8516fb9ac045bf4ed5da3a4228b2d4cc7a42ad7187aeadc2977b55f7070875d9eb0af9d4b4aaef45f3cdd51dc048ae83c1cf18598674e29385d2636cf3e8b9daf02ec0b10b94e016f74f62126fd59414309d05a8a5b91ae070ee1424fac56132076673f03f4bde4104bb1f35d164ca42665e1570fa7032dc7b0cd301d87dd254b98f8b825238d136128ced3c1ce261fe13d257211ce2edcb4b829e88682dcedf33fc66628214510874837461c60cdbe98494468c6cd71a2f9196eaf761d75d0ce3688c02df74c981de27df4e1dcadbe66f0cef226b8240191d82", 0xda}, {&(0x7f0000000200)="190460fe5d0ff49d3347f64417a974beb80d39fa7b8ef7ab29e153782c6ce2ed0492fc7f2ace646e", 0x28}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="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", 0x1000}, {&(0x7f0000002240)="fa0979de0a93e1c47af2b571b9118946e5e97e226f77ef76b1fcacda11101bc97b52524a761fddd7f8e76fa14ea2a1b3c1c0bd7c6dfde86c97f9d388f5236c48545d06e2cfad0a02946d082297ac77489006e0133bfdbb56cbdeda52e0a7e8251d108a9f215b085ef382c6e7eace0dce378c0320ed60bae5e2a73ed916ccead16b0acbcb9d3949e1740a359a25604a8d402e7ca652376993", 0x98}], 0x5, 0x6) 08:55:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'v%th1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000004003000000000000000000", 0x28}], 0x1) 08:55:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, 0x0) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x6, 0x2b7, 0x1) 08:55:49 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) sendfile(r0, r1, &(0x7f0000000100), 0x5d5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') lseek(r3, 0x0, 0x0) exit(0x0) sendfile(r2, r3, 0x0, 0x1) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockname$tipc(r3, &(0x7f0000000200)=@name, &(0x7f0000000240)=0x10) 08:55:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x91ffffff00000000]}}, 0x1c) [ 765.599781] validate_nla: 16 callbacks suppressed [ 765.599789] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 've\nh1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000004000000000000000000", 0x28}], 0x1) 08:55:49 executing program 4: clone(0xb187fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000004c0)=0x1) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x84, r1, 0x302, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x220}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffffffffffffffb0}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004015}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x120}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xac, r2, 0x208, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xce}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1d}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xb9}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x40) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000040)={0x0, @src_change}) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f00000001c0)=0x7) exit(0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000500)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000540)=0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000580)=@assoc_value={r3}, 0x8) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 08:55:49 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/raw6\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x4, 0x6a6c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 765.744062] net_ratelimit: 12 callbacks suppressed [ 765.744070] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 765.817197] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xa0db010000000000]}}, 0x1c) 08:55:49 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540)='/dev/hwrng\x00', 0x80, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000580)={{0x5, 0x7f, 0x8001, 0xb5, 0x40, 0x800}, 0xfffffffffffffffa, 0x200, 0x3}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execveat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000100)='/selinux/commit_pending_bools\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='/selinux/commit_pending_bools\x00'], &(0x7f00000003c0)=[&(0x7f0000000200)='w%\x00', &(0x7f0000000240)='/selinux/commit_pending_bools\x00', &(0x7f0000000280)='/selinux/commit_pending_bools\x00', &(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='mime_type*]!mime_type+\x00', &(0x7f0000000380)='\x00'], 0x495d5c8854bb7afa) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="c0ceac93", @ANYRES16=r3, @ANYBLOB="00012bbd7000fbdbdf250e0000000c00010008000b0073697000140002000800030002000000080002004e22000008000400ff000000"], 0x3c}, 0x1, 0x0, 0x0, 0x48084}, 0x0) syz_mount_image$jfs(&(0x7f0000000500)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x400000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000680)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000780)=0xe8) getgroups(0x1, &(0x7f00000007c0)=[0xee00]) mount$fuseblk(&(0x7f00000005c0)='/dev/loop0\x00', &(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000640)='fuseblk\x00', 0x24, &(0x7f0000000800)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@measure='measure'}, {@obj_user={'obj_user', 0x3d, '\xf3'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x36, 0x77, 0x30, 0x7d, 0x35, 0x77, 0x77], 0x2d, [0x30, 0x65, 0x61], 0x2d, [0x38, 0x63, 0x0, 0x61], 0x2d, [0x66, 0x37, 0x36, 0x32], 0x2d, [0x0, 0x33, 0x77, 0x61, 0x32, 0x0, 0x31, 0x31]}}}]}}) 08:55:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000010000000000000000000", 0x28}], 0x1) 08:55:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 've%h1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x3e, &(0x7f0000c86000), &(0x7f0000000000)=0x15c) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$RTC_IRQP_READ(r5, 0x8008700b, &(0x7f0000000040)) [ 765.977009] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 766.005605] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000340000000000000000000", 0x28}], 0x1) 08:55:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'vet\n1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xb8ff000000000000]}}, 0x1c) 08:55:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x5b7c280c, 0x0, 0x8000000, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) r2 = shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmdt(r2) connect$nfc_llcp(r1, &(0x7f00000000c0)={0x27, 0x1, 0x2, 0x7, 0x1ff, 0x100000001, "06db35b312363a3b40bb3d6ec041bff3b5f7b608d960d33d96a107c08421f7121fab9c47a5e398a7442f8811e3a88dcf38f97f0cd28dd45fa40a02084e9118", 0x16}, 0x60) r3 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) shmdt(r3) [ 766.153626] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000006b6b6b000000000000000000", 0x28}], 0x1) [ 766.220739] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:50 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) recvmmsg(r0, &(0x7f0000006ac0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/199, 0xc7}], 0x1, &(0x7f0000000200)=""/77, 0x4d}, 0x9}, {{&(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/119, 0x77}, {&(0x7f0000000380)=""/18, 0x12}, {&(0x7f00000003c0)=""/248, 0xf8}, {&(0x7f00000004c0)=""/191, 0xbf}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/226, 0xe2}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/220, 0xdc}], 0x8}, 0x7}, {{&(0x7f0000001840)=@rc, 0x80, &(0x7f0000002bc0)=[{&(0x7f00000018c0)=""/229, 0xe5}, {&(0x7f00000019c0)=""/198, 0xc6}, {&(0x7f0000001ac0)=""/61, 0x3d}, {&(0x7f0000001b00)=""/187, 0xbb}, {&(0x7f0000001bc0)=""/4096, 0x1000}], 0x5, &(0x7f0000002c40)=""/75, 0x4b}, 0x4}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000002cc0)=""/137, 0x89}, {&(0x7f0000002d80)=""/63, 0x3f}, {&(0x7f0000002dc0)=""/144, 0x90}, {&(0x7f0000002e80)=""/51, 0x33}], 0x4}}, {{&(0x7f0000002f00)=@l2, 0x80, &(0x7f0000005440)=[{&(0x7f0000002f80)=""/76, 0x4c}, {&(0x7f0000003000)=""/214, 0xd6}, {&(0x7f0000003100)=""/4096, 0x1000}, {&(0x7f0000004100)=""/139, 0x8b}, {&(0x7f00000041c0)=""/186, 0xba}, {&(0x7f0000004280)=""/252, 0xfc}, {&(0x7f0000004380)=""/4096, 0x1000}, {&(0x7f0000005380)=""/138, 0x8a}], 0x8}}, {{&(0x7f00000054c0)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000006800)=[{&(0x7f0000005540)=""/78, 0x4e}, {&(0x7f00000055c0)=""/135, 0x87}, {&(0x7f0000005680)=""/204, 0xcc}, {&(0x7f0000005780)=""/4096, 0x1000}, {&(0x7f0000006780)=""/120, 0x78}], 0x5, &(0x7f0000006880)=""/3, 0x3}, 0x2}, {{&(0x7f00000068c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000006980)=[{&(0x7f0000006940)=""/31, 0x1f}], 0x1, &(0x7f00000069c0)=""/202, 0xca}, 0x8001}], 0x7, 0x20, &(0x7f0000006c80)={0x77359400}) sendfile(r0, r1, 0x0, 0x1) write$P9_RLCREATE(r1, &(0x7f0000000580)={0x18, 0xf, 0x2, {{0x1, 0x1, 0x6}, 0x5}}, 0x18) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x5}, 0x4) 08:55:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'vet%1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:50 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x110000, &(0x7f00000001c0)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@obj_user={'obj_user', 0x3d, '9p\x00'}}, {@audit='audit'}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xc4f87dc77b000000]}}, 0x1c) 08:55:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000010000000000000000", 0x28}], 0x1) [ 766.728054] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 766.754665] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth\n_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xdc7f000000000000]}}, 0x1c) 08:55:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000020000000000000000", 0x28}], 0x1) 08:55:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x4000000000000000, 0xfffffffffffffc59, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000040)={0x1, {0x77359400}, 0x1, 0x4}) 08:55:50 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendmmsg$alg(r0, &(0x7f0000001a00)=[{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000040)="2f2c816c9af5c978af77dd9111612aa8f6792e49d0002ea4b893d549a079c4aa3ebbdd892362d32d375af61aa49f", 0x2e}, {&(0x7f0000000080)="dc00b5f0394ad4a425053618dc2718d875023497042c50e4e5d78aadbe48dabab1b33a2631c766fe211ecc23cd3c79075dff2282492e2a4a43a34849d956ca08c2a1d2e58b95268ce3886ab3a40dc86fd19d7d015e1291149e517777441c83e2ccbf60f3a2a7e4f53f91f4488df0f9bba70aae620e60ac8ec92e0918bd98fcb2e3bf4c5304dc70b6d79922449b66380311f08261fbce86757c204a0dd913dc8dba8f28f8", 0xa4}, {&(0x7f0000000140)="12d7386d455ddae224bb263280e02304510b648298cf5883e2029d7bdcbc1ff104ed3c090d360354276f367f5bbd7550a61828fac4c8848662f5505cfa68ba398a8db316334c54b919a539b58e111bae26e544393166", 0x56}, {&(0x7f0000000200)="c4125b2fa7add3aaf3bb0725a8fefe436b4d2172c309816c76051826c7c752ec652621a150527579d1fb58ec600e91a6e1fcdbd69e225b6c0b9eb1ceea589c7c54e4ef7319dfad2779c6ca10", 0x4c}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="73e0251ebae7c147e537a4d439f9c94fe8b626c9484b624e47652b53ab304e0171adac5067d3efe5ad4106363475fa50395a89e26d1869b095c95fad60d6e999b8014130c4", 0x45}, {&(0x7f0000001300)="1442887a72251536234d9b494d532e14d34ac624935c0f0099d4c6fc82d487278c82274fabb0eb08e1782e40334692f9ae05f30a46c8d67e778fe91a63abbd8b67d279c7cbbfa47532d8ff425d6af7ed15f2f7d74d6ba5c081b2f8a68d2d40c4d552227cd584fc6279ab3ef828fd203fd8f41176696e0a43c79d0e1e0981ebbb224a698109ccf9a49318eb1ce16fc35802d674569a91e9591055fcf9857f9fcb91ae04ff092a5daa7c7ab6e61b8736ef50eaf3deaaec513a775ab7c1ad3e85bc8ae148e7fdbc22b763ff99e01bd2722b84a57b43437990901fd147b04026ab41d5", 0xe1}], 0x7, &(0x7f0000001480)=[@assoc={0x18}, @op={0x18}, @iv={0x100, 0x117, 0x2, 0xec, "07d14a8472f4e24ffaf4746f6e7235f6cb6d7e835161c935d637e8742ba8a430b4e5b342858bca87af4589f451d31c717e91433c256ea4a500cf5e4de7ca87dbcea3bbf4082b3f48aa4f163323d8bb56daaf06f6b5452aac58c9de7cbda6e5b2abbd9265bccd85ed6b7d66b1aa4115b169aad7a2a58f6609f1ccd4859a3e673506197d1993e1c0c0125fa65fd45c8b1dd5d64217cf3f7a3256ae3f3b25b8296c3d800d4358697406aee615647bc7563339debef4b3daa339b01ea304191376ad6942779894d04d74ad5a77597ed0f0ae692ca79e6129d2c4d09f6988ddf0b1a337c37cd4f4c4e714a0cf3a0e"}], 0x130, 0x4000}, {0x0, 0x0, &(0x7f0000001880)=[{&(0x7f00000015c0)="e567320fcc305fabd7677caebf60b421072f931a3bd3d607b46c25d09925fd5cb3b7b52613e0af8d2686eed15369b2f264777f841d987fceabcf7cde2a7e359cf8ac5513d31193d15a7d27c7a1cc92b5e9d2be0c78efb50b8fed01bc50c8f4f54f910dac611400abfd83861b2cc348bef8f676ef8c4eabf3bf452158", 0x7c}, {&(0x7f0000001640)="b5b25817d24199923afb7166a80d78ab70766c8ce8dd78f36007c28d13e6f2225e91c222f306a5585565c866d2e5ab54baa6b959dedd133aa60d9f80f52ce1f5401c57abd271a6d42a57739fa49edf9f40a7ac803167f1e279573b8f4b3166a4f144d2c97671cd994f4e90465a1d736f6f3c7048db45bb5b8cd24772ba6f316710ecdfe0c88463273ce41232763ca3c213d2e260b78f6bfcf05adc6686d91d0a309cbd16afa272c226f2a84ad0bcea6075b76b796265989d3a6f6e6dec8d752016f2fd579a568fc304732613c058ba0e556e405d96397f5369400e4fd80a817558e173b7fb94d829452057da098e9b4d67e932e0", 0xf4}, {&(0x7f0000001740)="846e1d32795189ab469a20c22b4c2775c2d79b6476d63d8b0379417de0c718cb8de30e17e2e43a50b4d0df1a118cb83cc6db2b8f9d5cb6a2e62a8ad00bcd431dd97c2e201e4082eca20900d165b2a7bc90f84df3512bb2be47b10da1451650d7577e6c6c24084f758144d00eb571fd3b767db7be719665af7f38d30593dbd5182d6eacdaae1b305f8b3faeb7a29e8a85f68045fcb4af3b7d74c07961e68faf99c8a3033b456b55fb9875ed751c10d532701504d089d0c850b69f01e931c30919cb41f6e256b4fc6489c19e892f4902ce207b2a2111", 0xd5}, {&(0x7f0000001840)="4a14dad912f76a909d", 0x9}], 0x4, &(0x7f00000018c0)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0xe0, 0x117, 0x2, 0xc7, "992a2ad1bcbd0f39bea37c88758ef3ce6ae0deb14627742e8bf7011e9f59f4e95163aaf40c04ccba3c9dab11a04648e4a6446da71843a0547328fb269690b3d8ac9ce86035df84b1cd059ea29d278a7c6d4756c92c4bee25ab9736bc987d6ce144c8d6ffb43c4b03cbaa9aff76c1f20053b0503d6e4b2aeba674f909257487b0e21153efd2153181fae6f8b15df793eaf19c7e3f45d15888870d11faf5f89a812e6e933712ad94c7851a32f808957fb1c52c0420c5f1e09130bd90182534583584c41f16a2dfe3"}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}], 0x128, 0x20008004}], 0x2, 0x4) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r2, 0x8}}, 0x18) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xa00, 0x0) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0x600000000000000) [ 766.921592] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x20, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="6884d52977d4a5a5d95526496202a76a29352c9d5939df68723327168697a3f50318de0778191529ff9ad802e2bcf0ee28019b9967a33b55a6ad43ce56751ebc797e5b90d511206b716ddaf91b6e7e63faea1669a57568822fc42d07d9e69070aba57101cfbc6ba6382002ca68ce5215c38ac294dbd50a8043d3eb", 0x7b, 0x6}, {&(0x7f0000000100)="f2be6fca4600c38ca328f413f6f6eb3caffb8b35643c7e131303e4b8d2b503d2661c613008a4ba11d94385eaffb2e7acaebfcb01a5d60e168376e6dfeb1422eee3383523f023f68f33b90c0e17c91c05ac3b8da3bb5787ae4da00a493376f18ecfed1b56c1be2f787b98a18fa69e6c6c29810f7047fc71e83eec5db9f997ce", 0x7f, 0x400}], 0x1, &(0x7f0000000300)={[{@part={'part', 0x3d, 0x10000}}, {@type={'type', 0x3d, "7496812f"}}, {@creator={'creator', 0x3d, "91a7864d"}}, {@umask={'umask', 0x3d, 0x6}}, {@decompose='decompose'}], [{@obj_user={'obj_user'}}, {@fsname={'fsname', 0x3d, '\xef'}}, {@fowner_gt={'fowner>', r1}}, {@euid_lt={'euid<', r2}}]}) [ 766.983248] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'vethR_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:50 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000030000000000000000", 0x28}], 0x1) 08:55:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xe0a9131300000000]}}, 0x1c) [ 767.127665] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:50 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') bind$bt_rfcomm(r0, &(0x7f0000000100)={0x1f, {0xf4, 0x7, 0x5, 0x8000, 0x800, 0x1ff}, 0x3}, 0xa) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x7fff, 0x4) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) set_mempolicy(0x8000, &(0x7f0000000040)=0xe5, 0x6) sendfile(r0, r1, 0x0, 0x1) 08:55:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x80) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xb8e, 0x4400) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000100)=0x800) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x200) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x4) accept$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) connect$packet(r2, &(0x7f00000001c0)={0x11, 0x1b, r3, 0x1, 0xffffffff, 0x6, @local}, 0x14) 08:55:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_\no_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 767.203386] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:50 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/ter\x00\x00\x00\x00\x00\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f0000000080)='net/ip_mr_vif\x00') r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r3, 0x0, 0x1) 08:55:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c) 08:55:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000040000000000000000", 0x28}], 0x1) 08:55:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x0, 0x0, 0x40100000, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x12080) 08:55:51 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1, 0x2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400000, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x2) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1000000000f1a) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 767.358478] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 767.415877] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_%o_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:51 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') write(r1, &(0x7f0000000080)="c33cb75aaa9d", 0x6) exit(0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000200)={0xb0, 0x4, &(0x7f00000000c0)="315e3b852f8d03308c3bab2e59cc390b4ed7dfa5be78356286c329816ab6a5140004a535bcbf1215f580586ed3b3aa827cd384effbfbdfa0f0774c17fe4ad99498db4a522f2435d1beb97c1c080a615d7ef22e2d1005d88e5490080be6e2e3f0296c622e4a31d188b5ddb11249e8509f389ce0058dae02b6f42b08aa9b8cf02c69bb61a52d760a8907658802f7925684368bacf3635c56e699b4bf47a9a8a4ae5ca04d6726428465aed518646581733120c3918a70a510a7f30d45c10194f5786ba374a78eac31d163f755", {0x0, 0x6000, 0x7b737771, 0x0, 0x6, 0x2543, 0x1, 0x1f}}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0xffffffff80000000, 0x4) accept(r1, &(0x7f0000000240)=@hci={0x1f, 0x0}, &(0x7f00000002c0)=0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000300)={@mcast2, r2}, 0x14) sendfile(r0, r1, 0x0, 0x1) 08:55:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000050000000000000000", 0x28}], 0x1) 08:55:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c) 08:55:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x5, 0x9, 0x3, 0x80000000, 0x2, 0x0, 0x7, 0xf3, 0x38, 0x1c4, 0x40, 0x8, 0x20, 0x2, 0x100000000, 0x7fff}, [{0x0, 0x5, 0x2, 0x8b, 0x0, 0x3, 0x4, 0x6}, {0x7474e557, 0x5, 0x9, 0x9, 0xffffffffffffffff, 0x140000, 0x0, 0x8}], "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", [[], [], [], [], [], [], [], [], [], []]}, 0x1a78) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 767.593722] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 767.610953] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c) 08:55:51 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000040)={0x100000001, "6aca975af675a8581bb20978c7a00af89f27632b524928a2141ff3eee5a38b11", 0x5, 0x1100, 0x9, 0x8000, 0x4, 0x7, 0x7fffffff, 0x2}) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000060000000000000000", 0x28}], 0x1) 08:55:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_t\n_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x73, 0x8002) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RWALK(r1, &(0x7f0000000080)={0x57, 0x6f, 0x1, {0x6, [{0x42, 0x2, 0x4}, {0x80, 0x2, 0x2}, {0x1, 0x4, 0x1}, {0x8, 0x3, 0x6}, {0x80, 0x4, 0x2}, {0x80, 0x2, 0x3}]}}, 0x57) [ 767.791904] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 767.854978] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:51 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x4) 08:55:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000070000000000000000", 0x28}], 0x1) 08:55:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/164, 0xa4) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_\neam\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c) 08:55:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7fffffff) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 08:55:51 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/fib_trie\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x800) sendfile(r1, r2, 0x0, 0x1) 08:55:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_%eam\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000080000000000000000", 0x28}], 0x1) [ 768.077012] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:55:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c) 08:55:51 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000080)='attr/current\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x7) sendfile(r1, r2, 0x0, 0x1) 08:55:51 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000100)) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000140)={0x4}) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0xc00, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x1) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) 08:55:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000090000000000000000", 0x28}], 0x1) 08:55:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_t\nam\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='rdma.current\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000540)={0xfffffffffffffffe, 0x0, 0xa153, 0xdf, 0x1, @stepwise={{0x9ae, 0x842}, {0x45969f22, 0xffff}, {0x9, 0xfffffffffffffffe}}}) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x10000, 0x0) write$FUSE_IOCTL(r2, &(0x7f00000004c0)={0x20, 0x0, 0x2, {0x30, 0x0, 0x1f, 0x9}}, 0x20) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) ppoll(&(0x7f0000000580)=[{r1, 0x400}, {r2, 0x4000}], 0x2, &(0x7f0000000600)={r3, r4+10000000}, &(0x7f0000000640)={0x5}, 0x8) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000680)={0x0, 0x80000, r1}) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f0000000700)) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f00000006c0)={r5}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xfffffffffffffff9) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000480)={0x9, 0xc887, @value=0x7}) kexec_load(0x1, 0x7, &(0x7f0000000340)=[{&(0x7f0000000080)="c5c997b6fdd9ef2427eafda465ff32", 0xf, 0x8000, 0x192c1e47}, {&(0x7f00000000c0)="a52d14", 0x3, 0xffffffffffff20cc, 0x4}, {&(0x7f0000000100)="ddd5eb64c4e82eb2ae5599b9a42e7ebeb5d59b4c3907e83b22586ce790557c09492bfef628408383", 0x28, 0x80000000, 0x9}, {&(0x7f0000000140)="af18813aafdbd60d42edea3baad46be536121ab1ccaf0a38f71f7a72", 0x1c, 0x1}, {&(0x7f0000000180)="3fe5a980abf598f09ad5a52e0da8c0994f3e98c1f505a429947fa5408b18410cf126807992b9203325931c6a9398e20859ee24849bf53bfc7fef7929d8bdf55d522f4158c6cae945600f9e0c94ade378b2e641b9c6b427f3f6827085dae7345fd4b86efc9970dc0c3bf63629e185b7e278fd00df29b5b67d9efb57c1306ca028df8184ca0962ef126b45a71eec52e6f86496c2cf63c36c55cd1abe583a7292", 0x9f, 0x4, 0x4}, {&(0x7f0000000240)="a8e57494c45c8c775fd2d8f5557e1e6ab20b57dd310b0be8f8a9e6f2ee6a6edba909b2cc43be28ded115c659c65bdc821c94c43266883210d019a88f99231d62a9dac6cf317eedfe48c6955f6529dd0dd448b69a34818c598206520d50c4a91d859e17b0197a12b01197c9482008be4911049b63818159b9b43b11b5825f0bd5a963350062892133874415c75a01550b69b9d94cead69bf5be", 0x99, 0x3f, 0x4}, {&(0x7f0000000300)="02ccd9c12af8", 0x6, 0x6, 0x3}], 0x150000) nanosleep(&(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000040)) 08:55:52 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xe, 0x81050, r1, 0x180000000) sendfile(r0, r1, 0x0, 0x1) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000040)=0x5, 0x4) 08:55:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c) 08:55:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000a0000000000000000", 0x28}], 0x1) 08:55:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_t%am\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1800000000000, 0x121882) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 768.925175] audit: type=1400 audit(1546851352.556:123): avc: denied { execute } for pid=8116 comm="syz-executor4" path="/proc/8120/coredump_filter" dev="proc" ino=132831 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 08:55:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c) 08:55:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000e0000000000000000", 0x28}], 0x1) 08:55:52 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000040)) sendfile(r0, r0, 0x0, 0x1) 08:55:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="9ef74182cdaf3d7b34c5bbf101927d41a9740c97c5178ca6879402df1f826167409e8a148ccb617e1ff33c0e36ea023694187ade267246553182b2a4e81453dc5e83e7bcc0d5829b2d44d0cc8db0c5cf2ce416b7e6f7910caf9f6839b8fe1964f27f21f273205660677425f065c62f0796a77efe443f00a4688b983dc0b5b7", 0x7f, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x80, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) 08:55:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_te\nm\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c) 08:55:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 08:55:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000100000000000000000", 0x28}], 0x1) 08:55:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_te%m\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}}, 0x1c) 08:55:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0xc5ec) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 08:55:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}, 0x1c) 08:55:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x02\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000200100100000000000000000", 0x28}], 0x1) 08:55:53 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000300)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000340)='map_files\x00') sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x82010}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)={0x5ec, 0x3f, 0x100, 0x70bd26, 0x25dfdbfe, {0x17}, [@nested={0xa4, 0x3, [@generic="ce6f88114bafae1ce4c93fcaea12d8045f4306697ca92810cd13b16d55129739148d808e59424b6ec25ac36b2a143f8a43", @typed={0x14, 0xb, @ipv6=@dev={0xfe, 0x80, [], 0xe}}, @typed={0x8, 0x5b, @pid=r2}, @typed={0x14, 0x35, @ipv6=@dev={0xfe, 0x80, [], 0x10}}, @generic="65af8c9b3e04c5c930b5b2155073a169274f56b7961c220d7638606a13f9b9135283fb165d1f0f14a8c82940081973b6d7b1b81af642d2ccbf8c1099"]}, @nested={0x90, 0x17, [@typed={0xc, 0x19, @u64=0x785d}, @typed={0x8, 0x44, @u32=0x7f}, @typed={0x14, 0x2d, @str='coredump_filter\x00'}, @typed={0x8, 0xf, @u32=0x3}, @generic="ee75937b2f67058d0229f4b3367524b94054d4dffbbf4ed48f3f9400a23713ba9ea63a666059acc4429a5ca380d1306d04bd3cec56210dc58d068d8e8bf86fd804", @typed={0xc, 0x7c, @u64=0x6}, @typed={0xc, 0x1, @u64=0x4}]}, @generic="24240da552421b833776ed123d4b59c85bd3069d97f446ca8100088c3f5755bb6ce9d346e648e5f0b70b5335ba07437a4b75c97518d8d1b5c08ea5db7d8e224392b7f36c2e1bcc78b14fe51f286608a8c6e3d239373f9075485abcd8341086ce7ee93eebdb72abdb742eb5edcaed5b0b8199b4501cb60760fc3dd2d0ec54e46e09e9073993e062e2afe93d32e10cd400f0c7b0a3e4118b1f20b6406565140c4f092ec10cce6eb4cbc7d71d5acd718b39b9b3d5d7b344fb8a", @nested={0x24c, 0x85, [@typed={0x8, 0x7, @ipv4=@local}, @generic="be5665a8ea98f15b7e968a1ea3572956649b7190221f62787fc1381b99939a6fcd810214a325ad1bf53834349bfa2cdfef357210762519137fb5f79dbbf696ffb4a04394792a4c52a6fffe5decfa76ad2512d187aacc4b2ac4077109e97f66897f9b409cf8df1e05458ce28ffd52b13da639349f2d185bf812d8508df3fc5870daeb593dc5c6aa7de540b1a73eca2499581900c58acd294df5d2f0abd16b75289ac49931448c620a0c", @typed={0x8, 0x4, @pid=r0}, @typed={0x8, 0x35, @uid=r1}, @generic="5374c3c60004209fc8e8df806d7e88c226bae6db021041818a53e8b7081f746ab6c3205f11c176cd93b97066c413d737fcaedec06635ad1702ce7ac9c6f5b06d5648501e10b1e99321173ddd61162a78225c928e54c8607476e94cec75c5dbd5cf4f0f7077a81f551520833a5e284e30a104a876c7e55620d86153453732bb98ce126f3fe9cedf8aa6ff6b4298b98f7a47dd92178fc496236c388a947896770b5ef9579f7e9eea390dddb8f57d3afcd41bf97f986e3d3c474cd691c389a9ac207c7d803d9b5849fe216af77dfc010726f7a0f5b1f40c554e2956821248018cd75ffce1aae11634", @generic="41c21d3473350e39a63f295fd63c5f368e6d7642a488058ac56dd99c28b4bf3f07720f4e838ccb25adfa05917a69fa84c01491f44d06ab64a6c24eaeecb6af4041b3a4642bf5046b143d161822720b66895dbaa882e12004e872a0c918", @generic="015bd69bf6a03506ec352f9bd1094a617ca2f26d6633a7e36960fc0894274c9344195e01fe9589a526c3b4733250af04326131db800f413bf9e9d7e8b0cb66e9"]}, @generic="41fb65572578172a82c03a093c8989e5f0e3e6dfe24e2239ae260fa22d71a62e0b31e6d8e0fc6c42a44c062e4512ec907867dcc3516b8f0f94564fc602cd2f7f8040abd51dc115b7c6a59ba52168556af777b44b0a717d5cc157801330c88bfbc8671657fa3c7da3c1353a89fa3fd1c06fe6b1db476e466c42bbce4f37861b", @nested={0x120, 0x72, [@typed={0x8, 0x2b, @u32=0xffffffffffffffff}, @typed={0x8, 0x26, @fd=r3}, @typed={0x8, 0x13, @uid=r1}, @generic="92e9b324fb4eaabdb0f6183a5fc2b922a33971454ae947369c834914f8cded3a503b99f22ae1ea217a2f8cee8ebe6b703e8a1e7b344a4d39d26bb559aa0438852a40c609206af77509127cbd20fb601e8400b39ae0b210782faf51ada843", @typed={0x8, 0x4d, @fd=r3}, @typed={0x14, 0x66, @ipv6=@dev={0xfe, 0x80, [], 0x24}}, @generic="62fa6127b2807114dfa808e16cc8327466b42fb1", @typed={0x8, 0x69, @u32=0xbfb}, @generic="000ef972bf92dd210141f3e4c3b99ec5402273d3c60fae9aba1b8efa431841f0bd0bbc4401aa5ae0dd83a98908a5e0fb10c50e931792e42e7f5a7c9e690f907dedb0b8ff6abdda961a7fda22e31ee1dfbd6d71d4c972821be0ef3b1f7f53047a73661f", @typed={0x8, 0x7a, @pid=r0}]}]}, 0x5ec}, 0x1, 0x0, 0x0, 0x4048094}, 0x4800) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r3, r4, 0x0, 0x1) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1f) 08:55:53 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fe) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/113, 0x71) 08:55:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x406, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0x4, &(0x7f00000000c0)='jfs\x00', 0xffffffffffffffff}, 0x30) sched_setparam(r2, &(0x7f0000000140)=0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc200, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000080)={0xf, 0x100, 0x4, {0x1b, 0x0, 0x1, 0x5}}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x8001) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0xfffffffffffffed2, 0x0, 0x2008000, 0x0) 08:55:53 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x81, 0x2, 0x101, 0x0, 0x1ff}) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000100)={0x28, 0x2, 0x0, {0x2, 0x2, 0x1}}, 0x28) socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r4}], 0x1, 0x0, 0x0, 0x0) r5 = dup2(r3, r4) ioctl$int_in(r5, 0x5452, &(0x7f0000e35ff8)=0x45) r6 = getpgrp(0x0) fcntl$setown(r5, 0x8, r6) fcntl$setsig(r4, 0xa, 0x15) r7 = gettid() tkill(r7, 0x102080000000015) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x7ffffffe, 0x7, 0xa000}, 0x4) exit(0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0xffffffff, 0x1, 0x5, 0x4, 0x9, 0x3, 0x5, 0x5, 0x9, 0x9ba2, 0x5}, 0xb) sendfile(r0, r1, 0x0, 0x1) 08:55:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x03\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000110000000000000000", 0x28}], 0x1) 08:55:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) 08:55:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000040)=""/248, 0xf8}, {&(0x7f0000000140)=""/1, 0x1}], 0x2) 08:55:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x04\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) lstat(&(0x7f0000001340)='./file0/file0\x00', &(0x7f0000001380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x40, 0x4, &(0x7f0000001280)=[{&(0x7f0000000080)="c3b07dbfd385a10a4cdc7160c05ee1c083971c9f3400640f225785a54e1ae983fb3cdec5cd194e850ce68e60519c14ed395efaa1a0e6203eccbc8077f50e0170509005d5b2376ede2df6b1b9", 0x4c, 0x3}, {&(0x7f0000000100)="e046a8dbc3d1de7575b8133fb4299e1e8ec9855d76039c54811142af2cdb7cb01e7b719ab16fa94dad0ad25aeb255c645edf1ad468ae98a3effa78f288afcf5f9d7d39b953dc15bcb839a86983a94a09441b9fc559273c8686ccb65525c716557aae77bb3565bfde0db5b94ff19f5867b4343de82ffc9cd0", 0x78, 0x2}, {&(0x7f0000000180)="7431761cba4ed7e984c86d7c5a88c4357d93e96864f983948401bae136e0ec43c92eb4366a8a4f6f8acc18a68f9a43a1cfd4c87f40b6cfd0df41688c82358daa9fb5f0095ddcce9309e0de4e2acc62ffb5f3bceac863b5e7e26f2c42411dab46f268170c1a30039cf1d8dbb050cf90eebaea444c65e778a3a90e2b7a68c83967532e5729aea5179d0d7a92f81c3b5a58c5281dc2dda17ec3df08f2f9bdb3c1c163361a6f0cf279e2bbd7e378834db7ef087b7ffa908eee7edf37b0406672650482d7a5354c571b5381b843d7d7766f6c90351f1866fd23a8a36c7e09d54d9a603000d6274e65c161f484a030a8d446b98976d00ede305a5625a43cbc50f6709e9da7b5d8a674c8395c85b0d936074e7fd663387f2aadfd546f366c9dd83d764fc81ef41e398e139afbfb672366d2d13c232d1d9fb855bc908fb90a2e454b612e7baffb5a5630d60febff464a416f9490f2097bdefed8920cdafeb468667dd2cfa7db66f06eac4727b1b064bdc350e55d2120dcc2444a857ad6e40b4998fb982ae9d81cd8f202820fd3087ad4c62b78b72727b4f833fa8188fdced874b9a0d377f8fa2982d1fff804692e22dc7db8f0a086314f69f518d807420d73f766bcabb190a962a0385d4a6ff6d545b2b0b7036ada350f1313794ecd0cfb3687f0ad6ee84cd6ddfbdc38db991d5c7fbdbeffebb9eff985349e520116e306c64f5d8451f6d804e76bc04ed9a8042f7697a77552d5fc7dc28940550c6b2957fda362e5d6ae1c539df1d206c3b90da9dfd52182888093e3bdb97761ca9a20c8b2bd482ee827b6d1a4d8d51e159a9e44725a1fe5a4c9e2b0ede38a53cca609e6ce25a5634509c16926352cd6c217d5487b0ef02bb250639143caeaf241cc286b919a9daf94af8bd556474d94b91047ef8b9ae4dc9d67feb2575c8ec2d262513b94fd0a53d6186d173012d5028e8b68dc1d02401ca0896ab4e4f1e687e7da74967064fa28ffe2089e3d6999f8b4c9df1ebec3c7f7aa669cd4f5c787b000f47d214fae7aea1e5799315ebdb82b175b479ef452c24b0633116a98ba9c5bfbbba110563c717fc04fef096992261735bdedc67e499c1573597257fe77f9aecdb9dfb46fdd0a0d7ad5aca1b20ee05ca88e246c2fd519d15266e33c6c03eef6af66258bb2b523bbe3b8806a0a0c1e39c3bf1ec0f95b918ee7719d87e0830930743a3fdb00c2508f83417098899457528d292cbac0042df4e31b6cf9e850e32a2a324e41e5544c677b7b6e57af7d59fe8c3dc7908ef86c6febb7dca8750e9d092548c9521dd0e6460a1917f90dae8c65d2bd619885d66c9ee3c921e8f52eea670f688a1c44848013eb4764d0a5539e2eae998ad85334b5e0862003e56182b41f738baeea6756bf5f21943eb8ade8c909c0d3fcf7f615daf3a2457e4d2a92b73ab3152a2012adf395c2fe2e3aed6aba956064e9c4edd3f5612047813e735eaaff1e78cb61bee50548c60303d4f837d5441dc38f256720940d77550abbb5c6882f29b4895af31f8287b99e3dc137493cc990cdc2a54971b40f74d2b2069ea95f204fa6c6e40f56dfe384c07685f2a0d2e3d87869b672a838a36480be3221cae964beb681295d22ea03a2ff6e09ebba57a6e338db2d1707d7d4e70e5e2c1126df2498ad057a4dd7265496a28981814a2cb2a4c48c3bac3db68a0fedca05dd9701590cdba32fbd2a3ab1a7a532471e2204ac7fe4b0052b35b033644fd8a89b9046e0fad7041c73f1e4498f11f6592dae166d2fbb7b39854c325dc71f4696153caa9b6c110e91f50069b00c0f5dae5fff9446c61cf2472253c9931e2db3132cd3f1a270d4fb5929e7fcf44428e5bea80c575fc9fd968a2585dcb0ae62d8f89c7fe7d6399ae5ded4e20ab365108668796ef1a08a70537dadb66b88bbca08d67bd4a4388431dd19e2bbf1755e63dc1b99c5c094de3d6d442eac6b523cf71775fdec4ea09db72dd9947db5b27911227140022691f2e223b0fe76f33c6a863cdb0dd9b1060c09c48ee33ac2ba8d68796939305fa2e4b76dfed5df650ec6342969058a7aa1ece39f8dfdfdcc39cb7f85539935ea8f8338956433ea1e1ecc149f1a98014c2fdecd26965a779d2baed2a68726f58fd31dc2679315df60d0016cba6b68cab73cb6f80e990a6b923c77de195445a1a17c59cda99468619f4c7a2df852dd4a67a3ae503936cca367b5db83fe5966cb01a03bfaad4e8edec78214470e46405c2bcbea77e8fee1e4e5fd44ed1b86e16589a7a93592dcf4aed5acf8e35eb1fa30a9a5b5b590662ba04c2d87ea05f5403669049d6ef6cbecd71c11bcdfa24f7a43c4df0caa9f2b2a34f5325640cc10acd2316c642cdd94f9298b2c0783cdd737c8314f467c3c17d081feaddaa747742449a341d3cfae0dff9849378c3f6f17129850af49aa9b7d55b4c2eace3db91c09d76e5219569a123635a131ba8ab1a71d8399a8450461f2861eeec11e3b1d8ad5efa73067bafa3d9d314c843a0cffb7ae05192780223cb46b3c34f7728aee3bb5957c5c004233bbd6c0f5a12a41e3f6ec47fbad58fdfc67bfa31247f2ac751775e2f7e6885f56646c7cd6cb04b42b9ae9acabfc7740172040722857940ba13bf457c95a8666b16d4a1342ac1d8b8430c28b01f5b9b8c787dd5d5fe2bc5592bdb08f766fc1a8fdb3baf5346a5b3bfd32c932d8d9d998c71fb2e9cb613aa19e4a5bd1a38edca234c4b006e4a3952f38689094a86a074a0bb17604dcf03d8eeb46462968bcc09afaeacd3b0ab978e37dc348c9822873b1e891c8f00da89b685b08ddd32c2fedb6efca2ac107ffe2e6b3b60858780b0a462f2e8febe81a43dcfbf2a943158c8b69b560697a5a59485a172b6487f5b4392b49de7860ebd9edb37538e70ea8fddfee201193d04afb2c9bf4f3c630366940a0d031b9a3fac120af947d2bd6d67ee5ee613052dec1de5b91c70d18c212d5b3aef6b1dc09a7849eab3c528f787fc8beded42c00a14229c34e760905ac947f5295ffbbd8dc50b98b37dfc9d263085bc3624d30e97caad910b4a87008173225c0fadfc95621ab10ee599463fdcad214d486e755fd7a6be0a848e8dfa7879c8e06c4a015a996042891b1b519ce193c52a09926ff5f4cb1d5d39b3fe677efce1e725000268a196991a47dd9befab1ce1f96697cd568e502c9873db8d64ca2b239d98ce219fe1ff45e3faef75f8939c4dc38e7da29571a18f09e10b433bbdb935b09c78085e2672735008fce3b7507c8c984e8394876c19778195ccb88d038bef2a77a6c75c655bb1939e5b8fecb348250bfdab206675ad5b44bd256b200c57e1c8247e1e84f419fdf1a791b9dfdc0f27990aeec94e2288ee1919d63ea58a8a000eafa933f693499b4b4b18a2c9e820895c28650d67cce7e7afa6f2dcb11cd106158bfca0cd3fbc39d8585cc1e52fffdbb84175f4b462decb0c41af37e10a8c64a54eba627c825d100ec4984dd3671e123f4b732eb29eb4222b415e177a5d00ff50a6721035dbe2e6e2b6659f075ee5f90c76f04ba1bbf84c4cda1afa2f0d28ba7b75e882fbf34463c6b268813a8ef308edb0e509320e2c38a8d781687f431a3cb264399512e340a567e8957fa5c249853f503b24ec1ec21a0197e531605f72f3b7a6d790239836932e07565a85bfd68aba996459637cd559d00ec9cc05643408d96ef0942f24f75189147c400f51552098537a84b62a99ae83a31a47f24f3752ca5d98c64f4ce017b9507d54bf900a57fee0b0b2610b330c550a8a5515cd5ec483593b70979768f9f2a8fec59a1e74bf64fb9f01ceb95da1f2e4d93e4e064d5b16a7bc83b54edb18a5b006c82f7907184292818a6c80a4f954f62538a89cbf134b8f4730bc87aa5cd5993deb4dbae2bd25858980a8008973e23d4d66108a814208ba6385bdcc6cf721d6105ac6dc3e65f2e9eb486a92a15ef8553052f9b447d36537c24fa29240b543b4291e5a1308343654c43f99de00adef1be70cfea2a420aa4f62a3d672b7ec51df33d4dc8d316c6a5f643e2e73c4cf170984bb14a0d3642388bb043b62b2b944bf74c25fa1b1f78757119615d0b3f1329467b7fdb88715bd105bd8ab38adf9b77086d1987edbcfa14df2202268c461bd8608fa684b7f34dfa5a81d17ccbcd69ab08a67086df25ac23e8991f644e2bdb718041ec1f2004ce3d31a13f5d8b75f4984aea90a5d3de655f570fab63e3cf4328beebc42a98915c7fbc6881db61be0447da8ff20c9160b3bb09caefd946f49f3c875ff081ec0f839222646b0643a51dc4eff2296005639937eaf17e88c876938c11df1555340d3b4bd5c57cac7b2b013809303ca07d6872ee86684de56b47c0691dba37b5b0268eab8750a0b7cc4e35454bafe5bd49ba0979a8b145fcecef4b67cd952d20537bcd242e2502172e78b717f8acf3a17b9c1250891fd02679b5b90c627f40579ee745bb0ec247956761be9d8141d7a374dc675f83537f76d52af91acb1f7210b72936678ee15c858fbf27903e09eba3ec629ce440f1b89fd169ce5648c9fdb4c66cbc9b2c2a8c6ed967bc2336803702712a8906e67c04e9f873af263dca0f831aff843febbb0479655e654afd0ae4c5d0187f678ae278350c260faced2bebc7f9da95467312436668e51e2f28e001d8cce25f3d833f5001e063d36a57d4d38d36b7ce140025466c3a53d294f993d7a6c6b93663647c8e86fc117a648c93b90791b22166629130c78b39a05348d196e5e0837ee64392d0a94f0a71091badb78dd16a46b0b2038d0ccb5f0dad6c7a03f107b2aa6cd9b4cf2d2c1dfd0b1d2848381eb1ef8e748348f532cef0fc9e472071dbe24d92ff0760279f46537d0d502b02e67e805d89c0bbaaf59a48ec5719e846277dce2dab71c998d2812fc0dcef54f8da2e9b289483a7e4cb66b5c6a26dc319d33fe12db48d8797aeec90039eb65cc073ccfc8fc3702f8ec993ebb8935751fc4014136361eee290c08037c5daa48e9bb81e13dae95c5f440376d217535db2cbeda5fd7de09276919143579f7115ff21dc9a2091dfc29ddb76d5fc1e55e879a66c9b162523ac89293c7d7c917fbdbe6f382338f3cbe657ef45005955f37ea04b67456d2a30526a76bc2b7527b3395282f56416a14baf98144e6dcf61fc440dbdf16aa130a1318c56825fec1e8d82cf38ff42fe7f3255614a582e56073b59c8c5a190a076f6c269b43cf2380eb6d5fdd197698ed4e29fbf2c75d58c9e2cf30d75bdf0f8280fcfbda89a4002158285393bc2f5a2fd53ad88f8108a99286dd091cf94ec7f244764aa219984721845e3c5620019faf0f0fc23eff86d8a1144765ad19cdb2c80e343e704b9c2adb6d805680826777ca245bd747150e71175cfc5477bfe540253cca2fc30add1cc1ae051117837a9412aa86c0150f94e678d20a818714c65a0060de3ac954e26fb39e8646c94a6f1da02e02725ef88a1c8799b64828f87b78ac3d5441b641654ad4680df459a26fd8ce03d73b8d35cdb5a9e08b4111f6555a299e19bb0797722d72635d0d24374bf7ea256e79ec6aa55f3e5b2642996f136a562fcc0dc5d5cd392e29bf5605977c2f702072789f4eddc4681df4cbbde541550d166b2490f37e7dea74be381dfdf03a0ab2c9cdb8907a7ed6e8f857640ee6c617cb122dab5150e95b650b508af80847af4a88f5adcf08a8011606554a0454eacfaf85123c2364bea97626f79414f1c39b5419eeddc9f01ae05d0c04c8f86f5a427130e5547f380a8ee6523bd21a9997c96d67486c79662986f88", 0x1000, 0x2}, {&(0x7f0000001180)="b72f03af3d895205437c688c3e48f464773d71752939de8e913a61aca8b9543bf0c2b8e670bf66a21e29ff3aad9a92742034881fdae96b01a332aa333f247b6c72b3054a17b37acbb408d6edba86e6815c7e77274e73402d0fae773fdf8ae4a24ee011da4426e673a271d361b92a29714853b0215db52886603c41c89fe4ed2754719d451f6304f9ba32cfb1436bb79b81ffc6977c0649dbec59a0724a813442dcb8f25ee8f3c67bf05fbd7682ecec93d1126d33e36c15d10f197aaa4020fa71b6114396cf299837e65d37eb09d3228e99b77d9997c2ea168b6fe5363248454885fe46871ca117308a09fc0e8429f2f7d49b0666d18c", 0xf6, 0x7}], 0x840, &(0x7f0000001300)={[{@delalloc='delalloc'}, {@noblock_validity='noblock_validity'}, {@noauto_da_alloc='noauto_da_alloc'}]}) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000100001200000000000000000", 0x28}], 0x1) 08:55:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c) 08:55:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x05\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 770.532015] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 08:55:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c) 08:55:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x06\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 770.690346] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 770.711421] validate_nla: 14 callbacks suppressed [ 770.711441] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:57 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x1e0, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xa8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8, @remote, 0x7ff}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x4}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x81, @ipv4={[], [], @local}, 0x8001}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff801}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}]}, @TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe376}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x517}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1, @remote, 0x5}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x8000}, 0x8d1) exit(0x0) sendfile(r0, r1, 0x0, 0x1) 08:55:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000300000000000000000", 0x28}], 0x1) 08:55:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x1, 0x0, 0x0, 0x0) 08:55:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c) 08:55:57 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3fc0000, 0x802) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1801) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\a\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000003f0000000000000000", 0x28}], 0x1) [ 773.404589] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@md5={0x1, "4f20c6ae7943f841e37ef7b124a52171"}, 0x11, 0x2) 08:55:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, 0x1c) 08:55:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\b\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:57 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000002c0)='coredump_filter\x00\x06\x19\xbe\xcdV\x1aH\xae\b\x19,\x82O\xf0\xd3\xd8\xec7j\xe6\xc1\xa9\x8a\xdf(\xf1\xe0\x01\xe8F\x8c>\x1a\xcds\xe3\xa7\x06B\xa3\xf6;\xc8\x84\xe3\xc5\xf0\xb9\x18\xeb\x87T\x900\xa2\x91\xe3\"\x91qx\x02\xcf\x1b\r\xf5\x10\x9a\x933\xd4\\{\x01J\\\x95\x1d\x92wf_t\xd6\x94\x1d\xe8\xc3?\xbd\x8a\x8b\xac\xff1\x83h\xbc\xd7a\x1dq\xd5\x05\xa6\'q\x81\b\xaf$;\x90\xa7\f\xa1') r3 = geteuid() r4 = getegid() write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x1, {0x600, {0x2, 0x2, 0x2}, 0x4, r3, r4, 0xf19, 0x7, 0x8, 0x40, 0x2, 0x7, 0x3, 0x0, 0x401, 0x9d3, 0x0, 0x1f, 0xd86, 0xf9b, 0xfff}}, 0xa0) exit(0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000001c0)={@local, @local}, &(0x7f0000000200)=0xc) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000380)={0x259, 0x1, 0x7, 0x0, 0x0, [{r2, 0x0, 0x6}, {r2, 0x0, 0xfffffffffffffffa}, {r2, 0x0, 0x5}, {r0, 0x0, 0x100000001}, {r5, 0x0, 0x3f}, {r2, 0x0, 0x7}, {r2, 0x0, 0x1000}]}) sendmsg$nl_generic(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4000000004}, [@typed={0x4, 0x12}]}, 0x18}}, 0x0) sendfile(r0, r2, 0x0, 0x1) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000240)=0xc14, 0x4) 08:55:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x406, r0) readlinkat(r1, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)=""/4096, 0x1000) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000001040)={0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat(r1, &(0x7f0000001080)='./file0\x00', 0x208040, 0x6) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000400000000000000000", 0x28}], 0x1) [ 773.593308] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\n\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c) 08:55:57 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101640, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xc7c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000600000000000000000", 0x28}], 0x1) 08:55:57 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0xffffffffffffff4c, 0x3, 0x3, 0x8, 0x0, 0xff, 0x20802, 0x3, 0x10000, 0x7, 0x0, 0x9, 0x10001, 0x81, 0x6, 0x80, 0x59a, 0x3, 0x4, 0x6, 0x4, 0xffffffffffffffff, 0x7, 0x100, 0x6, 0x40d3, 0x7f, 0x9, 0xd4, 0x1, 0x1, 0x0, 0x80000000, 0x2, 0x3ff, 0x1f, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0xe00, 0x9, 0xfffffffff04a1f83, 0x0, 0x4, 0x2, 0x400}, r2, 0x8, r0, 0x2) [ 773.738456] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\f\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000240)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x5}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0xf65, 0x10}, &(0x7f0000000140)=0xc) recvfrom$unix(r1, &(0x7f0000000180)=""/32, 0x20, 0x2102, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x1c) 08:55:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000006b6b6b0000000000000000", 0x28}], 0x1) 08:55:57 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') set_tid_address(&(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000000c0)={{0x4, 0xd}, {0x1f, 0x7}, 0x1f, 0x2, 0x100}) sendfile(r0, r1, 0x0, 0x1) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000080)={0x1, 0x0, {0x4, 0x1, 0x80000000, 0xff}}) [ 773.892057] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c) 08:55:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x0e\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:57 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x1de, 0x0, 0xfffffffffffffffc, 0x0) 08:55:57 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000000c0)=0x2, 0x4) perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x70, 0x5, 0x4, 0x400, 0x2, 0x0, 0x5de4, 0x80, 0x2, 0x9e, 0x2, 0xa902, 0x30, 0x1ff, 0x9, 0x6, 0x7fff, 0x7, 0xfffffffffffff800, 0x100000000, 0x8, 0x5, 0x7, 0x4, 0x418, 0x6, 0x502, 0x4, 0x4, 0x19, 0x692, 0x9, 0x6, 0x800, 0x6, 0x4, 0x3ff, 0x0, 0xf4, 0x2, @perf_config_ext={0x1, 0xfff}, 0x1000, 0x80000001, 0x1, 0x7, 0x1, 0x9fd, 0x8001}, r0, 0x8, r1, 0x1) sendfile(r0, r1, 0x0, 0x1) 08:55:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001180)='/dev/rtc0\x00', 0x8000, 0x0) r2 = accept$packet(r0, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000012c0)=0x14) sendmsg$can_raw(r1, &(0x7f00000013c0)={&(0x7f0000001300)={0x1d, r3}, 0x10, &(0x7f0000001380)={&(0x7f0000001340)=@can={{0x4, 0xffffffffffffff01, 0xffffffff, 0x7}, 0x4, 0x1, 0x0, 0x0, "726b3b54c4c29a50"}, 0x10}, 0x1, 0x0, 0x0, 0x5}, 0x800) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r1, &(0x7f0000000180)="57d0424569bc2e05136768d9f8299a16067b69e071da40082381ff2365e2c122332068627301b515f0e36e37a67b4d11331fefe3bd8b29c18e18182351d5f05ee30acf2a99737538b42e5f5588f2b696da6572ace29ff0daef35b9848ea60d6847e2ca6a2b74a7125f2413b8703f2f372cdd36e73ad4d0d1", &(0x7f0000000200)=""/39}, 0x18) symlinkat(&(0x7f0000000780)='./file0/file0\x00', r1, &(0x7f00000007c0)='./file0\x00') syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e21, @multicast2}}, 0x0, 0xfffffffffffffffd, 0x0, "b9f52789087a43bbca52568f997f99466f15cf2ad7be7041f58500067477cdd7687a77b687e334898a3952124570e793d1fad47897ec2daf420201387a92f720dc3947b997af3517321dea6deb2b11e6"}, 0xd8) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) syz_mount_image$jfs(&(0x7f0000000280)='jfs\x00', &(0x7f00000002c0)='./file0\x00', 0xffffffff, 0x6, &(0x7f0000000640)=[{&(0x7f0000000300)="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", 0xfa, 0x1d06ad53}, {&(0x7f0000000400)="e519b57230d9fc42d6d5629bdb14df42e54e9941eb094349cb5d68dbb3caf9301925762114a94d", 0x27, 0x80}, {&(0x7f0000001400)="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", 0x1000, 0x94}, {&(0x7f0000000440)="26f2dfe869e9b68d9c8c2a59d30650f61fbc5eafc5cef40938ce278b6d5458a1c2df343637aa2951a8cb7dfc5c98cd338cfab558635100f812fe4c09c6e919815e287247e57eac29bb41b6f6f9162a254af30dd7fcac0b952c07b1b1ba26407b3d397b7474336a2c258fa03e28f62d3adf27de6fe987647bee066e6b7861bf76f62ac96282479ce15c347086fb40409dd859bb7dc2ac58ca54f8b3c3e334d31b5fb5011b8c88cc84b8e1157d42db15e908755e193924b62e63ab42329c0e9fb9a57920fc28c20f907b22dc3a43e392883f24a0ed3258a8ead389", 0xda, 0x1ae}, {&(0x7f0000000540)="bac34add00f271070de35b049338c43cb6dbaa1b974355c7f7b724bf20c3188dad014b14d483ba9ca8a76b703797fe2baee0b5cb867c06c495", 0x39, 0x5}, {&(0x7f0000000580)="481e1cbad6ad010000df8f3a899111767b5b9216af74a4928e466186203c42a0c2ac5b78650bcf4dc3fcd1be806a57bb300e2a883b31f1f25c7279ec196655728aa898fc7cfd8ea286adf7e25b581e6959f272e70011ee58ec8271c52e137987e0ad6ac0c42475d87e5bd883295dabeebd14d436d923c5245f5b34fd49e0414fa335ee1326", 0x85, 0x1000}], 0x20040, &(0x7f0000000700)={[{@umask={'umask', 0x3d, 0x101}}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@seclabel='seclabel'}]}) [ 774.056893] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000780000000000000000", 0x28}], 0x1) 08:55:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c) 08:55:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = accept4(r0, &(0x7f0000000000)=@tipc=@id, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x9e0f, 0x9, 0x9a41}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x9}, &(0x7f0000000180)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x0f\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 774.130958] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:57 executing program 4: clone(0xa000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)='coredump_filter\x00'}, 0x30) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000040)='com\x86\x00\'b$C\xac\xbdR\xb00\xb9\x93\xc7\xc7\x14\x14\rY\xff\xff\x00\x00\xdc\x12\x1e3\x1f\r[\x1b|{\x067\x04\x94\x13j,\x8b\x89\xa5\xd3v\xf8\xa2\xcc+\xf8\x92/gC\xb9\x95\xf8\xc9\xd1\x89\bh\x13\xa7\xe5\xee\xacvS\xc8\xf1\x84\xb9C\xd9\xd0\xd7t\x16\x86t\"\xc86HS\xb9\x8d\x97\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r2, 0x0, 0x1) 08:55:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000007e0000000000000000", 0x28}], 0x1) 08:55:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c) [ 774.239537] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x10\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:57 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000007f0000000000000000", 0x28}], 0x1) 08:55:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_teamH\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 774.383044] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$cont(0x20, r1, 0x9, 0x3) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0/file0\x00', 0xe, 0x2) 08:55:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x1c) 08:55:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000ffffff8d0000000000000000", 0x28}], 0x1) [ 774.494525] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_teamL\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x54]}}, 0x1c) 08:55:58 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x400) connect$bt_rfcomm(r0, &(0x7f0000000100)={0x1f, {0x0, 0xa9, 0xff, 0x2, 0x34b}, 0x6}, 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') getsockname$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10) exit(0x0) sendfile(r1, r2, 0x0, 0x1) 08:55:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team`\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000005dc0000000000000000", 0x28}], 0x1) 08:55:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c) 08:55:58 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x5, 0x8000, 0x7f, 0xfffffffffffffffd, 0x0, 0x10001, 0x20, 0x0, 0xff, 0x10000, 0x1000, 0x1000, 0xffffffffffffffff, 0x9, 0xf5b, 0x0, 0x3bc7, 0x3, 0x6, 0x6, 0x8, 0x4, 0x7, 0x9, 0xfff, 0x401, 0x7, 0xfff, 0x5, 0x6, 0x1, 0xfff, 0xc3c2, 0x87c, 0x2, 0x5, 0x0, 0x918, 0x3, @perf_config_ext={0x3, 0x9}, 0x4, 0x38000000, 0x7, 0x7cb3c722331ee297, 0x226, 0x7ff, 0x8000}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$KIOCSOUND(r0, 0x4b2f, 0x80000001) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x1b87fac60b7b2e49, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000000) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_teamh\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:58 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2040, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80040, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x2, 0x0, 0x0, 0x2001000, 0x0) 08:55:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c) 08:55:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_teaml\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000e00000000000000000", 0x28}], 0x1) 08:55:58 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000040)) 08:55:59 executing program 5: r0 = dup(0xffffffffffffffff) statx(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x802, &(0x7f0000000040)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000140), 0x1000) 08:55:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}}, 0x1c) 08:55:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_teamt\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000fffffff50000000000000000", 0x28}], 0x1) 08:55:59 executing program 4: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, 0x0, 0x1) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) 08:55:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_teamz\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000fc0000000000000000", 0x28}], 0x1) 08:55:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}}, 0x1c) 08:55:59 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1, 0x102) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000000c0)={"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"}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:55:59 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/76) clone(0x42080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r1, 0x0, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000000c0)) 08:55:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\xf0\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x397, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="f84bf568eb2a0ce90f04ac318d0adbfa6ec07780b086a6a8a3a1bf2d846ad9344416676ff35f50dfd0c5f6bf550f4fab3a4fd8395b953d6ff2db70503c2cfe0b6c57a0b4e2b40dc3f704935b7aaad6fbbb6a3c9dd16a523ba79acd3fe5acf4616a62ee01ded263529d8f5e1f60fc23bc3e2270", 0x73, 0x401}], 0x2000c8, &(0x7f0000000140)={[{@biosize={'biosize', 0x3d, 0x100000001}}, {@swidth={'swidth', 0x3d, 0x7}}, {@swidth={'swidth', 0x3d, 0x3}}, {@logbufs={'logbufs', 0x3d, 0x7}}, {@sunit={'sunit'}}], [{@measure='measure'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 08:55:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000080fe0000000000000000", 0x28}], 0x1) [ 775.757717] IPVS: ftp: loaded support on port[0] = 21 08:55:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}, 0x1c) [ 775.790925] validate_nla: 7 callbacks suppressed [ 775.790933] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x03\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000c0fe0000000000000000", 0x28}], 0x1) 08:55:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x5e, "1eadf24ad6388bafd9689b39b0eb70168db436a18e0d9fade998956dfbff15459ebfce50ffee7efa18c349a904c8064234e6e14695321ff0fc11df3a5d2d75d590ef0934c65aa159f1afff8959c721e38de64f3bee91d1a5bef86ab1522a"}, &(0x7f00000000c0)=0x66) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x45}, &(0x7f0000000140)=0x8) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 775.940330] net_ratelimit: 6 callbacks suppressed [ 775.940338] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 775.965643] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:55:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x05\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:55:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c) 08:55:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000fffffffe0000000000000000", 0x28}], 0x1) 08:55:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000300)) r2 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0xd76, 0x40) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f00000003c0)=0x20) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x8000, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap='mmap'}, {@version_L='version=9p2000.L'}, {@cache_none='cache=none'}, {@msize={'msize', 0x3d, 0x5}}, {@access_client='access=client'}, {@version_u='version=9p2000.u'}, {@access_uid={'access', 0x3d, r3}}, {@noextend='noextend'}, {@debug={'debug', 0x3d, 0x7ff}}, {@aname={'aname', 0x3d, 'jfs\x00'}}], [{@hash='hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'jfs\x00'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@appraise='appraise'}, {@context={'context', 0x3d, 'sysadm_u'}}]}}) [ 776.134984] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 776.523432] IPVS: ftp: loaded support on port[0] = 21 08:56:00 executing program 4: clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x2000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000200)=0xc) exit(0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x401, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000003c0)={'icmp6\x00'}, &(0x7f0000000380)=0x1e) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={r3, 0x10001, 0x30, 0xffff, 0xffff}, &(0x7f0000000140)=0x18) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r4, 0x5606, 0x10000) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000340), 0x4) ioctl$TCXONC(r0, 0x540a, 0x0) sendfile(r1, r2, 0x0, 0x0) 08:56:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x4) 08:56:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000ff0000000000000000", 0x28}], 0x1) 08:56:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x06\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c) 08:56:00 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000240)={0x200, 0x1ff, 0x5, 0x2d, &(0x7f0000000040)=""/45, 0xb1, &(0x7f0000000080)=""/177, 0xf7, &(0x7f0000000140)=""/247}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 776.749502] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 776.789464] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}, 0x1c) 08:56:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\a\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000008dffffff0000000000000000", 0x28}], 0x1) 08:56:00 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x8001, 0x80) getpeername$llc(r0, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_buf(r1, 0x6, 0xd7c02785daf5e20a, &(0x7f0000000340)=""/64, &(0x7f0000000380)=0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x400001) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000240)=""/172, &(0x7f0000000300)=0xac) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000040)="eb2eeed252847258635711d1b6354c5fa20d4e0aeeeda3a941f77e353a3c684be75b3c02281b893333b4ad0f8f4c584f4dd764c5563a154188c5155fe7c77460a69855070b1253324a6913dd903d80a5cfe782ba852a3cf80e7f5763b1777827c46bab933d835ccfdacef209cde90ca6620066c427d15427bc53f9ac45ba5cd1fdd210a3df085a1547d385d43257d9a00e838960d88073ce6b856796e63a08c782b997676ed3b2236086c686d1e395b8a7a75dc7b54512cb4c716b955877722130e43ee2025c2fd14765245aeb6c31c3b271b390c52a66f6cf06221a52861f9f3384712218d4358b") ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000400)={0x34, 0x0, &(0x7f00000003c0)}) [ 776.967436] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/61) 08:56:00 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000f5ffffff0000000000000000", 0x28}], 0x1) [ 777.015868] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:01 executing program 4: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x44200, 0x0) mq_timedsend(r0, &(0x7f0000000280)="506018cf1c252690a94aa14e7d585b1b6c8b1891feedb0ee4491385b2b8f9645dfde92dd62d07599e7f064af3af0ea7cb5c4b68a5073cfc18c6f4ce2999a8203e6d0035e340711d2a5295f56a8150d5fdaf39b64d3864eb6631f5e331137998d1e3be8cf458624a3a42e554d10d15c47d5a5872c7def5e2dc6adf2", 0x7b, 0x7fffffff, &(0x7f0000000300)={0x77359400}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="ffff001e", @ANYRES16=r2, @ANYBLOB="000329bd7000fcdbdf250600000008000500020000000800040006000000200002001400010000000000000000000000ffffffffffff0800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x20008040}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0385720, &(0x7f0000000040)={0x0, {0x0, 0x989680}, 0x8, 0xdef3}) exit(0x0) sendfile(r3, r3, 0x0, 0x100000000) 08:56:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_teamI\a\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c) 08:56:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000feffffff0000000000000000", 0x28}], 0x1) 08:56:01 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000080)="311f7a00839ef4fe90eb5144700f44e6130d61b1d452bfb7cc8e73f27200951f4ecd448dfe40486af71d15cec0b964edf50719478822b68723ac1e433eec5550bc7fc30a503f76b5b31b022fa7de3ef9ff56793f5f1bf91323b14f09e7ffa480f50fc43c5e61bd61e8b74472a14b8727e5ea54f3d63548c0b8a8cb30e9b3d070c0852fe2a4a28a557d3cbdf08d6b91c48a4f602879096631294a42687f9bc136eed874f5bf8ae4391ee9075d8a88a9353f30407295c7d0b5c7e61a8b6018fb1d2fb0ef87a70f8bcadfe9902d85e787eb15d01f6e249b44a6c5f45d70de684a1401a723fe3712225d4f81055f1f4611b8e95597c72de295", 0xf7, 0x7fff}, {&(0x7f0000000180)="7e44a32877df445de05a1db84d7e71a79eccedbae530935569f3da532343739684a36c8011d0757bf5eefe15dc0aaafa82", 0x31, 0xf2}], 0x10000, &(0x7f0000000200)={[{@nodots='nodots'}, {@fat=@time_offset={'time_offset', 0x3d, 0x20d}}], [{@appraise_type='appraise_type=imasig'}, {@obj_role={'obj_role', 0x3d, 'jfs\x00'}}, {@subj_role={'subj_role', 0x3d, 'jfs\x00'}}, {@seclabel='seclabel'}, {@dont_hash='dont_hash'}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'P{/securityvmnet1bdevcpuset}'}}, {@measure='measure'}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f00000002c0)='./file0\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0) 08:56:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x10000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000080)={0x3, 0xffffffffffffff9c}) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000040)={0x9, 0x3b8}) [ 777.711615] FAT-fs (loop5): Unrecognized mount option "appraise_type=imasig" or missing value [ 777.717354] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 777.725951] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\n\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) 08:56:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000040000000000", 0x28}], 0x1) [ 777.872917] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\f\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:01 executing program 3: setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f00000000c0)={{&(0x7f0000000040)=""/1, 0x1}, &(0x7f0000000080), 0x4}, 0x20) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x6, 0x70, 0xffffffff, 0x5, 0x7, 0x47d, 0x0, 0x10001, 0x80, 0x6, 0x3, 0x6, 0x3, 0x9, 0x1adc, 0x9, 0x0, 0x7fffffff, 0x0, 0x1, 0x10000, 0x4, 0x805d, 0x9, 0x6, 0x0, 0x8, 0xfff, 0x1, 0x10001, 0x0, 0x8000, 0xfffffffffffffffc, 0x40, 0x4800, 0x2, 0xffffffffffff0001, 0xb28, 0x0, 0x1, 0x1, @perf_config_ext={0x400, 0x6}, 0xaa1, 0x2dde, 0xfff, 0x0, 0xbaf, 0xa7b1, 0x2}, r0, 0x4, r0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7fff) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)={0x3, @null, r2}) setfsuid(r2) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x557, 0x200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r3, 0xc0045540, &(0x7f0000000240)=0x1) 08:56:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000100000000000", 0x28}], 0x1) [ 777.957416] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 777.975687] FAT-fs (loop5): Unrecognized mount option "appraise_type=imasig" or missing value [ 778.025543] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:02 executing program 4: r0 = open(&(0x7f0000000000)='./file1\x00', 0x400043, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) close(r0) prctl$PR_GET_TIMERSLACK(0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001f00)={0xffffffffffffffff}) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x0, 0x0}, 0x10) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) accept$unix(r1, 0x0, 0x0) 08:56:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c) 08:56:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000100), 0x84000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000040)="2b0bf952b5bb017ad848487281e50a5caffcbd36eb155e22c98f08102af9a2bb57c631296887907464f4d8604d4bd70675d93268b153980e765add64b0c68614c12fcf1c5ebef4affc32b7ed629df2aae777edd72d7ef282a8e63d37b13e3a33197e6eb23017d7cdcc2b9d314a73d45fa8d846516c768d2f") syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f00000000c0)={0x4000, 0x5310, 0xffffffffffffff7f, 0x8}) ioctl$VT_RELDISP(r1, 0x5605) 08:56:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x0e\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000003400000000000", 0x28}], 0x1) 08:56:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000000), 0xfffffffffffffec1) 08:56:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000006b6b6b0000000000", 0x28}], 0x1) [ 778.743242] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 778.759014] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x0f\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = epoll_create(0xf5) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c) 08:56:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000100000000", 0x28}], 0x1) [ 778.950978] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}}, 0x1c) [ 779.312367] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000200000000", 0x28}], 0x1) 08:56:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) sendmsg$nl_generic(r1, &(0x7f0000000680)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000640)={&(0x7f0000000240)={0x3e0, 0x1e, 0x401, 0x70bd2c, 0x25dfdbff, {0x8}, [@typed={0x14, 0x7d, @ipv6=@dev={0xfe, 0x80, [], 0x28}}, @generic="09b40c30a0250923396b24b925", @nested={0x2b0, 0x33, [@typed={0x14, 0x57, @ipv6=@mcast2}, @generic="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", @generic="ace7bfff6395b15bffb6edc56a72a188daac2749e1ec3570a5cc3dd28a5d0a64e75b2e7e5ce5c5c461ced7b06fbd6d7c96dc9830807a9f6d2936f8f3894a3551dda7f70e29f9b976f712a8b890548a3bb41d370c500559ceb3a42b0520b05f67b90ed43feb1c6b72dfebdf6d901361d2abdb68d0b3ac02bd23dc6c21479d2d2cb4b8b639d53e050a9a39e662876eea7dfef92cf0c223e879c1a06757523cf4c4a0dce286546cd85e09596ed59096a7fe2bc9a514c9d57941984681eec36a1161ecdb31bc83e03f211464f97d301fc043f8", @generic="f40bd38032e427b99ef2b04149522902f02f23663fe247cfcb411e1d44961609b2c74d460334117923e5e976cef9700765a6cb92844330c74cc32180d6ab02add81287ad90eabf5cd297f89ba913f1074f1def1b73c096358b1f5bc1847d4367ac6aef79d1916efcb992f6d8a05001dd8b8f948ffaabcdf84720959039b6e1f3c8714ee3a388d8c8f68e6ff0b0ac4285a16942341ab359700f4674afe2b98796d1d5f0b2a24d6a69f06df511c2183a4f31e34364ab1b1b2adf47d1448bc4719c0af87dbce14f385598"]}, @nested={0x9c, 0x2, [@generic="9e61316aaf599a9aef43d29986dee0d3980080cf2e3238494ccee3d114dfc3edb3569c198c28e18b69713fc35d5fe958170ea7184990bb314f61efc38731e10e9de1cdcc8c57d35fd4e3e92d407c203fbdfd26792f0f498bb5b6f44f527759ebf67846cf4716", @typed={0x30, 0x7a, @binary="4e47be6bb267376a9740ad583aefd562ab0ed087cb2f275e7197b17e4d6faa39d3f76bad855a1247c95ae2"}]}, @typed={0x8, 0x13, @uid=r2}, @nested={0x54, 0x9, [@typed={0x8, 0x81, @uid=r3}, @generic="e37b969a528079fdd9265de98ced5b48bacad1506c9ba40ea4741599afeb83d39a95c46e74ce8908c8aa220a7c0f2e948d096bb985eddd", @generic="90d169676edadb5f3e0c65c9c0402913e2"]}]}, 0x3e0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000011) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x5) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:03 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c0425000000000000003529ae7cd2f600d100001751af0769aef32f4a95ce", @ANYRES32=r1, @ANYBLOB="0b00f3fff3ff05000f000f000800050004000000"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000001) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x0) 08:56:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}, 0x1c) 08:56:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00 \x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:03 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000dc0)=[{&(0x7f0000002600)="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", 0x444}], 0x1) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)) 08:56:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000300000000", 0x28}], 0x1) 08:56:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00?\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 779.912079] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}, 0x1c) 08:56:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup3(0xffffffffffffff9c, r0, 0x80000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0xffff, @mcast2, 0xff}, @in6={0xa, 0x4e24, 0x1, @loopback, 0x5}, @in={0x2, 0x4e23, @empty}], 0x48) accept4$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x80800) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0xfffffffffffffe30, 0x0, 0x0, 0x0) 08:56:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x7d, @mcast1, 0x1}}, 0xfffffffffffff800}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x2}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x3, 0x80400) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000480)={r1, @in={{0x2, 0x4e23, @empty}}, 0x9, 0x3}, 0x90) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@multicast1, @in=@multicast1, 0x4e21, 0x10000, 0x4e23, 0xff, 0xa, 0x20, 0x20, 0x3b, r3, r4}, {0x7fff, 0x9, 0x6, 0x2, 0xfffffffffffffffd, 0x100000001, 0x0, 0x3f}, {0x0, 0x40, 0x100000001, 0x2}, 0x4, 0x0, 0x2, 0x1, 0x1, 0x3}, {{@in=@rand_addr=0x52, 0x4d3, 0x6c}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3506, 0x1, 0x2, 0x80, 0x3, 0x9, 0x5}}, 0xe8) 08:56:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000400000000", 0x28}], 0x1) [ 780.100971] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 780.269496] IPVS: ftp: loaded support on port[0] = 21 [ 780.393032] chnl_net:caif_netlink_parms(): no params data found [ 780.450576] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.458830] bridge0: port 1(bridge_slave_0) entered disabled state [ 780.467680] device bridge_slave_0 entered promiscuous mode [ 780.496211] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.502586] bridge0: port 2(bridge_slave_1) entered disabled state [ 780.511398] device bridge_slave_1 entered promiscuous mode [ 780.536324] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 780.559646] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 780.583643] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 780.592959] team0: Port device team_slave_0 added [ 780.600245] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 780.611021] team0: Port device team_slave_1 added [ 780.622221] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 780.657105] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 780.717234] device hsr_slave_0 entered promiscuous mode [ 780.754279] device hsr_slave_1 entered promiscuous mode [ 780.804534] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 780.811506] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 780.865893] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 780.912219] 8021q: adding VLAN 0 to HW filter on device bond0 [ 780.921962] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 780.933770] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 780.942197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 780.958600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 781.010076] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 781.029745] 8021q: adding VLAN 0 to HW filter on device team0 [ 781.051452] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 781.067947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 781.082086] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 781.099550] bridge0: port 1(bridge_slave_0) entered blocking state [ 781.105981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 781.127104] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 781.186304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 781.193437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 781.212465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 781.222401] bridge0: port 2(bridge_slave_1) entered blocking state [ 781.228806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 781.247398] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 781.265708] device bridge_slave_1 left promiscuous mode [ 781.271383] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.340521] device bridge_slave_0 left promiscuous mode [ 781.352922] bridge0: port 1(bridge_slave_0) entered disabled state [ 781.598905] device hsr_slave_1 left promiscuous mode [ 781.665670] device hsr_slave_0 left promiscuous mode [ 781.720433] team0 (unregistering): Port device team_slave_1 removed [ 781.760559] team0 (unregistering): Port device team_slave_0 removed [ 781.789296] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 781.855713] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 782.090065] bond0 (unregistering): Released all slaves [ 782.254248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 782.265031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 782.283897] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 782.291151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 782.300638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 782.318495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 782.335661] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 782.354564] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 782.361513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 782.378524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 782.392644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 782.410587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 782.421687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 782.442040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 782.466750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 782.484461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 782.493640] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 782.508843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 782.656388] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 782.669847] 8021q: adding VLAN 0 to HW filter on device batadv0 08:56:06 executing program 4: 08:56:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00H\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000500000000", 0x28}], 0x1) 08:56:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c) 08:56:06 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x103040, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8001, 0x321440) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0xd, 0x33, 0xe, 0x6, 0x6, 0x4, 0x0, 0x15e, 0xffffffffffffffff}) [ 782.916989] validate_nla: 2 callbacks suppressed [ 782.916997] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 782.918162] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000600000000", 0x28}], 0x1) 08:56:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}}, 0x1c) 08:56:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\aI\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:06 executing program 4: 08:56:06 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0xc01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f00000002c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e24, 0x441, @empty, 0x2}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000340)={0x11, 0x10, 0xfa00, {&(0x7f0000000280), r2}}, 0x18) bind$ax25(r1, &(0x7f0000000040)={{0x3, @default}, [@default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x200000, 0x0) acct(&(0x7f00000000c0)='./file0\x00') syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x44029d31, 0x105400) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f00000001c0)={0x1, 0x6, 0x0, 0x40, '\x00', 0x1f}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x3, 0x8, 0x7, 0x101}]}) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xd87, 0x400000) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200000, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x80000000, 0x8, 0x1, r2}) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 783.153753] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 783.180352] audit: type=1326 audit(1546851366.816:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8758 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0x0 08:56:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000700000000", 0x28}], 0x1) 08:56:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5400]}}, 0x1c) 08:56:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) uname(&(0x7f0000000100)=""/110) r1 = dup2(r0, r0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f00000000c0)="3666440f50f564ff0941c3c4a1796ec1c0c27d794e0066d742421be2e3e30f1110c442019dccc4c105d0da3e470f01d4") clone(0x2002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000380)=[@window={0x3, 0x0, 0x800}, @mss], 0x2037) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080), 0x4) 08:56:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00L\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x80000, 0x0) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='.\x00', 0x200) inotify_rm_watch(r1, r2) 08:56:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000800000000", 0x28}], 0x1) [ 783.352956] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 783.384678] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7fdc]}}, 0x1c) 08:56:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_teameX\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000900000000", 0x28}], 0x1) 08:56:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00`\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 783.630663] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 783.783864] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 783.970843] audit: type=1326 audit(1546851367.606:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8758 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0x0 08:56:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0) 08:56:07 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x6, 0x80000000, 0xcc}}, 0x30) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x1c) 08:56:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000a00000000", 0x28}], 0x1) 08:56:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_teamXe\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:07 executing program 4: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") sched_getattr(0x0, &(0x7f0000000080), 0x30, 0x0) mknod(&(0x7f00000015c0)='./file0\x00', 0x8, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) write$apparmor_exec(r1, 0x0, 0x0) [ 784.101604] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000e00000000", 0x28}], 0x1) 08:56:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xb8ff]}}, 0x1c) 08:56:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00h\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)={0xfffffffffffffffb, 0x40, 0x7, 0xae9, 0x8, 0x7}) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "f955c2e79a68a78c1a36ee91805098be9591b1c8"}, 0x15, 0x3) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 784.316143] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6, 0x101080) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000040)) 08:56:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00l\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000001000000000", 0x28}], 0x1) 08:56:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c) 08:56:08 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/76) clone(0x42080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r1, 0x0, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000000c0)) 08:56:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x9, 0xa400) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000100)=0x1) accept4$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x80000) bind$can_raw(r1, &(0x7f0000000280)={0x1d, r2}, 0x10) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffffffffffffff01, 0x40000) connect$unix(r3, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 08:56:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000001100000000", 0x28}], 0x1) [ 784.550069] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f]}}, 0x1c) 08:56:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00t\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x1, 0x2, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'nr0\x00', 0x2}, 0x18) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x200, 0x0, 0x0, 0x0, 0x0) [ 784.676822] IPVS: ftp: loaded support on port[0] = 21 08:56:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001600)='/dev/vsock\x00', 0x20040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001640)={{{@in=@empty, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000001740)=0xe8) connect$can_bcm(r1, &(0x7f0000001780)={0x1d, r2}, 0x10) [ 784.739362] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c) 08:56:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00z\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000001000012000000000", 0x28}], 0x1) [ 784.929024] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c) 08:56:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000003000000000", 0x28}], 0x1) 08:56:09 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/76) clone(0x42080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r1, 0x0, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000000c0)) 08:56:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x81\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101, 0x0) write$vhci(r1, &(0x7f0000000080)=@HCI_EVENT_PKT={0x4, "ed15cd498fa3bc1502d5c73d06b0ef28ccc9e6d19f11dd682713e118fb2b01362380e046e807fd7dd1ad40b66780dc00108919baa85d9c154e05f4db5d6ee47e5ba2f044144bee0206c38f7a25a3cc9d77af5c"}, 0x54) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c) 08:56:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 08:56:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000003f00000000", 0x28}], 0x1) 08:56:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xf0\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 785.547578] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c) 08:56:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000004000000000", 0x28}], 0x1) [ 785.642916] IPVS: ftp: loaded support on port[0] = 21 08:56:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000280)={0x1, 0x1, 0x5, 0x6, 0x680, 0x144d, 0x1000, 0x20}, &(0x7f00000002c0)={0x4, 0x8, 0xe0, 0x6, 0x100000000, 0x0, 0x3f, 0x4}, &(0x7f0000000300)={0x0, 0x10dc00000000000, 0xfffffffffffff801, 0xee11, 0x734, 0x7, 0x3}, &(0x7f0000000340)={0x77359400}, &(0x7f00000003c0)={&(0x7f0000000380)={0x60}, 0x8}) r1 = syz_open_dev$radio(&(0x7f0000000480)='/dev/radio#\x00', 0x2, 0x2) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x480000, 0x0) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f0000000240)={0x0, 0xab, 0x2, [], &(0x7f0000000200)=0x2b4}) ppoll(&(0x7f0000000000)=[{r0, 0x4010}, {r0, 0x120}, {r0, 0x6400}, {r0, 0x10}, {r0, 0x1000}, {r0}, {r0, 0x52}, {r0, 0x8}, {r0, 0x40}], 0x9, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0)={0x8}, 0x8) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000440)={0x0, 0x4, 0xeed7, &(0x7f0000000400)=0x1}) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f00000004c0)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000100)={0x7f, {{0x2, 0x4e21, @remote}}}, 0x88) 08:56:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000100)={0x41, &(0x7f0000000080)=""/65}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x2accc2b, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) 08:56:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000006000000000", 0x28}], 0x1) 08:56:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c) 08:56:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0x6858, 0x4, 0x6, 0x80000000, 0x2, 0x8000, 0x8001, 0xfffffffffffffff9, 0x2, 0x80000001, 0x3, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:10 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x33a, 0x0, 0x8000000000000, 0x0) 08:56:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000007800000000", 0x28}], 0x1) 08:56:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\xff\xff\xf0'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:10 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/76) clone(0x42080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r1, 0x0, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000000c0)) 08:56:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000007e00000000", 0x28}], 0x1) 08:56:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2180c0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x50000, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c) 08:56:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 786.619652] IPVS: ftp: loaded support on port[0] = 21 08:56:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000007f00000000", 0x28}], 0x1) [ 786.704041] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:11 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/76) clone(0x42080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r1, r1, 0x0, 0x1) 08:56:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}}, 0x1c) 08:56:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) 08:56:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000ffffff8d00000000", 0x28}], 0x1) 08:56:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KVM_SET_DEBUGREGS(0xffffffffffffffff, 0x4080aea2, &(0x7f0000000040)={[0x100000, 0x0, 0x10000, 0xf000], 0x20, 0x2, 0xd0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) chown(&(0x7f0000000100)='./file0\x00', r1, r2) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0) ioctl$SIOCRSGL2CALL(0xffffffffffffffff, 0x89e5, &(0x7f0000000300)=@netrom) 08:56:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000005dc00000000", 0x28}], 0x1) 08:56:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xffb8]}}, 0x1c) [ 787.518816] IPVS: ftp: loaded support on port[0] = 21 08:56:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x34, 0x10, 0x4, 0x1ff}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e21, 0x2, @local, 0x101}}, 0xf0bd, 0x7fff, 0x2, 0x200, 0xd3af}, &(0x7f0000000180)=0x98) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4eb) 08:56:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0/file0\x00', 0x200, 0x2) write$vnet(r1, &(0x7f0000000180)={0x1, {&(0x7f0000000040)=""/225, 0xe1, &(0x7f0000000140)=""/13, 0x1, 0x2}}, 0x21d) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) connect$rose(r1, &(0x7f0000000240)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) 08:56:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000000e000000000", 0x28}], 0x1) 08:56:11 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/76) clone(0x42080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) 08:56:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1dba0]}}, 0x1c) 08:56:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000fffffff500000000", 0x28}], 0x1) 08:56:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ftruncate(r0, 0x0) close(r0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x1f) 08:56:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x5) r1 = fcntl$getown(r0, 0x9) r2 = getuid() ioprio_set$uid(0x3, r2, 0xffffffff) ptrace$getenv(0x4201, r1, 0x200, &(0x7f0000000040)) 08:56:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2(&(0x7f0000000000), 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000000fc00000000", 0x28}], 0x1) 08:56:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}}, 0x1c) [ 788.469442] IPVS: ftp: loaded support on port[0] = 21 08:56:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000080fe00000000", 0x28}], 0x1) [ 788.569764] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 788.603606] validate_nla: 8 callbacks suppressed [ 788.603640] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c) 08:56:12 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7fff) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 788.808648] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:12 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/76) clone(0x42080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) 08:56:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x980, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x54) 08:56:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000c0fe00000000", 0x28}], 0x1) 08:56:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x50000]}}, 0x1c) 08:56:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) poll(&(0x7f0000000000)=[{r0, 0x100}, {r0, 0x2}, {r0, 0x1207}, {r0, 0x4208}, {r0, 0x500}, {r0, 0x2}, {r0, 0x3020}, {r0}, {r0}], 0x9, 0x6) [ 789.299753] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000fffffffe00000000", 0x28}], 0x1) 08:56:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x1c) [ 789.456132] IPVS: ftp: loaded support on port[0] = 21 08:56:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000000ff00000000", 0x28}], 0x1) 08:56:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, 0x1c) [ 789.490425] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:13 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000ffffffff00000000", 0x28}], 0x1) [ 789.622511] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x1c) [ 789.772004] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 789.895924] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 792.285853] IPVS: stopping master sync thread 2118 ... [ 792.295574] device bridge_slave_1 left promiscuous mode [ 792.301618] bridge0: port 2(bridge_slave_1) entered disabled state [ 792.430432] device bridge_slave_0 left promiscuous mode [ 792.444113] bridge0: port 1(bridge_slave_0) entered disabled state [ 799.883839] bond1 (unregistering): Released all slaves [ 799.977260] device hsr_slave_1 left promiscuous mode [ 800.035784] device hsr_slave_0 left promiscuous mode [ 800.109351] team0 (unregistering): Port device team_slave_0 removed [ 800.150759] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 800.339856] bond0 (unregistering): Released all slaves 08:56:24 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/76) clone(0x42080000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) 08:56:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c) 08:56:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000200000000000000000000", 0x28}], 0x1) 08:56:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sync() 08:56:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) signalfd(r0, &(0x7f0000000000)={0x7}, 0x8) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 801.135215] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 801.144142] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000300000000000000000000", 0x28}], 0x1) 08:56:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 801.197612] IPVS: ftp: loaded support on port[0] = 21 08:56:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c) 08:56:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000400000000000000000000", 0x28}], 0x1) 08:56:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x1d, @rand_addr, 0x4e21, 0x2, 'lblcr\x00', 0x20, 0x4601, 0x69}, 0x2c) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 801.323710] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 801.334137] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:25 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1a1000, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x100000001, 0x8500) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x80001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x401) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 801.493035] IPVS: set_ctl: invalid protocol: 29 0.0.0.0:20001 08:56:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}, 0x1c) 08:56:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000500000000000000000000", 0x28}], 0x1) 08:56:25 executing program 4: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000100)=""/76) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) [ 801.583095] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 801.590056] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:56:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000600000000000000000000", 0x28}], 0x1) [ 801.622453] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:25 executing program 4: dup(0xffffffffffffff9c) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 08:56:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 801.689849] IPVS: set_ctl: invalid protocol: 29 0.0.0.0:20001 08:56:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c) 08:56:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000700000000000000000000", 0x28}], 0x1) 08:56:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x73d27b97, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="ecd48f69379e86798d75e86e5b94b3e740776b1fefe9b634fe97ad3ccbbd6d10fc2e01d99c462e205ab6750db5a3", 0x2e, 0xcc8b}], 0x2084000, 0x0) sync() syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x4000000, 0xffffffffffffff13, 0x0, 0x20000, 0x0) 08:56:25 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x447e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) io_setup(0xc000000000000, &(0x7f0000000000)) [ 801.802682] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 801.848775] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 08:56:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x1c) 08:56:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000800000000000000000000", 0x28}], 0x1) 08:56:25 executing program 4: r0 = syz_open_procfs(0x0, 0x0) sendfile(r0, r0, 0x0, 0x1) 08:56:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 802.032710] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 802.047490] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:25 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = accept4$x25(0xffffffffffffff9c, &(0x7f0000000080)={0x9, @remote}, &(0x7f00000000c0)=0x12, 0x80000) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f0000000100)={0x4, 0x38}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) ioctl$TIOCSCTTY(r1, 0x540e, 0x8) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0, 0x0, 0x3420, 0x0) 08:56:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c) 08:56:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 08:56:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000900000000000000000000", 0x28}], 0x1) [ 802.205698] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 802.208483] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c) 08:56:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 08:56:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000a00000000000000000000", 0x28}], 0x1) 08:56:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x18000, 0x0) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000040)={0x3, 0x80000000, [{0x9ed, 0x0, 0x80000001}, {0x8000}, {0xfe, 0x0, 0x1f}]}) 08:56:26 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1ffffc, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x10000, 0x10) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000040)={0x3, 0x8}) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 802.387579] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x0) 08:56:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000e00000000000000000000", 0x28}], 0x1) [ 802.465236] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c) 08:56:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x0) 08:56:26 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3afc0dd8, 0x400000) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@ipv4={[], [], @broadcast}, 0x1, 0x2, 0x0, 0x8, 0x7fff, 0x8}, &(0x7f0000000180)=0x20) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1, 0x8000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0xff}) ioctl(r3, 0xffffffffffffffb8, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000000c0)=""/70) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000001c0)={@rand_addr, @dev, 0x0}, &(0x7f0000000200)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000240)={@remote, 0xe, r4}) 08:56:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000001000000000000000000000", 0x28}], 0x1) [ 802.579606] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setlease(r0, 0x400, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x100, 0x101002) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000080)=0x20602) 08:56:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 802.667849] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x0) 08:56:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x1c) 08:56:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000001100000000000000000000", 0x28}], 0x1) 08:56:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21, @loopback}}, [0xffff, 0x401, 0x8000, 0x60000, 0x0, 0x2f9, 0x327, 0x920, 0x1f, 0xa6c1, 0x800, 0x6, 0x4, 0x7b, 0x7]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r1, 0x20, &(0x7f0000000140)=[@in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}]}, &(0x7f00000001c0)=0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000200)={'bond_slave_0\x00', {0x2, 0x4e22, @empty}}) [ 802.770032] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000004f00)=[{&(0x7f0000000040)={0x27, 0x1, 0x0, 0x1, 0x2, 0x4, "1d7a2df214401588b1f994ef40f38333feaf427e4a32f87cb8d16600025f51ee9de262b832d987bbb1de0c26cf3761ba829a0682e3755c853f2a98875ae892", 0x36}, 0x60, &(0x7f00000002c0)=[{&(0x7f00000000c0)="0661e9a3a5831a1f423c71ecce2b6f5c430ce8d3b3d2ff0dc38a624fca14b721d40976205b670bd22cb6ae1648e1af1ff06f9c03b82f43b0b653d4b61c67cff9bcfc738f2ce2987105cf34f8bb4985f21a18b74833b359b3216ecb6d03ad8994a169998b1eded4334723dce3ab4cfd6532eef9297adb3324f5e47b3fc60ad69514140ed2d6c727200809507a2c88371e4ff0cd49151081aaa3e9933f3c86e3b2ff13ee5bc31ad4a8f5414d6430e97c3cd4a5b16955c36023cf4f47ca5596141f45e479f4049aacb246741cf8dd8ed8cfe6ea1f34f83226ac8170ff7ee1b360", 0xdf}, {&(0x7f00000001c0)="e44c8dfbf6a200c232052d94b00661cbda9bf876e23c4fa60901338e693e70f7ee179d4c0625c9128d352faa3eeafd3a356df642dba161f74e66de77a73267aa93b2f2e1f532412a0b44dd65adef1141731506110398f55e7e646493ad650b6eaaf46507c1f58af5ced0a795db25cf9efd4c3c70edb0d7db7d0c22ef188bbf55e000856498b5f729429fde046ecc0f301201ff4901c55aeb", 0x98}, {&(0x7f0000000280)}], 0x3, &(0x7f0000000300)={0xf8, 0x113, 0x7, "18de2e7e2872f43e4394ba00f1bb3e86bf70810f8f2541303aae1ec78ef2d02391d93b3bda199bfec97de99cfef540dfe5b52d58f79f8bd68286c8af2eea9dc231e8940c2246b17e39323e83252648808d2c72c8d97bcf934d51b8b9aa08cf0d03d900551f98e54b9f85b1b111f3143e05598ed4a9dc4786e08cd422da2571aa9bf19ba7910c92ca3e1b65df9a3e2ec39a7fde816e331d39c026d45a7306374577a992b9993094549a280cc9e5bd22e98b7c2773fbf6af0d94e60d51e4bd8efc1b084d9d6146ba3636007c5a2f5d176b75e186b942a3cf578f30ed48c84b38924b5c97a8"}, 0xf8, 0x8810}, {&(0x7f0000000400)={0x27, 0x0, 0x1, 0x7, 0x9, 0xe00000, "5b09af5aca40ded4daa10d55548db04863eef9ac05c478d9893958c3d89be35b1dea35919f59b73342d4c6f9f86f3211a0c57fa9423d4417a42682727bbffb", 0x1f}, 0x60, &(0x7f00000026c0)=[{&(0x7f0000000480)="dff80dd89e413b8ffe51ae7f9edc1d4011ef8b503df13b4cf8e68fb3bf03ecefb0e3b3b9f494c6fe1541dc907bd9fe3f3efe9fa7aaafdc1cec30bb86c9e1d6159b96a73f7d858f82d778cd07928169fdb5666644e54296d4d955b9984f30427705272b8bf69aea3ecf1251d3f0ed48010ef46c9149e38c1653174cf83b8b003cb5fe92c15b001209905f085555721cbb2638e5abf9f1273baea7c2e0c5b3072a5a1b74", 0xa3}, {&(0x7f0000000540)="864c9e5671618638854a9b57806ba4108cf96d667bcb52994207f214a5531a06ab2ad956f0a665ad73d7ed4ac6413d8723e0fb1c9c1d4f372f693add277151da855f8914960e26c76354d6c642f9348dfc4001bc18262ba6c38a89623d7ac72f71a8a660da0c5285c42515d437506c58422c4a3dd76df020ecac65521fc6ff5cb8c93ec80a208cfa3ec6094be17c36dd30c4f45621c146a832f6dfc9d5222d725f0a068af2ed6f5eeef85b4d14e071bb09b4a8", 0xb3}, {&(0x7f0000000600)="340549437884fab3959efb41dca862bd715086620fea72ca10a84cfc31e351572c7ec2f1dd567b4c1e1e06673bc5c1e7ead732924947c8d1dcc1dfad48bf23a3d434f38bef4372a6d1cd4b9b41e5ec3a89576ca05bee6f0ef2c3", 0x5a}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000001680)="b1be9aba63177ac07c9f8b7ea8b74fbb5b390342b29e4731f6e035cf835598621dc6985d965cdbd9377d14cf9779451a84410d9f05d4dfcc7ad3c23a5132e593", 0x40}, {&(0x7f00000016c0)="51f28593578723b7f9232aaf3b6fbd99606c42a06c9d46d41880eec1c45c6a7e980c5fecd05dfc37d9147b515b433da6a1262265191e6af8db3dc62533c5d65f1dc3ee00753df5dff99005e843d46bb785838f05d67a4428e9185dc775bf3c2c990072607e47dade62542cb1a1c66b0b2d2d263ec139fa60de4b160522a0e13072787b9ba52b5f95b707e5b90c121d7eb359f8c53158de2d348818be09d623cb5439c5ec1f4de6d070d190c3fb842972a3bdd6d5bd6fd264d83c62ca99fe803abf28e4f36bcf289da4e74d49747d8df6bcb33d8139a7359cc9449abcfc3c794467c2411200cae5f88b10ee7f6462e438e957e47ba0cac8215757fce16b8acd08ad5aa80dfc908af3816f73ec396dd737de99d48390905429b905626c87f881845a969c6fc9c0ab8e801f0447e919be2c2d436bb41a804bb7faad7d67c7e3a8a494a2eb9239c0a55cb18e9b275496c87d16b63ffdd41e5ab7fbbab21565125f5ab46c74bed19fbfe57e369adde16af9771d7fbf530482ca66ea8dc4a3127361610f0d818ae87f79bfeb0cf3c8870d9ba49a9b1b4c11b6fadb9892093b4bdd780cfec14da6f18f6a78c804cd7d06e65bad033d4a30d8e3b11f2bb5ae13e585b8bdbc934a206a1b4168023f511e4888fda288be03caabd0873a61ae2b50a3122338034a99b7842ce33ddef9e866d2c15b6cc4334bcda3a1955defcf3e905f0f63811551a3a97e02368e9e6634a0a7fc670272d49cc80d3bbe211ac816b39df807929af51494ff301bd2d271541dc7c1fcc436f9ddcd66aaf67b12d6b86765afb11cc3891f44eb98951a4e74f297eb08f048aa6882b70c0d82e0aee3732f66e17d196f9c4a9784f7d554da266aee8423abbfc6f70ce15c1773d7656cf85e394be891847d6b90b101baa37b66df1fe74f1a028831739ba8537854fdb232278e5e6db868899b908a0795f36c9e7a4d0fb695fd8f8dc6242135b7539026cb423d4313f5ad759dc978b3c21473586750da5091e6eae3d20b5a647c1fb4194473be29b96f1b045aa9f50b653e4247683863c191d691fc0fcb0f625a18c6f6b7f13df58cb0a68a1f6b1b8a72062f80933a148982063eeb27611950670fca0031ce9e2836272a57c7089835d9620967118a312beec345d8764d3c35cce4176c2e515a41056386780bdd984ba2818b00561dca49e79b73a705bf0fb3b9ed724b555d21b9119ea352767f489700045021cfad9d3e195cb3431fda27d8218f593c92f1e706a706556266d6a107a5f4f76ab4e178f87815d5f0328511fcb8b550f8cda60390f4aea573c3ac5b4eaf29e398d987bd56db836ea78670afe5be91ae1fb3e05f6e104a6a044b97c3e01b36892b03adac36ba30746dc8a24b4219ada137fb79c33cb2a0f46c6dbb8bd424672ca7e2cc8159ce530b37516c5ff0e7fed14b82b316dccd8f98dfa2015a79db221d9374bed898a290edf0baf84fccaa9ebcdd9478bfcd463e9a880c917d5bb96a4e1c1e7a579ccbbfe62e2273d820703a1134b8b59d5463f20edf8ffa7a2072aade00d30012b5adca97d246af7f2da99251c991b52c2ecafdec175184c245425854a6ebfc5a89bc8472401b84bb06b81bcc66d46ca5a4d0b352c7d81e0a43abf401ae5a5ab2e3caddff3330cc819782b8caafd219902a143c9ff4341d1ea6170729438fb9aff4d99e17282bd0b9de2e5e0c57c840693b704b1fb93e0b68853999b8180d37030b2ed74176e5a7af37b880a3828a3df994c83eaedffd7aa305e594138057e3c9dd3f3bd16808160f032921195fce702aee1236dca6c8dc73f5e3539d4c98926aabda5c1c5e03c43712cc6c48e9d5b201eb8d50058bba32ab11e01df6232d6ec951b430226d9466f6f97b6d839390dda3100be6c440d8177e3e5eb282796c1c762e2bf5ee1eaa9e5dd43838a196f210f69f665454b63e613af234d812e504a63eae3508e814786bd429550d5885758a2491b0e7dc3a48b4ba9469c182def006979368168bc9151454d628c3612fffb49bb84750560b11c81824190db821cc9d6278c588e3a5b444d1d89489527ea1b072c1927cf18da77467bae27e7fdb05657e8297248f3e9366e4891492d64a0af53eaa11843aa84d87ae552bafeb5763023572aa9d2ee0650e775cba368ce0275a73be8ce4af95156464bf2c0cbaf3e68cc7067280de631677c132879172512cf8017bf6446168f6c7a5524856974c9781e8bc1c01bdce2e0674c4be8255f29cf1ab7cf2a99d9029203a1b60a814656011367264161e15ad3708663d30fe052d82f844bec3d5911f051739f656cb1655caa8983053450fae8d2ee490f0b6a65dc47385edd091f4a6f5c68d93a42a77ffcc26ef519715fead21d42ace7af63b948d5afb8576f51bc48f35c68107c33430126a4983de239cba90f6c1b66bd749d7f9cb2d75b19f352976891430e8303d7bfb392f4505bd0c12627a1fd5afe55448aa0a4f35e9eb675d9eaa8f7e164130a5bcd8088711b86a74ce1f310df65fbd71f42c49ae4a9163fe84b58e63e47a1b99d64e4c5da40dda65cf42931d396483334fc7375191391d6e7efcfbcb3faa80892f032f5238bb4610a5ff5dd3ecd821899116b0fbcbe1bb49d20b5a59d103add566cfeab7c412a5a63824633d7a07e3d58a0048a941bde6f2212debbada7c9697972ed3a1da22d9555617e4a53f3fa1c857b535e935dfff41599e0e028613e415271528b6103d265b9cef42fa1737ba54a3dc32d615d8ee162c6033dd51f462570bbc85f174949fb921646eff229db54426b2d09dd89561fdf4822a9ac950dbef16a800365ec618a0fe9fdf22896ea5c89f8dea16223f06c0ccf6e4e1588dd65ae03e7266c1b2017cb175d352df4641e541752058de1cc9338df2393ec5182c5ad46cf1d192f045a7d05c4a18b5621bcc0c97e1c94e32b54ecc8925119c1569e9b2d25e5be1d0cd845308118ea289b475c7d914b48de009cdbffa2b0dbe433c24be03c14e2aab47cac02ec691e5b22a0749245ccf665a270a0af75170f86eee6f9d9172c987a4d45eb353b47d2d2ba98e98132417024318a1faa8603b3c8bd622b013d237a6040d05b61e5d915779b0d5c0a308d253a0674795b850ea0f7c97cc8b164049f52b85251e939d63db5622e4504f7a48c605b3a5d15a5ac4cb39f27fecbfe224e2e743ee2bd9131b506fad9f639b95d0c8526c0e678b33834c006e72ee8fde822c20ed2795f6c55fd8942264b5dbc4e95bdc7691b178f6da16137654508af8ff7c7ad759294ea9a4160fef252501e2a371c71abb31e58c3249f3dd17063bdde6865b4418c9ec5fd5f7f15d14f302084847482d6b2ee38627cfd32f714ecf61266cf755d7edf008226c7bb4305108b20cdf8daacc804f92ab0b014c0155968100dc41bff64d9d158ad47ba23e37d5e30403a513535bae1ff328adb4d891c8665dd34853bea0587b4c135e146739610e9d19624de01111772f94044e17a5ab5acde4f9469f6bf9f5caf1f35222ccd4bf8206dc1da6530a4d77e071eeba1323f0556ba05b09bcb6009a036c01493522a81803e2299d8d3adb9a2f3485d5b58c51a50eeead09fda9864abb0755114e2066f35a1a371a87c8d317543aeb2d203acd387dfb9698f520781978cb579d062128d094dd77ccdc54e872f4f2ff05cd2637406a8968185b100716a0efbb7da4f052ff268d1c100faeceb863cd4c3e526668c9fa49c5dfe00135656d10b870e66f283f42352be3ca262fce3a98d6889c42da45fc25357b28ca68470d27cd59993760d03291908c8073afb19f3e6554109531c4d4d129675c6d3cc17ddd237bb2a67df33edc1612b9cb653a905082d36bfbb03949612c0d0fd8a35de2bf0c983b017ac0270b035097bc69ee38e063efb43f9e4627da3ad1f907887aa38a0087cd383bf398834155b21df13c25d98fb25d085a4f1c11e7e0bbebcb3313df0a4678be5fa445753543c14d9396c752d3e0278f6a5b1fdf4055ad242caf6d761f3b7c9a83943d31a067f350e443526a4b445ce9450bb8d7cca3a5ef6f39e2a29263a063f70092d698cfa38e9353160e61a90d83727e2013b4b107d40da64c8531011a174fc4a671da7758d7dc4c79e46409fbdf6ea4b9198f553173ca45dd29befc8a7ee64b0d16e16660b5fcb13beb3ed394761de62c76aa5979e048a6a3fd52585718de780d023c574ae2950c94ad4e724a14cdeaeb94b40402c1edd1b54580d3db1e078fc6f42dac5ca183af5f2ec0622ebd015701e60250eeac473d6ada1e9ac59743a1eb3a2d967f19fbb0285863924f33950e3cec42e1ad2e69059a3a41c9146ca674b26af2f9f2331a603861f6aff1d28b439e8c15a13cb71885891975a0b5e61170373c86935ffa9c0d205c30325f6df0ee34993b5d1df3eae7b054b48067050249ede2745add80899f6d677748eff20905ee40df95782ad94e5a6b20b0ca7377cd98572d3c7adbec61e138b2513ce74fccc03d0ad097d0f05417d0816b2a23b0028231e66ba91ae6bf38dd2f8c22c2be50d5752e3c7767cb9da1f668e3c4e67643744886b9084798ab74ef3ca4bebfe2d8c2d3e11d597f48021c4d1d35e173540f2016777e2a328f276a8ccd1c16b56304b4fc6f5677c4e990d62c8859998e8e33e9917382c39d5ee77bcf2f2f30f65c177215a18903bcda798d4bd31539cd27d3ea53fefcad1368fa551c0eacc4c4a5efd6de7701d19591fc1f44f932b16c93b24fa1dcac5ea5a55165ec092adf532d384b720d809be775409721e3fe6a9a60887275eeed7b0f2f10c13f061289c1551e5bd5c33045a9b39c7e78aeef064f974f7b2483a0e30cc0a0a12e4c484034ce96acd8addb61a68a5ad800742fecc07b8dfd61a5fd207c1443be6314de546f2e69da4ed58b5b1954c861cb40d0f019c251276d44d2cb0bbbe2ac03a075663765975728fa8d8e15eee531a5f056bc0d83894a9d4a3af435ccc2e78156181450170d29af6ca9f2f5776d512988589bfd01701b9663cf0b7476247c14001dd0b775baa993ebec620b4401e5ce2886470e6f6919af6deb6c98c96f26dbbd1e2a06b712689e5701be9ae41e3fd5f0e9cacc536ce4038bd4a25445f02be0a728f0b2c3959952f2ca58a5e3102c8487cfc223f4197379088d9997989d98fab3333200a99d75b5579c1ce414ca4b03091a7e2f3607884dceb5645f09ecfe7528a0c2929235db90c6c058fb924aba17ce012f51a506d2336c0dd5feb4abb60933d39cddafb02639bec3f10b64c59773e47be457b81c4b4fa8b20be4b8c130d91330c2f91fb1920603bdfda55a164dcdb36be9dd04fdef856574687a77cf1de4f72c3e0bda44c6546de20ae589e39269ec803cc552993f0f1b15c4d9b4b04a80b5ab1a594ed6e64ad2da37d712181ae5f7c40447fbe903304cf334fbb7b8f02173e6462ae7313cfbccc66bb59be6bc44119f917e16d728df1d82334ec24faa0df2069f2ed10868535902998be51b1cb33a40b67ee6ac270dd4b568b68c5fdf5bb3b7c51e3b672e15030c4a741025e86c10ed0059d494f074b204af84df69e759b0cdde231e0ce6004ea04bf55c2830f8a8d90d5545e2d7b83d2465fe4cf736c441ae545c8af178dfb308f54a3e4bcc99089d6efd662125152639d2211b25059d856d3d3a7614f20e7fed5cbf81373adfc91a7f5a499bd616a7e6c9bd46fb459a15f39fb774b1d69c60c61bf3d44fd09113e4edb999d8a56c518e5e1f294846a74741f06b2e2de8149a772f18a1167b8a51a6c4dcab7544", 0x1000}, {&(0x7f00000027c0)="e5f3b9be1bba5a5efc69de5212fdbeda0922e1e95de1772ff4cab331cf8735c1fc38778267125c26efa98c3f8794881077abbc147833658d03a09fec9ecb23657710b0622f1dd00af72c38904013f937c1acb8722d07e2fbc5348855179c016fa413e33701a68a3af3b86b3c324775709f94a21e3ed7427a9a328f030f72d5f1f590e58808d720988cd0ebde34c98396ca490e787cbd9304d24976fe6a81", 0x9e}], 0x7, &(0x7f0000002880)={0x1010, 0x115, 0x5, "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"}, 0x1010, 0x24008010}, {&(0x7f00000038c0)={0x27, 0x0, 0x1, 0x7, 0x9, 0xff60, "e97fc7a07e1e88ca9ea5f19be99db131db8faf64278a2512627d503ad77837297ae6646b8b0030fa1b8f18a737c6cdbda8436d4b4c105d519b431c68fae361", 0x12}, 0x60, &(0x7f0000003e40)=[{&(0x7f0000003940)="5290bc14f8c069bbf6b4d1637c1027661e31b724028643f657b92a6955c483eb0c053bb5daeef04df824cc1906f95aa3b396086452aca6b62c7c3fc9699af320702deda214bba6e9e2d3594691fddef90ffc227e8b2e297a9d62459d", 0x5c}, {&(0x7f00000039c0)="b92dcc2f1742fa101d50aea8cd15e7f3005f91b355f6ab36d3a634b8b661007ba805a9d2d700f69d0ad48cb05b5609877093869cc863afafa278457be0eb2618eb6868ec32837cd7eef3aae07cc4bdde65af5b1d643e97202de882f1af6f864a5e47f3c0f16fd6831b6adf2fe1882a0974694bdb879fe40f95605d207047b33d77e021f0b297cd024d0ee0e40fa4bffd1ae72f96b0501a3291435dfb798e5924944161ca83a0337487ea", 0xaa}, {&(0x7f0000003a80)}, {&(0x7f0000003ac0)="609b2579c03388f3d5826e015e06eaf0f95b93ad1b7f725bc553142564be71262ec797216d473243956edfc2d0957cef15d9c7d9d7696dabec10136e0644fe53125170f481f536f195fe1df68ddd415cb830be8b58ccc9894f77aff48a54b4c8447146b889cdc52b3f16ddee25924599e2d5ed8da72c76f46c406b1ddf35230d23bdfb3c5850622a13559f70f4535bbc75a047451647d9acabd5cac8b67bd266674d7bff49d8141154c76df550ffc900792b2e6231679ec3c70e14bf3166a36c483b4c0c2ae36fa7725f", 0xca}, {&(0x7f0000003bc0)="8332e040d2094055cdc3a210e3a59ec24d50a885816d6a4c69ada4c2f77d9d0dd66b13e70b775901745b3d0862ecadec2dc545c5f4f50f0d558ab23c286924563b63d0bcfb84c22bf10e17a23aaaf8267069684133330ce445f959c030de14555fd9003ed6fe5def2af076b0e0baef202130bf0b7dd3ab3ae1fdc57533129bb78ab05ba6a30e84ec415ef2e74acf80739e04a87be9e7e28ede0fc0e008a118494ed8a0d54aacfb9377bd132364e2f7f41eede84c78de52df54d32c20e88035867929437d50aa9e5114f64b0ce7afe601f13255cb71c3c6d0457054490d1b67c94b", 0xe1}, {&(0x7f0000003cc0)="347d934144e93261036f3a0b38f2ca600bde8458dc9d716afcc6ca2032e14c71f10d240d20817a7bfe0f87acea0ba273c66ed2a4047c661b565f8589e8653b11ed6e9feec8419c986dd8fa62cab4d0c24229db98999488258b539b1d7378238db8b4e77fe4d9a51c1b584aac8044d73a07d70c621001a477005a1a3fd9aee0486324e5a3b1474767a115eeb9155cf4e86e6dae", 0x93}, {&(0x7f0000003d80)="82b90ddc337e7946c4016c47564c6e5685af7b018461e35411f6cc1dcfb875343375564b2e875d8ffe030f960361013ad513f42e06d6bb7407676c6c1a43c5ba53820227b38c700e02c21452b5bb4dffbf3d3457867a85cc3c95ed442b", 0x5d}, {&(0x7f0000003e00)="8c4a2add3d", 0x5}], 0x8, &(0x7f0000003ec0)={0x1010, 0x107, 0x316, "146bfdd9ec0660076f29483ff194cd50d1d49f4e9886b0ced10ab2d619a500433f040a6d2e65746f4b95cf1b6e03da08a78043bb0b85197eb1273ce51f15015c4ecd898cecb77803d99564056229f92bcb2efcf1a45a43365c5c973a4a8502c0dfc05fdac5dfcbef8c4c04487139cedf6184a944482cd926b212871c9e1d6890813462b6ce714f5156093fe53e22c4252843005fc86f23094665e4a6bbc86143bf0bb9f77c55acd62093ad199f58bfc4b3100d7b8e48c0c68cd76d1f4e729ff1c5d031371b7b485b5afb06f2098365afbbb3de66ca5b45333b6b343cf247d5bc30198096bf8d97b81274f34fd00e102be072dfa472306df17bedd61aaa50dcc8ebc9d36d6c8cfaa25aafc86c114bf4951ee9b5aad57f7e1e1b938d2b36e5b3ba391e4d7da078da84fbf1f2320ba01f2a87bc54b40b807a6bbb587c7f0170f50d5d73f20681dccb89d2fb35574de86127e8e201061f2efb61353b98d33f6e62ebf52c39da75fc36e0a8c7585d056ab7e30d51b26cfed2ff4c69084a13cf1e24d982d44b1816ed30568ccd68e7a22806cdcc9321d155bc3990eeee7617dfa1ed79f5ea86293b6008b8926bf03842d83bda674cc46edefb3a867b3dae06644cd9049cee18e488f158c26b04d7c83a8e4b4ed10e34561cbf2d90a2c29c1be0c299c1a4a3214b157864a2b5f578107070c11b813186c7ed0bfbed3ec2f0f5d331f2653cd73efc732aa6a225f143214832ad6bc6efd86a71cd8d35786ea3f672e706699c865521c4184539719d95b4dec256c1bcfc329f335bc6d94338264ab88625eb661ca999e09f087ff7058259bcc5b343f7e3fcef2214769a499df436fc09677592e5bbed0d80356b8a7e7a8a680dbe34c0957ad26126cb07ea5a9d720305adf7e817bfe1d273414be23923b917aa26cb5ac590579d2f6be27dc8b387fca384559a551f0e89cec0132652f4d941d9cdb9a7f2db2a837e96651429a53abe44991b9bc626894da9ebc6d28085203f322c3a894632611061170bd4f22175e5a21ecd8234c402c76c118399e1a7db3ea5e8c205a403e9ba3881ab089a9b33d8d2b480273b28031d9ae21c81ecdc904e93f6a5764a53cd4534f1327993119293e723733cf726f4e6b929e7307e60ad7ad797c21c7aec1f7c0a4c81a4a5d988fcb47f87db3d92f22ccb14d84e3787f659c9b1065e46c11cca4d91836ccd1f2daa988d9f0dcb50697b1db7d049110a0581f19e855e478f906d8b9e50fe17a9b0701bc7f8520d121b4b3baac6f9dd8ca912223035b33dcccb614cdefda35eb825290cb7843e4ccc113368b93eddb22000705dca6c379c5b3f3c842ff54ebf253347a3c4c2e5e1cc5127ba5e3f2c6d87aaa57628a66d4d32255b4df654ce1d94553e630cae0fd55e484e41b8a4d93ddac39eeb70eb60a3051abf01fcff7210f9877c2b1edead8bcd3e4ac2f01417f9d3dd0b14ac1bcdeba907ff58205d5930f240dd279892948f2edbbf9ef65d37515b4b20df35f481704e43b4134acbaacd9a417013993b663ec60197e1ad02761cb64af9bdcf01b8620480fe28b9539b3e2d5b274b2feedd9d43344770efb674b0ef685f5704538ee635c13609522f3fed077dec885a3b0cb36854a9b2c410ee94cc8873c7dd84f485ac46761114eefe1f27452f370e97525dd6ac6a69ccd50326b875ebdd4faf673b3bee26aa0303dcd1e91c09d7d35d52f28969c071f0b973c8498e4106d8845760b42e78f2c24999c9df8ab0536d10be2c2e05989d98d88df2d6ab00652f66739f2cfc78ba23356d8cc5d66622400a4080b18ee87f14235167ea3b6049e4c6d089b651bde128043ebc349221a53048e1f375f7b1ea1ef3dedf503172096222d8c6f03f3dd7aacb4f58c641ee3fadb729457215afc597e4ad52a8d8e658d69fe06927803a198cb59c12508f1cad3ef73ce166221ae0443a3f77cf7bee1df1a538306b896839a269498642835082cb404bb4da1c7b5ff183ad9f9a8155844a76b6f8d3e55ff53369b6c81cc93cf34eb9c18778d9118be963268616800fe03e6cde1379a0f9fbed39a32253620e787c5c7ab7a4b70cdd7b4c14e6d66b0da85d32a4e283f6f45fc2eed11d79baa908fe2b926a7bff6923b9bb272573f2ade188214e8af78f52769b3c37461800b7b8e96db340b1606532f801e88d8c3534318f77a79cc0ed13177462e3779a31de250ccaa89ddadd0c1c205472c567d908494b9d951419d144a73fed1072358f957fb772f7370f3e80f57b83092a1b652c5e2a0e5b2e5f3116abc40af4a7d925030536832aaea871432a2da3ae70ef5ca3c9c80be3e6e9657a3b3d9d6a31b7aca386b08534670c2a285f96dabaa5d1636285774cb09af78e30c52b9b5047e00b95eebfb0b47dfa6ac70cf8aa866c1216870cf4061bc6077601cade85a253e13dcb3ece1c092147c111e9b162e9928bb2ba12cc0b43b079dbc05e0cba3a1c63c3f368e46ae50d372ca9b970b0829ea6ed81878df2b03fb0f2117e11b7db4e6ba22abb79da7e253661f91e4c9e62f0bc03de076751a9ef2ed70a6836d4d2d2aa960d088fe26a3005805f03d0e82b2d06dc38b7aa642a5ccb53d0ce65b91e514f182c765a09c9c419b16edd80cde0e71d35f5c4e62b12243488f9a42be910ce0082876d696b8f0cbc47b02bcf1671dfe23a6fe8cb060ce0ff65526b2f6b60e3021101d411aaff58dd9a50992f1c7dbb632ab506a8894b25a64901d22be63281e6c0a2103da09123afa654c7aad9edf920c6636b8d9f1adcfd358453c195bcd6fc2ec3c50430e881e8225645041dfc71cfcf5bbce4074d74abb0fab352fbe82c15db35855318bf1dccf53bb1e2ba59d59eb9473dde9b62b8f39622dc2226789f67e2e0cf404e792918c27efbe1383df1ce7a83682757eef8c6305de657efc1b552ca7b5a64e1094ea63bb486b54abba93db83e6b3a33c4ee27fae021f2a205a5e7b0e436e23ccfa65c3476898a8cdf9144fdfab598a994c1546b280919b713f8e8d5edde32996cc38499bbf1a614769c0435b417e510074ffacf5e258db28e0c10c1607cb274a3e7be0c8273c0a131c8bc0b5b4d71a6be192a21418f87408eb24af8a96d78a0c15b64273e7d5635104ee6131ecc1e98cef054c65219d29e80c71e23cc9aeeb84dc24e415fb2f77005ac33a0f78cd1e717d2e7635d94e36f4fb31d72560c41186e599fd310908e0da0b98f7860acd103b2b7acfcbb674c33023ae033a707ee93185d23baa21b86a8938ab5eeefd4d65b1581a01a8c5c80838b1e2f9ab85184317836b9d71a0f4841814c680ddd4866a79182296799c140ef671f6d312023d51f41fb1ad0b350d17440ab9268377129937b80996db2884166db4a336eb8739016cecb224e8974a87ca7d0fbc6dd542fdb889a9b8f01f1c679e62032113d43f950410dd059d32f0db9df94e849780be0ddd16f3a8fdae82cdef381e1e981b6573b6bd7ca98fec25c6728ace83fbd8f998ac4f5e35dcc6966660310d16e808737ada58b3805f1222f437d63028d0c98a0fb994d28a1ad8e1d585308be34740836d140f46c37fc8db0612ab2ddd379ff958d3e14a2a0a63c76c08e867931889e4d6326625e01c465403a2c2201439f35a708701692a70e63b0437e90b979b4f305beddfea3f660917a7cf55bee8b579c58d1a623e7b38b6d0a316d96279d93306126c55e7865197c7b9ac405d8b46effbe38d835913dadd5774a14a78e723877c0a2bc9442176894c07f58aac5b6d6dfca7e0f95fb8034e1636932fa9a7721423638292fd55015b73c812224d9717d7777bd3e6807b07ac5d1135fc744cd7f5a47af842da3b11865740b70377edb9e1960ebfcc043f2a21879705f1082d51eef29054e488f9e4e727ddd030746858566973ffd9f5b972a7fd5be508e256309bf0c44e25759aa146d304f2010131a81e6aff5ea6a16aec784cd3f1374ab8741f19f57e9a23ce01efc71860e749998fea7371c547b28b11a9604c1014a46cdde8eeef4cabe57f25905d4b5efb130b00586db1c91c461018b4300ca2f12ce459899b5c72a45f7f744197aabeafd0f884a653413dd725a33cc66af7dd4a43980bb5c92d796fcef3359347d0bd5c9967e470ed3d6245caecf74e8184c9e88447d085b1143b5c86c168f7d23e4b59a0778bf87e9c7bb53976f1156a6a3a09055f9955297b9b95939ba004c3a11bff2307b3fa8edc3301d9b563a5acb5056a3a5364e2f302eb61f0ecd664b9421405bd65f2a4ecab1a0e9d8909014eb63fe361983c97eb6d84ccdf92ec63739b55238d79d6eea9dddb31de63492404c23d001f995d0d8221bcdb503157023ebf5ebfbb46816da7c634cccff084a85637497dfe21a1f3555dca78c8019d44ada822404d852657e898742f3600581775d27bdade6a4b93c581c10fdfc5e8e3ca42a7d0de647442e26f4dccde69d34bad90831642e982697c85b763c731f980ca0db9fd6e8d8b5626502ed29a3fd970977fc9b8e434b714ccdb0d4c7530e60ef640da78c149c1a612cb7679c7cf78399ae907bdc389ba821adaf2533b8b0ec8cf06ba97844c4f8538b6fee4a97e69078964eb94d6568f3004baa57723503eafbd923fa1b5a7c1618ae3fc3b29f43aec9b4c61bdad2f8a16087f4e17639ed48cc960e88d7a897fa403cf441547e73f4974b987c970657f8b69a210b57cfff99074cbd5a4edd98af30c41edb10a7a62dea934b066dd1d3573fe0caacdb6b4e7bc762677cdd656780b775527c0323aa99a9082a114967e21172c36bdf9c9e7473b1c67e38d1c8688a6832438627acc3e25c7cb89f28942739e3850f9618ae049aa541e87ccbfd2d405eb31dd69eee8db59ccea226e5a4c666a4572fc1451bfd036bbf66aecb3e49d14d695e7536c9df5261b9942075d1ac35d02857fc5e93c011fd45998e8a658200dd348b21806784169b0ac510e2f800208b2a216bdd7ef01a0d836b184fcbac76c7d66f060641a9eb034777ac3f9963d7275c630830c92fc0d1ae69612352927f8b28434878e64b44ee6f369eddd03dea91f9f64d7a0f7fc02ea90a8aac124500e679ca3fa6ad09596558a36000852bc8e05f7b3ee9de0ef1c10bd3a6ddcdfb2122f181b4846cfb63672b619e96612ee63690c2207532eae2d25e5a63e8e7d5cdae507789c6d030b5bfd4978032669840ad83fff88a3c1ce6ce5267b45491aa02b547d2dc9621f88afd1ad9c85fe51d63953a5baa57b8c2d7901ef2a6fe380a45f02c9a23214a9c7560937d14946ff78629697a5b7194571cf78c36a106bc16da5bc40425e2fbc77beb0676febd238c1ac938aac8949fff91b776a99bf8bbae63868d184a0fdb16f9920a1efa5b9a3df94478aa375a15a2985010ee04c0dbb4c404dec3ff84284cc96f62294699bffbb32d3a4d770029d2d7345919afe3a1c9917501e740e461a0f7577c6258ef1506454b90d13d74a99804338952bfbb7c9b44761f232ede2c8dd8a58827ae78d56e5ca917d3f7ee72b4c8f976b338462e5b6f232bd2179fe926822d6bdbf16940e08c67d05bce59c66a38027c2fe55dca15c905cb5f10a03069077a1958d58627e9eae280f3ad48e49cc0ed6597b72ec666d5d8e8b75ece01516cdfbb303c0ee1497c095c0b36c196bd4d3cdfcc4edcfcfa60b86df0a1083477b498b02b5f352ef5f9606b5b1dd3e7966dbdd48242fbea63eacde60f49b622559c5f599d8f40bf2252bbb54f5d660dde82b8f9b8e938a46c8b62a2ede00039680451e43164d66c1185ed5cda"}, 0x1010, 0x40040}], 0x3, 0x40000) 08:56:26 executing program 4: [ 802.885543] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000003000000000000000000000", 0x28}], 0x1) 08:56:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\a'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1313a9e0]}}, 0x1c) 08:56:26 executing program 4: socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000000c0), 0x0) 08:56:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x400) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000040)) 08:56:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}}, 0x1c) 08:56:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000006000000000000000000000", 0x28}], 0x1) 08:56:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 803.229277] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:26 executing program 4: ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x2, "d80a611d3ada197f"}) sysfs$3(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x200000, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ptrace(0x8, r0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) close(r1) bind$pptp(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) 08:56:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1fafff7b]}}, 0x1c) 08:56:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000007800000000000000000000", 0x28}], 0x1) 08:56:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000540)={0x5, 0x0, 0x9, 0x1000, 0x4, 0x8001, 0x0, 0x8, 0x1533, 0x2, 0x1}, 0xb) sendmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000000c0)="cea63e44526bdafde728e9b5094a41f3d84b13095a431ae79bc8b24f50bd5b411d", 0x21}, {&(0x7f0000000100)="194dc9d2c3b41069030fb1672e692779f8a5661b3488fa4a89b9540214ec95d32910e8e7d1de3a5f2a613bb149a1dab90343820d326bcc3d44d6bbf3a0df490f552bdce6e54d0b9f63baf409080ebb1666876a4a2f02bff78bcd922c5778a2fbeefb65400bc27d8eb28f219d58fa2d8222b79da0a60211ef2280dab21a4f8c922c312391e91953739288deb703ac406f15c74c23858264a47b42e848a3d737ef9b3a9750a9db06277aac8197d227688dfc3786de3f6da72cf2c99f2fe8bbc74ad790625a88a757d6dcd3d7a53bfba948b28014bd6819f811503a6778bb077dfe754b59730c82ae70bb72943a3d536b33", 0xf0}, {&(0x7f0000000200)="825211d04d7afcaf5e1940a6656ee2b153", 0x11}, {&(0x7f0000000240)="7b4c68de2744a7ba19ca01370104ad36f41abb41fa9088b4f28302580ae7673a53ba0e6ec3d3c83e2cd18f1dd43b287247bc6e5f638df3b524b9ad4ed21194a7b0c8b3d52b1a1cada0d8bde8f5014b3c0754dfd2d6f4ee5a12c854cf1eb51054d9", 0x61}, {&(0x7f00000002c0)="09d9bc471e30ee8dcd0f4cfdf5142ed92bcad532b3971fedda6a09a9a17cf5c603861def1531d2599b458d68defbf94727a1a05f922ff7ad52eadc13d71bff44a3ca58a383d0d2079660b36fcb9f6be0ec4909a8", 0x54}, {&(0x7f0000000340)="59314f2b3f93eb2a40c18b37b634cce5981eb7e7e40e839f28267e560735e220d90f54e40371d667b39f18db48752352fc755520cf29af7971d99d1b3bd6bfffa369bf25", 0x44}], 0x6, &(0x7f0000000440)=ANY=[@ANYBLOB='8\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0x90, 0x40d0}, 0x10) r2 = creat(&(0x7f00000007c0)='./file0\x00', 0x4) fstat(r1, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000001c00)={&(0x7f0000000800), 0xc, &(0x7f0000001bc0)={&(0x7f00000008c0)={0x12dc, 0xa, 0x7, 0x24, 0x70bd29, 0x25dfdbfb, {0x5, 0x0, 0x8}, [@typed={0x4, 0x13}, @nested={0x10e4, 0x2, [@typed={0x1004, 0x51, @binary="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"}, @generic="686762c8e33fa67be63e61249ed126ebfbe5c438e5216329456e981af7acfdddefa111b5a51b5daf737a4ec35438866527c9042b23a94f2e70911066823d53efc3e3c40950e90e507207ea5bdda3f85c82f4391c3671670b19d341105a03b328b8d0b3e0287192247c9f8e91dc172341dff62d341d8edc968594cd7fcfefdce1e5a998360554da12c93a8586ed905112eb8cb40d40a13d3c473130a8c482009a30ab05d1a6e0edecd03d450e030f60b39e7a8ccddfa86725262776dff5012a30ff5aaef3c88a9cdeb9", @typed={0x8, 0x4a, @fd=r0}, @typed={0x8, 0x14, @u32=0x1}]}, @typed={0x8, 0x24, @ipv4=@dev={0xac, 0x14, 0x14, 0x17}}, @generic="aabec8f40911e4d9c8d2a0071c582bc72404ae5c94e6bf09d53e4d3e9fcbae838ccd3b9ff6aa78b392415b5567f2dbc8bbe9d158eaa0ec9bb9d8a6de380102b4d531580536877c30b6ec688ccb7457c6ace8306c71e6bfbbb651e2adf8c4f2fd57120c65192f4180e3e854f47972d7568925e73c6adc1b586b0f67a71eb63a092f4e46d9a7fd97fedf3b2f22", @nested={0x80, 0x33, [@generic="0abd19178711354aab0a5267a902248d4b8cf15fb4b2a9302714dc3ee46c56e26dabd55327a8f0918acdadf957def2859d79904b6129543ad18c0a1131d8d0fc47f19316221a2b6462264e849204b460638083dfc7306458e1077df3cda2a67b10c4ab3eb2c91c679ffc5dd5a92617e6", @typed={0x8, 0x2a, @uid=r3}, @typed={0x4, 0x2}]}, @typed={0xc, 0x3, @str='cgroup\x00'}, @typed={0x8c, 0x60, @binary="9e472c813e5012e98ac4abdeaf479d7c8104824be468e753ca5e05b0bfada8523573b8841fb94576db0399783e506e89b700686cdecd192c5f943a80cf948056628819355ab0785dc3d298b8a3c9959dfb351d630605334e09d6c9d4ebde3c01f2fdb60b34ee822267712086bdb2f4ae454dfa800f3fc50e952619b44afa56ed99e81f7f9b3d5eb6"}, @typed={0x34, 0x3a, @str='\'systemppp0*keyring#%md5sumvboxnet1selfcgroup#:\x00'}]}, 0x12dc}, 0x1, 0x0, 0x0, 0x4040}, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:27 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000007e00000000000000000000", 0x28}], 0x1) 08:56:27 executing program 4: ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x2, "d80a611d3ada197f"}) sysfs$3(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x200000, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ptrace(0x8, r0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) close(r1) bind$pptp(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) 08:56:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}}, 0x1c) 08:56:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00X'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000e000000000000000000000", 0x28}], 0x1) 08:56:27 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x436400, 0x0) getsockname$llc(r1, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000200)=0x10) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x2002, 0x0) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x9) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000240)) 08:56:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) io_setup(0x0, 0x0) pipe(0x0) io_getevents(0x0, 0x8001, 0x0, &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x989680}) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000040)=0x100000000001f, 0x4) ioctl$sock_ifreq(r0, 0x89b3, &(0x7f0000000200)={'nr0\x00', @ifru_data=&(0x7f0000000080)="bae8f5e59a6301624afafbe366188ec15a1567badd04bab804c40ca3aaca49f2"}) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0x1f, 0x2a, {0x700, 0x0, 0xea010000, 0xc}, 0x0, 0xe803000000000000}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}, 0x2000000}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 08:56:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}, 0x1c) 08:56:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000fc00000000000000000000", 0x28}], 0x1) 08:56:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000780)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$VIDIOC_LOG_STATUS(r3, 0x5646, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000740)='/dev/loop#\x00', 0x80000001, 0x200000) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x81, 0x5, &(0x7f0000000400)=[{&(0x7f0000000080)="2b37f58804af40c605310f027c621fd090a5dd2f6b8992f529800a48eeae222b134ebf36a281490cdc6335781a444803ec4e032e185dad9d659a082d90b8e423cb3a1e1824e4aef8cc80e5d206f24b7d22d360feb5", 0x55, 0x1}, {&(0x7f0000000100)="dd241b4607006480f1e030ab403248f13ecc719487969ce127194df8252990660179f9e5bb52009cc74a05127f55d971a702823f16350d4c59302a96f4dcfe5f755855609088853821ec476d49f281bd1d5bc024508507aed8383688109280f16edd17f7e48b9562b7574748e2d4e17da0d6ce0eb898bdf04c61", 0x7a, 0x8}, {&(0x7f0000000180)="21b5e6ac3baef56e0de359a164d8ad7b44d75dc1b056830afdbe8235d2636075b011ebfd51e0f833d2148dee515a5daec61501d28e8fe59d0bf48c56d76f83ac14675359e36599ac06ce09154caee9757b86c8b33afd380b11def323af5b23ebcf0c427aa0864a5c74ccd0c837b1a717b73a118fa62c8859047015c9284e3e98712a4efa52b9bdc8ca3f427343c805ab462c965f60d5eba8daca132c34e091d6da8d5ef91e4ecba88dee25e1dc875e6853e6d9a0eb8f0f7d11c60e6e8a8b9a076550be1ee284ea495490e203e57d0693ed0dee10bce8ba6617e5a7d8a50f55a4b4c87df8d3c703983b22046e20dc", 0xee, 0x8}, {&(0x7f0000000280)="1ad522daaa02fe3131488a7e5887077082f694b8edf77232a7f32a562607cade9f84627f93d1b57b866bf2b48ee566b265029fcad6a63a91a141e6b41ef3e5674d89dcf526d0245c1619322b7490c56740b48229d81048edafeea141b0b3fd8f75beb801c96fe23ea0a6f763da0dd79d86ff43600b62df83fb395da17244738f3190", 0x82, 0x2}, {&(0x7f0000000340)="d8c6c10c6649842f313799ca7647d82bcaa1b841baf4d88224475bc068c37e8cb6b4cd723fe41f96786cf2e6a67661acfad51fde79adfd4d6728562a54c0e90918174c77b114bf04b3f32c0a938f545d928c53e273917ee0396086fb749a685f5a2baf3314ee753cd99a97c226d921964e221648501495b5ee1ce534472dff86deb10da9", 0x84, 0x7fff}], 0x8c08, &(0x7f0000000640)=ANY=[@ANYBLOB='part=0x0000000000000009,gid=', @ANYRESHEX=r1, @ANYBLOB=',context=system_u,euid<', @ANYRESDEC=r2, @ANYBLOB=',measure,uid>', @ANYRESDEC=r5, @ANYBLOB='-\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f00000006c0)='./file0\x00', 0x0, 0x18}, 0x10) 08:56:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x2) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) r3 = fcntl$dupfd(r0, 0x0, r1) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xc0, r4, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000001}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4010}, 0x80) prctl$PR_GET_TIMERSLACK(0x1e) 08:56:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 803.953483] QAT: Invalid ioctl 08:56:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c) 08:56:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000003000000000000000000", 0x28}], 0x1) 08:56:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) r2 = getpgid(0xffffffffffffffff) setpgid(r1, r2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200001, 0x0) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x75) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:27 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) pwritev(r2, 0x0, 0x0, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = getgid() listen(r3, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r5 = accept$inet6(r3, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000080)={'raw\x00'}, &(0x7f0000000000)=0x54) munlockall() connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setsockopt(0xffffffffffffffff, 0x7, 0x2, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f00000001c0)={0xa0, 0x19, 0x2, {0x8, {0x80, 0x4, 0x5}, 0x10, r6, r4, 0x0, 0x2, 0x3, 0xffffffffffffa776, 0xeb6, 0x4, 0x4, 0x80, 0xca1, 0x2, 0x0, 0x6, 0x5, 0xe}}, 0xa0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) write$binfmt_elf64(r5, 0x0, 0x0) 08:56:27 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@local}}, {{}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_open(&(0x7f00000002c0)='jfs\x00', 0x40, 0xc0, &(0x7f0000000300)={0x1, 0xc000000000000000, 0xc18, 0x96fc, 0x6, 0x40, 0x100000001, 0x9}) pwrite64(r1, &(0x7f0000000040)="5fa020e7893f6c53f185cd8ff437554397d684aa08e35632525cc716a208c6adf21e6f83fcd87e533c2e49a3d117bfe0194ce5105c7de38f0c69ea05b28ece4e4b388c8b60eb336c3323ab084dffa3b7ebd9c6081c0a9194cb36a78ac9a6a93941f26ac834f5a4125a4fd92317acd71e3193989ac2f4dbad14a0630f3caec7a813302cccb3d4763338420e05287ec3ba133f87c7643e36b26241f5e588ba86e006423a1ecab031761877334fcbf5de13a5b7c0ed36613fd772f6baea36adaf0521a1565ba7e7fea4dd9c4b7678a1b14f8400bb8baf75fefc615e86dbeef265bb", 0xe0, 0x0) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x401, 0x0, 0x0, 0x2000, 0x0) 08:56:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000005000000000000000000", 0x28}], 0x1) 08:56:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}}, 0x1c) 08:56:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:27 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000000)='jfs\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open$dir(&(0x7f0000000080)='./file0\x00', 0x501000, 0x20) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:27 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x3, 0x0, 0x3}, 0x2c) r1 = socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='::,.:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, 0x0, 0x82, 0x0) recvmmsg(r1, 0x0, 0x0, 0x10043, &(0x7f0000004340)) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000140)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x2) 08:56:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000dc05000000000000000000", 0x28}], 0x1) 08:56:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x54000000]}}, 0x1c) 08:56:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC=r1, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000003c0)) [ 804.433225] libceph: resolve '.' (ret=-3): failed 08:56:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\xff\xff\xa8'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) listen(0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f0000001e80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000001b40)=[{&(0x7f0000001ac0)=""/88, 0x58}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0, 0x40000}}], 0x90}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000001) getpid() getresgid(0x0, 0x0, 0x0) getgid() getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xffffffffffff7fff, 0xcf41}, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) getgid() socket$can_bcm(0x1d, 0x2, 0x2) [ 804.464334] libceph: parse_ips bad ip '::,.:nullb' 08:56:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind(r0, &(0x7f0000000000)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x80042001}, 0x80) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000006000000000000000000", 0x28}], 0x1) [ 804.516786] XFS (loop3): unknown mount option [uid>18446744073709551615]. 08:56:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\xff\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7bffaf1f]}}, 0x1c) 08:56:28 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) listen(0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f0000001e80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000001b40)=[{&(0x7f0000001ac0)=""/88, 0x58}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0, 0x40000}}], 0x90}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000001) getpid() getresgid(0x0, 0x0, 0x0) getgid() getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xffffffffffff7fff, 0xcf41}, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) getgid() socket$can_bcm(0x1d, 0x2, 0x2) 08:56:28 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000002580)='./file0\x00', 0x8000, 0x10) bind$ax25(r0, &(0x7f00000025c0)={{0x3, @default, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) getresgid(&(0x7f00000023c0)=0x0, &(0x7f0000002400), &(0x7f0000002440)) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x7, &(0x7f0000002300)=[{&(0x7f0000000080)="d75650c582d38dde588f30d1b23171f8785ddac10715f396d39a73fd859951ecdf8a273d3ad64e63364887419dab78ec45030e6c507f2f0af4365ef23b8e31e7635f6e10e55b26ded078b4264e2331c05bd2a81ed2d685ca25096172d7e3dc655b8ab326ad9e5dd15e136c8845348decf7143d6e0efda5fd1990bc092a", 0x7d, 0x2}, {&(0x7f0000000100)="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", 0x1000, 0xfffffffffffffffb}, {&(0x7f0000001100)="a77b2ddcf01d5270db4d8f6cc3010376a30d32b8003df9e0e3dab6454b4403c584", 0x21, 0x81}, {&(0x7f0000001140)="2967fdb1d9c16ab459aae5f3141d50353aac3e1f0b29487d4731afe75aa21be853d403aa2092f4d91ad68d8c85fe92b28aa70cbbff64c127ad9ead97d12d431f9eb09d51c7ef41861200f524ff31d96d2907b2ec490a696bf7b2a098e8090abba17b639910bb91567b0cd5906e9cdc7a94cbcf3c51e1cbfe3e72e660f45e29814f8592c4d3f4323fd22ad7b1f60481d12213bf734433a6c9b3bc764a1a84539d8329ec26c3057d8301377f97fdc073606f86f2fb4cee1af20edd01018b009e2b58d555b7eac8e7a8212aa0a48af9d0f07865b3f0f8b05ec2df6b3245ea19d5c4da393b21e8c609e56bd785085bac87d61d670c4f", 0xf4, 0x800}, {&(0x7f0000001240)="a63354cc1c8b1c666ee6c675fc84f09289340d62e0d6a1b5a0d33099f73e3cd53eda21aadd43f1f2d8a3e96f3a3f7cf3e9ea5a7afd651eb0940c801ee184dfe3d3a3e0d935cd9c4618b6bc02cc78db33fb28f0be23978d32d20e1908", 0x5c, 0x9}, {&(0x7f00000012c0)="1632bb3c32132c0f60d9d78acbfa26e08f9c01e940c94b17dba46ce6ce2628c0023e8c78a60c0be7c16c1304bfb10fe92e247897c12496ab22151be7", 0x3c, 0x1}, {&(0x7f0000001300)="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", 0x1000, 0x9}], 0x800000, &(0x7f0000002480)=ANY=[@ANYBLOB="6572726f0d5c7c4cf1698b6d72733d636f6e7469", @ANYRESHEX=r1, @ANYBLOB=',show_sys_files=yes,errors=recover,case_sensitive=yes,umask=00000000000000000002000,appraise_type=imasig,fsmagic=0x0000000000000003,smackfstransmute=jfs\x00,\x00']) 08:56:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\xff\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000007000000000000000000", 0x28}], 0x1) [ 804.734443] XFS (loop3): unknown mount option [uid>18446744073709551615]. 08:56:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c) 08:56:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0xc8400, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f00000001c0)={r2, 0x403}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000040)=0x101, 0xfffffffc) 08:56:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\xff\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000009000000000000000000", 0x28}], 0x1) [ 804.894664] ntfs: (device loop5): parse_options(): Unrecognized mount option erro \|Lñi‹mrs. [ 804.903837] ntfs: (device loop5): parse_options(): Unrecognized mount option appraise_type. 08:56:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x88\xa8\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff]}}, 0x1c) [ 804.979201] ntfs: (device loop5): parse_options(): Unrecognized mount option fsmagic. [ 804.993583] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 08:56:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f00000000c0)='jfs\x00'}, 0x30) write$uinput_user_dev(r0, &(0x7f0000000300)={'syz1\x00', {0xfff, 0x9, 0x8000, 0x8000}, 0x3e, [0x87, 0x5, 0x0, 0xffffffffffffff01, 0x7ff, 0x1, 0x1, 0x16e7d33e, 0x5, 0x7fffffff, 0x35, 0x5987, 0x293, 0x6, 0x0, 0x7f, 0x9, 0x0, 0x2, 0x8d85, 0x7a9c, 0x6, 0x8, 0x200, 0x7, 0x4, 0x5, 0x1ff, 0x1, 0x3, 0x3, 0x7f, 0x0, 0x1, 0x0, 0x7, 0x9, 0x8, 0x3ff, 0x2, 0x9, 0x23, 0x7, 0x6, 0x400, 0xffffffff, 0x8000, 0x0, 0x200, 0x1, 0x4, 0x7, 0x1, 0x0, 0x1, 0x5, 0x53, 0x3, 0x1, 0x5, 0x7, 0x2b5, 0x3, 0x1f], [0x0, 0x3, 0x101, 0x8, 0x6, 0x81, 0x0, 0x5, 0x3, 0x3b959c65, 0x6, 0x3, 0x4, 0xfffffffffffffc01, 0xfffffffffffff001, 0x5, 0x2, 0x5, 0x9, 0xffffffffffffffe1, 0x7fffffff, 0x100, 0x2, 0x0, 0x101, 0x4, 0xe6, 0x80000000, 0x4, 0x6, 0x1f, 0x101, 0x0, 0xf2, 0x3, 0x4, 0x1, 0x7, 0x400, 0x9, 0x5, 0x5, 0xffffffffffffff81, 0x8, 0x100, 0x6, 0x2, 0x9a1d, 0x8, 0x6, 0x156, 0x0, 0x497a, 0xfffffffffffffffe, 0x4, 0x40, 0x4, 0x9, 0x7, 0x1000, 0x800, 0x2, 0x1000, 0x10000], [0x8, 0x100000001, 0x6, 0x3ef, 0xe0000000, 0x40a, 0x4, 0x8001, 0xfffffffffffffffc, 0x1f, 0x1, 0x77, 0x5, 0x0, 0x8, 0x5, 0x6, 0xfffffffffffffffe, 0xfff, 0xf810, 0x7, 0x3c1a, 0x4, 0xa1, 0xfffffffffffffffa, 0x7000000000000000, 0x800, 0x1, 0x6, 0xcfc, 0x5, 0x71f, 0x4, 0x8, 0x6, 0x4, 0x55, 0x1, 0x7, 0xffffffffffff0879, 0x2, 0x10001, 0x1, 0x91, 0x8, 0x1311, 0x2, 0x1, 0x1, 0x5, 0xab6e, 0x4, 0x0, 0x1f, 0x4000000000, 0xffff, 0x8, 0xfffffffffffffffd, 0x1, 0xdf5, 0x1f, 0x4, 0x101, 0x7], [0x401, 0x3, 0xffffffffffff0000, 0x7, 0x4, 0x40, 0x7f, 0x9, 0x7b04b45e, 0x40, 0x4000000000, 0x5, 0x2, 0x1000000000, 0x2f8f3f06, 0x9, 0x5, 0xeb3, 0x9, 0x2, 0x81, 0x3, 0x3, 0x4, 0x5, 0x100, 0x0, 0x1, 0x7, 0x8, 0x97, 0x3, 0x1, 0x8, 0xffffffff, 0x20, 0xd3dc, 0x8, 0x401, 0x1ab4d834000, 0xffffffff, 0x401, 0x2, 0x7ec40000000, 0x101, 0x80000000, 0xea42, 0x7, 0x0, 0xffff, 0x3, 0x1f, 0xffffffffffffffff, 0x5ea8, 0x8, 0x7, 0x0, 0x4, 0x9, 0x80000000, 0x1, 0x87, 0x7fffffff, 0x10001]}, 0x45c) getresuid(&(0x7f0000000840)=0x0, &(0x7f00000007c0), &(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@afid={'afid', 0x3d, 0xfffffffffffffff9}}, {@loose='loose'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@cache_none='cache=none'}], [{@dont_appraise='dont_appraise'}]}}) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x7) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000002c0)={0x9}, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x7fff, &(0x7f0000000140)) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000a000000000000000000", 0x28}], 0x1) [ 805.257011] 9pnet: Insufficient options for proto=fd 08:56:30 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) listen(0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f0000001e80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000001b40)=[{&(0x7f0000001ac0)=""/88, 0x58}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0, 0x40000}}], 0x90}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000001) getpid() getresgid(0x0, 0x0, 0x0) getgid() getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xffffffffffff7fff, 0xcf41}, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) getgid() socket$can_bcm(0x1d, 0x2, 0x2) 08:56:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x80) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) 08:56:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xf0\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa0db0100]}}, 0x1c) 08:56:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000e000000000000000000", 0x28}], 0x1) 08:56:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x3, &(0x7f0000000200)=[{&(0x7f0000000080)="109411a9ac0478bd52c6ac9ddde551df38177e3c6e860ee32043ab94de8f7c7b4d4b9964bfad118de5c1ba940dc556ce83dbc03c07fef8e47e754192791608c501e6c6fd6b819dfa94ecacc9524ac2dc044071f316c692dac52be76d56a611374323f04c4099f354", 0x68, 0x1}, {&(0x7f0000000100)="60b954188e2e6953df9fbbd53efed9c5040048cfae294d6aaccdd3ba3763c9f0340b711adbff247de114844fd2f6539045586abbdeec8aa328dea45d0ad420d829157e3536f36b732a342b4b31f26c12c1d08d265a8c36df0d5ad30d264a83207b8feca1e5e80871923da78112aacaf43eb7f5268dc04deb2009a75e96954f333004e4cdce2a146f7aefc724cdc33cf2c0bf59e21789af5017487c096c0179a1e0b2cee5c9de47d20e60", 0xaa, 0x6}, {&(0x7f00000001c0)="629fde9a34ede9864ce9b568c445733cef8e0f5c92597cd656ab55802c93b0feca363a0cd3230d2931", 0x29, 0x400}], 0x200000, &(0x7f0000000280)={[{@thread_pool={'thread_pool', 0x3d, 0x83c}}], [{@smackfsroot={'smackfsroot', 0x3d, 'trusted!'}}]}) 08:56:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000011000000000000000000", 0x28}], 0x1) 08:56:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x7f\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 806.673777] net_ratelimit: 5 callbacks suppressed [ 806.673797] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xb8ff0000]}}, 0x1c) 08:56:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x154) 08:56:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x9e\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000030000000000000000000", 0x28}], 0x1) [ 806.908352] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:34 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) listen(0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f0000001e80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000001b40)=[{&(0x7f0000001ac0)=""/88, 0x58}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0, 0x40000}}], 0x90}, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000001) getpid() getresgid(0x0, 0x0, 0x0) getgid() getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0xffffffffffff7fff, 0xcf41}, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) getgid() socket$can_bcm(0x1d, 0x2, 0x2) 08:56:34 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x8001, 0x40080) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x408800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x10d, 0x6}}, 0x20) r4 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x6d9, 0x80000) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r3, r4}}, 0x18) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x410000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\xf0\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000003f000000000000000000", 0x28}], 0x1) 08:56:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f0000]}}, 0x1c) 08:56:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffff7, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000080)={r2, 0x10}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00032cbd7000fedbdf250f000000500001000800020067000000080001000a00000014000300ff0100000000000000000000000000010c0007002000000004000000080001000a00000014000300ff010000000000000000000000000001955cc8c1ae71bb462fd1d4c184670909cbc328a61cbe355f61ff0af88cc3550994ef9b8445c066aec90412d9d896286c61bbe498d7c5efb3eef0d430dbebab73"], 0x64}, 0x1, 0x0, 0x0, 0x50}, 0x24044000) accept4$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14, 0x80800) 08:56:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000040000000000000000000", 0x28}], 0x1) [ 810.611721] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\xfc\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe0a91313]}}, 0x1c) 08:56:34 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:56:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2400200) unlink(&(0x7f0000000000)='./file0\x00') syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000180)={0x9, 0x4, [0x101]}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x40000, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x80002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0xffffffffffff8000, 0x8, 0x3, 0x779, 0x0, 0x3f, 0x80000, 0x1, 0x5, 0xfef, 0x2, 0x2d1, 0x8, 0x5, 0x3, 0x400, 0x90ef, 0x159c, 0x1000, 0x9, 0x7ff, 0x7, 0x8000, 0x0, 0x200, 0x0, 0x8, 0x3, 0x7fff, 0xa39, 0x100, 0x1, 0xb3, 0x642, 0x2, 0x7fffffff, 0x0, 0x6d, 0x1, @perf_bp={&(0x7f0000000000), 0xb}, 0x4000, 0x3, 0x8, 0x8, 0x100000001, 0x6, 0x400}, r2, 0xe, 0xffffffffffffff9c, 0x8) 08:56:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000060000000000000000000", 0x28}], 0x1) 08:56:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\xff\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c) 08:56:34 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3f, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x8) 08:56:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000078000000000000000000", 0x28}], 0x1) [ 810.995361] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:34 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x14403, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101200) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9cc) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff]}}, 0x1c) [ 811.081431] validate_nla: 8 callbacks suppressed [ 811.081438] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 811.204719] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:44 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:56:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000007e000000000000000000", 0x28}], 0x1) 08:56:44 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x404000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x5c9) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x200100) truncate(&(0x7f0000000000)='./file0\x00', 0x2) 08:56:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c) 08:56:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) openat$cuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cuse\x00', 0x2, 0x0) restart_syscall() sendmsg$netlink(r1, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)=[{&(0x7f0000000100)={0x310, 0x37, 0x200, 0x70bd2d, 0x25dfdbfb, "", [@generic="ba09d91f2cda82a17a5ebd7c548b9d03ad0bd5da4d26dd0e18357feb4c457caebad42fb71d43c7ec5b696666ee751a7eb7a9399403131e4ac67be121a594e0b26a64b676", @nested={0x2b4, 0x7, [@generic="77204f88ab23fff9db772ddd5bdedb93ba2659a97b0c05d30e8c84372180ffb05cdbedcb45f40fee601a37526cac600d5f43a1314cba13cce85a71d78e83599715b03172515bb40c57a541acc12a67f23404324751c8124af538af8616a0a677e702469bf43254013611ce4fe63791ad3dd112828a7b9dd653620745f63468bfe4c07060643eedff48698683f01d30614bd2", @generic="542863f73c6152026a4834167dc416ea910d15d925f2d6b5271e128a40b887b8a9af76188aa93e7ed5dedffe4322bd63c08f0f928a409b1b3c540f2391d69b337f881c57776fd3ac5e0b2849702881ad5d4484665f51e93258424a06f79f97d7d7604c0e3a4e2c8ce3d037173900ac9757991f9afb3f414dcbacb4893ba1fb1dce75d31f13b174d4198f7f8af11310e8ab8363a22877606aca9bd831f8135aa4dfcfecb42c675d0d6922f706381930bdf47be5e8c364fcf780db09724c5df3ea6597e54767881422d2764bf559a4df7e842607", @typed={0x8, 0x44, @pid=r2}, @typed={0x8, 0x52, @u32=0x8}, @generic="8281c0a966fe7538684bc2221252955ebfc311b44d6d107070586e8a10a0", @generic="b4c1e5cb6954a0ac3a8dba9abbff8168e9316638f88d8106a33caf3a629621762c243332ebb2b5dfb4d28e3f8d79915d8b2562b2bc57ee923c1a203420a42a5d9cc785274b38a9e394f8603e779829e0", @typed={0x8, 0x65, @str='jfs\x00'}, @generic="491a1d82d515f220121fd871d93b9af8b9bb96d969af6294117c4944ac84ec55939dc019963d3a5f20ca2d2c736fbe0c8ede4fdfe5198fda31a85db8fd1ab32f0d8803a14ad5616aef908c1989f724297439a4ab13522ac1d40916e95e735d7444e4f2fd6531724f0320eb8458349456d28d69e9f595eaeba53b238d3576a6f5eec06db26ce532951d36e0b10896c610f5110519407cafa7aabaa6772f6af7d70a81ee79a7827143b7c12181d406d8b3d56754685cb36b9a3ca16de1bbd0cdced04e20c313"]}, @nested={0x8, 0xd, [@typed={0x4, 0x85}]}]}, 0x310}, {&(0x7f0000000440)={0x24, 0x37, 0x33b5eaa8ae4824fd, 0x70bd25, 0x25dfdbfd, "", [@typed={0x14, 0x5d, @ipv6=@ipv4={[], [], @multicast1}}]}, 0x24}], 0x2, 0x0, 0x0, 0x1}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 821.262560] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 821.269914] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}, 0x1c) 08:56:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000007f000000000000000000", 0x28}], 0x1) 08:56:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:45 executing program 5: openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00000000c0)="377ebe0786f60f81e1fafeaa4a5a84bcdb434adb8f20a64d8dfff1d0f844a4138a169c6a37516a54196a7b9576", 0x2d, 0x48800, &(0x7f0000000100)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000200)={0x0, 0x0, 0x0, 0xe2}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000180)=0x1, 0x4) r2 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x10000000004e20}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000400)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc9700088800fe8000000000000000000005ec000000ff020000000000e9ffffffffffffff010000462000089078e6bd98f968c86cdf83cb9b3a207407183ef5eeff8b42c8d12eea3eda88e5d260ae8d8d75489f5247cffdbc392b4a9d9b1f3b9983115b35a67c2a6489ef37c8bb0b1a038ad863cefc37dc"], 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000280), 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x65c5, 0x400000) syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0xbd, 0x2a00) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000800}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x44, r3, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x25d}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040000}, 0x10) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) finit_module(r0, &(0x7f0000000380)='jfs\x00', 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) r2 = getegid() r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm_plock\x00', 0x40c2, 0x0) pread64(r3, &(0x7f00000001c0)=""/234, 0xea, 0x0) write$P9_RRENAME(r3, &(0x7f0000000340)={0x7, 0x15, 0x2}, 0x7) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x4000, &(0x7f00000003c0)=ANY=[@ANYBLOB="66642477598d62c9bae8836d7a6c218f22ada6b20762b3c6a2cdcc4624ab47202716c78b684f156dd866051224e5b5c22502f6c3d36efe6778f0a1e3877baeb93f45d2790ede35384e88c0c17699057431fbd1b06b71a65450ef80701a67d45728fb21e7138838c8b0041ff4fafd2465b936aba73f7bd2754a65c523177b8991f6d92e66e94903af818f8c9cf0227798ccd015ae9186d19d1c781c42e8cb822182eef8c161d41cab20019b6e00c231a04706368410a9d41aac", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303030312c6d61785f726561643d3078303030303030303130303030303030312c626c6b73697a653d3078303030303030303030303030313030302c6d61785f726561643d3078303030303030303036333531313561332c646f6e745f686173682c7375626a5f758165723d2c636f6e746578743d73797374656d5f752c6f626a5f747970653d6a6673002c686173682c646f6e745f6d6561737572652c00"]) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f00000002c0)=""/34) [ 821.456538] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:56:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000fe80000000000000000000", 0x28}], 0x1) 08:56:55 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:56:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c) 08:56:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e23, @multicast1}], 0x10) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:56:55 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x100000000, 0x600002) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000080)=0x7fff) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x8000, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x448000) fcntl$getflags(r1, 0x0) 08:56:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000fec0000000000000000000", 0x28}], 0x1) [ 831.486149] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 831.500335] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000005dc000000000000000000", 0x28}], 0x1) 08:56:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}}, 0x1c) 08:56:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:56:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000e0000000000000000000", 0x28}], 0x1) [ 831.649311] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:56:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000080)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xffff, 0x50000) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, @in={0x2, 0x4e22, @remote}], 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000340)=[@in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e23, @rand_addr=0x57}, @in6={0xa, 0x4e20, 0xffffffffffff7fff, @remote, 0x78c}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x21}}, @in6={0xa, 0x4e21, 0x49, @dev={0xfe, 0x80, [], 0x11}, 0x9}], 0x78) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0x1f, 0x20c, 0x8, 0x8, 0x0}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x6, 0xccfd, 0x201, 0x4c, 0x9, 0xae41ba7, 0x10001, 0x88, r2}, &(0x7f0000000240)=0x20) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000000)=0x1ff) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x27b, 0x0, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x0, @broadcast}, {}]}) signalfd(r1, &(0x7f0000000300), 0x8) 08:56:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x6, 0x4, 0x0, 0x2, 0x0, 0x40, 0xca89, 0x3, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x2, 0x4, [0x5, 0x1f, 0x2, 0x6]}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 831.704489] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:05 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c) 08:57:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000fc000000000000000000", 0x28}], 0x1) 08:57:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000080)={r0, r0, 0x3, 0x72, &(0x7f0000000000)="4ee5d153767f5ff51f5efafc0dd8e5405b47a0c512bacb672abdca73042c7dd2edef214db71af383f28b69b80db550c757a7df8a9cf4278f3ab17faa5d5b0c6d0468f856f0c54844ac9b3236804715a54d9e69bad2debb64c27f3f45e5601e1c23b12e5893d1631dc88bb428167a6ddaa37f", 0x0, 0x0, 0x7, 0x0, 0x6, 0x9246cc069a8d3e9e, 0x7, 'syz1\x00'}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x2c2, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400c0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000240)='syz1\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400000000020003) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000140)={0x3f, 0x3, 0x10001}, 0xc) 08:57:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x80000000, 0x101000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 841.745494] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 841.750567] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000080fe000000000000000000", 0x28}], 0x1) 08:57:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c) 08:57:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:05 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/ip6_tables_targets\x00') ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000640)=""/206) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000740)=""/148, &(0x7f0000000800)=0x94) recvfrom$x25(r0, &(0x7f0000000200)=""/11, 0xb, 0x40, &(0x7f0000000240)={0x9, @remote={[], 0x3}}, 0x12) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000140)='vfat\x00', 0x200000, &(0x7f0000000180)='\x00') bind$unix(r0, &(0x7f00000005c0)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000840)=ANY=[@ANYBLOB="000000800000000002004e2400000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000500000002004e2300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1e000100000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005b23056300000000000000000000000000000000000000000000000000000000000000000000000000000000000000f9ffffff0000000000000000000000000000000000dd0002004e21e00000020000000000000000000000000000000000000000000000000000000000000000000000000000002a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000783928f09eb46dcfbdd44602be902bfe72c3c90a94de347444eea626657e8c220fedfecd9d8356414e4f7e8e2f63f702ed0"], 0x310) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000b80)={"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"}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) [ 841.880629] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000]}}, 0x1c) 08:57:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000c0fe000000000000000000", 0x28}], 0x1) [ 841.978890] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 842.011490] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:15 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/enforce\x00', 0xc00, 0x0) write$P9_RGETLOCK(r4, &(0x7f0000000480)={0x1e, 0x37, 0x1, {0x3, 0x9, 0x6, r2}}, 0x1e) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x20b, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="83047a934d0b632ef9271c448309abce7b5806fc9952df5121440b1e666b624e578bf8f1fcfdcb7bfbe7f36d0afe80b99a2ec773d97f783c1698d276b550fd7da0ce3657d646352dbd9b9f5816c08a7cd9bcc5b1dd2a5988d265c75603642c8373b23f25a7af74e81fb0bba8be96839718324e18a6866fc0a02c36433430a9c94dc7c6cfae48a4f3dc795d5a09a9840eb339fd4dfe79294081fa743dd863aea1de02b605a5cb8289e3b0d8daf3722216f1f4dafd197ccf34cd119da98e1d2b1ee5ba210900bf4bab9a6766ad59", 0xcd, 0xfffffffffffffffa}], 0x20000, &(0x7f00000004c0)=ANY=[@ANYBLOB="6461746173756d2c6d61785f696e6c696e653d3239367f33312c6465766963653d2e2f66696c65302c7573656261636b7570726f6f742c6e6f73706163655f63616368652c7375626a5f757365723d6b657972696e672c61707072616973652c61707072616973652c6673757569643d3965626400323d7f2d663733612d3762397f2d617777342d00003473333937372c66736d616769633d3078303030303030303030303030303037662c666f776e65723c", @ANYRESDEC=r1, @ANYBLOB="2c646f6e745f6100000000000002f77073652c657569cdb9d85735b97a02b72ccec88ed6c7f1606d3419", @ANYRESDEC=r3, @ANYBLOB="2c6673757569643d0077777732003d662d636235772d7d363c632d326666342d7f6300007f3930612c00"]) r5 = syz_open_dev$vivid(&(0x7f0000000380)='/dev/video#\x00', 0x1, 0x2) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @broadcast, @dev}, &(0x7f0000000400)=0xc) ioctl$VIDIOC_LOG_STATUS(r5, 0x5646, 0x0) unshare(0x10000000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:57:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) r2 = geteuid() r3 = geteuid() mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x8000, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e20,cache=mmap,timeout=0x0000000000000008,sq=0x0000000000000004,sq=0x0000000000000000,rq=0x0000000000001000,sq=0x00000000000001ff,timeout=0x0000000000000007,sq=0x0000000080000001,euid=', @ANYRESDEC=r1, @ANYBLOB="0101000000004672eedff83a9eee52f3fcd97779655f1f372a1208523750fd0ab893ba37243c3ce115cb754cd87f80c69c5499343482a2315971cf14c9c290184a6ad173", @ANYRESDEC=r2, @ANYBLOB=',euid<', @ANYRESDEC=r3, @ANYBLOB=',smackfstransmute=TRUE,\x00']) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) 08:57:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000ff000000000000000000", 0x28}], 0x1) 08:57:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef]}}, 0x1c) [ 851.966270] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000040030000000000000000", 0x28}], 0x1) 08:57:15 executing program 4: write$vhci(0xffffffffffffffff, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c) [ 852.021676] vivid-000: ================= START STATUS ================= [ 852.044735] vivid-000: Enable Output Cropping: true [ 852.061696] vivid-000: Enable Output Composing: true [ 852.067414] vivid-000: Enable Output Scaler: true [ 852.077478] vivid-000: Tx RGB Quantization Range: Automatic [ 852.083319] vivid-000: Transmit Mode: HDMI [ 852.089853] vivid-000: ================== END STATUS ================== 08:57:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000040000000000000000", 0x28}], 0x1) [ 852.145192] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:15 executing program 4: write$vhci(0xffffffffffffffff, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockopt$inet6_int(r1, 0x29, 0xdf, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:57:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff91]}}, 0x1c) 08:57:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x44e2, 0x48000) ioctl$RTC_PIE_ON(r1, 0x7005) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000200)={0xa, 0x6, [{0xa5, 0x0, 0x2}, {0x200000, 0x0, 0x3}, {0x8001, 0x0, 0x7}, {0x80000000, 0x0, 0x8100000000000}, {0x244e, 0x0, 0x7}, {0x62d5, 0x0, 0x3}, {0x6, 0x0, 0xfffffffffffffffe}, {0x80000001, 0x0, 0xc0}, {0xffffffffffffffff, 0x0, 0x3}, {0x5, 0x0, 0xa3}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000300)='queue1\x00') ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f00000002c0)={0x0, 0x10001}) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x97, 0x2, 0x1000, "3cd1174725b06a501f984b9d73140190", "4fbf6297b86c451547926760e48ceefd2760a09c8b3b708510ec71b8a1bec5e3c9f06d31c1c39a1212b96f89cf6973d11e8cbda6ff54082638385c1ae5a7e7df964b843006ef6402bc6daec9dd8f6b6a4f6276409f6c5c96000bfb78670699e0fc21535973f594e9a4a985dcdca33298841814f30d73816741a26e190acf346f39db"}, 0x97, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000140)={0x5, 0x7, 0x6, 'queue1\x00', 0x5}) 08:57:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000100000000000000000", 0x28}], 0x1) [ 852.315714] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:16 executing program 4: write$vhci(0xffffffffffffffff, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100000001) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:57:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c) 08:57:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000003400000000000000000", 0x28}], 0x1) 08:57:16 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) [ 852.476578] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0xffffffffffffffc1, 0x0, 0x0, 0x0, 0x0) 08:57:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7bc77df8c4]}}, 0x1c) 08:57:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000006b6b6b0000000000000000", 0x28}], 0x1) 08:57:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:16 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:16 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:57:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000]}}, 0x1c) [ 852.679730] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000100000000000000", 0x28}], 0x1) 08:57:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x3, &(0x7f0000000100)=0x200, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x80000, 0x0) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x440000, 0x0) connect$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x8000, {0x0, 0x0, 0x8, 0x3, 0xffffffffffff95cf, 0x3811}, 0xffffffffffffffc1, 0x523}, 0xe) 08:57:16 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) [ 852.796475] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 852.802719] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffff000]}}, 0x1c) 08:57:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup2(r0, r0) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f00000000c0)=0x401) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000000)={0x6, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x88) 08:57:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000200000000000000", 0x28}], 0x1) 08:57:16 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x3cf, 0x0, 0x0, 0x0) [ 852.959138] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 852.980786] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c) 08:57:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000300000000000000", 0x28}], 0x1) 08:57:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 853.106733] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:16 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:16 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:57:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 853.156159] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000]}}, 0x1c) 08:57:16 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000400000000000000", 0x28}], 0x1) 08:57:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x50000, 0x0) setns(r2, 0x20000) [ 853.277243] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 853.291418] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff7f0000]}}, 0x1c) 08:57:17 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(0xffffffffffffffff, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:17 executing program 5: socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x28320, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000000c0)={@mcast2}, 0x14) 08:57:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000500000000000000", 0x28}], 0x1) [ 853.412118] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:17 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, 0x0, 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) [ 853.467046] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000017c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000001800)=0x5, 0x4) r2 = geteuid() syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x20, 0x5, &(0x7f0000001380)=[{&(0x7f00000000c0)="9a2a89a4f04a9c8f1c4f69ed8747d0c42c3394ee5c98a89f5fdbad72b0748ec600f666a5554d0a5e9b9feeac8359a0e8a86711d642a7ee8b3cdb919781b04d827ff30e3671d686889850573399e7e00a0f5e1aac359c0e54afbb92011c12061b57b0b9fee62f98ea84050638f2e261b64f7e646ab172051dc51a013c6ecb5dcbc6fe1c8f7aa1b2078c30b219c2d7417439259456fbfa708a495e424ccc8df8774a391c6952f8a8bf07edbaae0e4fbabf2453e2116eff410b53a718084edf946973e4e18022ac5f5908b4a758095717bc8d7bcb476767f80dffed7cac2b382e7ea71c08ba9d1f7d50faf4e064616f5e701654b3f2d58a581a16bdd2cd8bd123a8e978594f51f6bfa61193f6f1c45e064f74490fd9c3dfdb6e391e3b793f079dc1d79fa27cf9ea776875e7487aa0b2add13eb30189e0159cc751084cec2dc58b8fa98d7adec3937822732c2174bfe04c4fab8348ce98906dc505141ffd4598304aae9189f1903ae9d749b2e237266f41def53f5f07b43ca4ff9fd46f7a31f3ab337ca28f0569d8ac2441aed1d4f984e00178863052a9a6a30254c45232f33206a36d9201bc6fbcbf8773c49f78afb54d2418342b3e8eba146c23d1c692409030ff4980d1985c3c2a9844f8462889b7141b4dfe0970075ddbb8f84290d530735d78b985a76b00a0efd80f5e5d59e199d18232c5a2b478192e1c0d73558243ad5d3001c71e8ded6eaebbde80173f3d905317549dfe0536a6adcc660320289fbd9145ccf576c86a49e5b72de807ed5d5bc7841bde784515c58f48e3dc12947dccefb82bfd8bbd176bf583cfe0e80dea3fc440cd2ad424631c295e9cee82c83a732ee77a34283919341f89156e02a644155d5d7e4280e58939da48b2f72593acb43541d55be4b455bf9b409f8e80f2d3d2db549b8d78d1ad5863e900d3455384460760f486bda129302e3b52abf8eb19d33d1601873e37597e106f4305c5bb8bb6d0a5d5d233116e26a498722909b975a247807dadea820b625aefb24534b5f3e783da1a698d8412ba6468e8aa5b52ac71e8969e4ddca366712a393751ab2ae7da101cbb4f2ff4ac21d93609c82263d2fd6c8283e4d88d8c2e790163f789661fd2fac7fb351d21b296ffb5800e5c2980b77a1fc0973cde306257e5a4a99433268cda6ea02399156593158a3dc4407303dc3c060ddff060476f860c41a1ae74df0de8adb82779261b22c23bf193df472741c2a330890deb18f5a359a851e842ade2d634fc20bf79cf00a14f30fa71c545598574f4d7e4c4caf186ec48eb7aaeb75f6185e1156b3b65257ad71521470534d196b2e33c55553196f6335071a93d844a1deba78b78cf7242555a21263cec2acc95c5e434d9e84d1226446ce1a33bad21d6c4220db3545ab8879c9d841a2e39d4e8fb614abc372ab5bcb92c3bdd4e85b31455299f0a4c5f25f89dfdd6ca5bdf34fe2851e68dbdaec08efc07d05a63f403fdb503557c35c9b6c7befaaa1f121d33ee48c605a5247e8d4ef8f711e48c9cdd2f33a568023c7e203b6644020276ccf70e0c3442d8122f93af23fe92478321610c3ecd2b6cddcef62b648c58e0ec0533253c4ab72db0ccc8ef293f12bc7f05b9868e98a7527835feacd141b03e459e7566f2137566d43f5f49842b428fef923512b1717f94fb30c07455cd30f865ed7ca02fafb63acf588f8317c598ea827862b810e70c766f8a51200ca25218ee52e2a79b2d277101084c8a075146b9e8a0600e6a21c9e82ea7e853c5d2edd4770e887571529bdf60acbea1876fe3d79e744134dd821fece56758f00f642426f721c2c916dc68d663ca70943ca3c3915511afdad3fb84f8fbe453580025118ad0063c837b63eed8889824a679042f5f13f9a00e08b15489b7dfe3f637a3536491fe8574cd80810b69aea85972b8ef2cea50dd14c95c6337843408c9b8eb20f619818de49022a6b8f90c48f78e5c15beffbefffa217168d9df46cc7e6f389b3b3d367fd84726d48583da8ce4517ad6e364d178e30616ac8acb6854ea86496bb692cbcf3b1f9062e0db6bb6ccb5f67ba4d872d62a595628dd55f21bca75aba4e012c33a05e99af5f78e642eaac85d8a95c6d02817a4bceca14102aa9bba02c30cff4226d40241058eb3202dd59bb04c9b8bd7700d5786bed745852795b7a9b7e80b6f0af4181ad7751e7b5e8c41810e61ab413fad70a2553848a520cab662dfafbc22a675bf08d46c450e0a97c5e2c94d37f1dc00a588164232401fc043fd1e5d99e7e29b70536d8bb46d9b9c227280a1e94413da9e6d8ace6b8ea6465748834a0b1e4f0565b0ea20e545c204d1894684ea1d7e43e7e59fdc82b0d406f2397b28dc33ac47c026178c576c95c476811c28d81b66b27daf281103a416f328547d4caf5ce0851849eebeb95f1778e81990efd7f4d80e094bfd3fafd1971b590ed768a90b9812751183d9aa1ee1450a876724e5cb4ac99e90ed6d2d8c11ffeb789ccf343b361b2a1922c1e0a04c2fc7fd91b29e3554d84682d501be739482a2cba9b18908789fbd0ec18d2fd4093e5b509339606e271adb249047006f9b6a2e9399fcb38de9dbdb981357419430271cfc1bc84f1d30119688f103142e61d06ab2b6415bc0674d52406877eef1e2a62f27d5bcd2da1cbf1d8f3f52f30c5dab01479978c2ac0d29b70743ee98db23e3e91adad85cbbf92300e9a8e505399dc32ae213178a26a0f9a7d5be2774a6564d0b22988e227c42b5f915b0cf6c3a63cd67c9e5ae265e903432ffbb92bfacfe88ab1880679c8c70a9e17b8073f2c129cf63090faa7065d86931af03f64cf7c926776ecdd626a906b983ddea621f779c507da6c3a55a64a491ef73167048ba70627ac15b01a1ac1f3d31d6a4ee29358bd27832b4247e6d717468a862b16d753f4a791d7082245f32d1f6e6ec177f4b9f7eea0030a5fd9b7411b4d11c1fab2e1964c7b9295fccdca48e97c8395459eb30eb2ae0081b0b76f232529c16a4234103fd81b74d4219cbcebfd41117aefd16869a4fe60fe12cdccf35daf5055dce51999f2c0fa945b9025a7dcc0c3f8c93b9a6d945c9c997fb0230b82bd556eef410d063a6f4304a0867274682be17f0689366994b298032760518b20866a0643c08d78540e86acff239382ea1bdcd262066f355d12e628c86ec92d55acb9c66b8b5c6fa59aa8efac7eea9bf4fd08b86a620febc5ff397a90ad3f1c7e09b6a41cfb53c12d29ace9cc0c017214118851a155ead99b6f80e0b5d8132378620955d4d41ad73ec08228c18567b7abf66e812830490995950861a8dbd71a7e27abf96356090a90552241671486512a1a23f49abbd2e05dc63895d9b03f8cfa7ba891af5a51bf7e9bc93a750604e38b5289ed518b8c4a5c92b69d74a916b8bce959e47820654e2eae320704f54f7ab5a6a3c05cc6abcc832c50c5dd3a3dd3516df648021c4e1c3d6619219b42b13c7411dd86a1d56e03a155c358b0a70b47a87eb3506e24a3a96c021e6520d93c5364248b994719ab3d8cdda602d7b0063f035e5ab66024449dc6fac07bf47800f93bf03b1a19f5679f0dd6cc1182167e850950df8002dfd6e09def881ba254c89eadc906ad67c3382a4dcb748f4fa50f44a21fcaa44c613e759b1375faa97ce2b14b20693881f7611117dfcb292f1f1c0ad2ac35d35094c2a08072627adc39376f584ccdddf0dd2b10e50c8f77e7a15d95585b71287031c1fa8c738642a0aba4029a64ba8b34f8078932a9de11115c2d4b7e018d90b4a58033dc339ad8e377c626271baac1e9221843fe21b891d0cc365ac7c7689e834e6ce83815c25d939773174fd4f33bd6c51af0ba3df7c9d90a65e666457c1fcac215361f2639e4f57d930898b9e99321c69e5897dd002122fdcc89f2b47a588e60a39dfe8761f1a2fd57e2ffd74723f1fa81e8fa6394302c178383b6816f2a6b26fb91fe40db6ca8048ae6a0eacfe60949496b9335f2af8bf3eff91517df5a6de53b9c38c46863b2e337e9607ee23cbabb968b88813c3e6962aa486e04f6c4b3de5706abc0bf67a819ab10f7db549045508098afb9fcf3180b55a5690ee0ead944ae583a81e64b73f91371b6e0ad128e6b1b5d6a1d543c2ac3cf2c74a3ba9f5f4fdf4659c4c29f968913c941ec92a5c0fdbf15c8e49543a4ba92445dd3051e27e23cb8a910631fa6571d6074ebbc035a563ecabe70abac0dc3247d92e87692963874998c73686cdfddedf138e022dd9b570c71d8c5b3ae9e0c364ff1e2ae61b39714bd06d9d4052672787220a684d72f2a2d26ca5f4d3f2be0d0b940e61f59303006cf4f03852f82ed540795841810ffd92aacf7c1a99c13b34c3355544b3e0abce2a57db19b1378b847441da0b116640912b869ded74023c9123b47bb3552510f596d86590d30b66a6bd648991f00ca2b7d64ed67d2417e16aea461c76b67701c412e7827d5af57e0a9f37e6fbc48ae017eec13af1135f0733db5818184f983bce0a660e0180db91d751a4cdddc4c96b060f71614fdf1beb283e66577bfe34a93ae3f983b5f718cec19ea811ba105fb430311b528884ac0f3fc75cbe6143c451c50cb3e44c34c47b1d5bed25d73bb9a9dc1b7436a9489b8fd296c02c680d7731b8ae8b573ae971664325d6b9cb48793dbdb02debf6bb4c16ccd3049994508258c12653c8cbcd0d6af08108e4421e61e5b30c0fd46dd6e29e8c3ba4d1193e2d3150f49c321b69f09a6bbe4fd4ee77cf499058a828dd2ce1135424a0897f93f871797113fdbc08a4d8bac02029edf375ce2e853d11a89394849fe1267a7c38a37b5bd6bb5b8d48a4608fd4f9f31ad74a0b987e4547ac7519347d9cf0b4dca1a3dd99da7b08c12d419286cae3463be4fb52a487937ad1e71705355e31f43a2902aedc70cb7d57c961b59c37bc1ca17f543cb2c4df9853e777cd29172f961f68a4a99ab3da3ab73fc33e465b356790892a76079cad89270fe0016de4a628cecc2fb79e41b7c15fa3b02dcc66b48956c41d5322153cd5ab74341a8a8802070badc79c084842331df021beecd322c05ac9f6e5446c0e5d828baa3fb1c9b0904d6b82e82f4cd4465a3bd3c17da0caa6fff3f39ef86e81f76d0449b3ff6bdc7aba0ab0419461c546682f93089b772e08d6f2869b44e51608d0afc7b1e34fcf811e81f7753b23767563a0c16ac4193967fb8c3535262a53d5f44e83d924c52a3da6fa831836ef595ef8e4019ea8be76fcc643e135082078687cc369d3b53a46979c61f4f1e97cec234ddd4ebdc399e7c2e547cbb9852a4649a16fabcba0e25332d21880184f9a475cf24865816c60fe2b5ba949bc975beecb4d1747f7199f734db628c5f8816daaae0a03a0b85212b283ed973835c610a306a17a8ed96b33be30888b6e58371b99f2ccc343f5b9329abd176a62f7cd249bcab8ca006085489283031f1bbbf1f8505a924707c79b9fee87cb07155f03a3827d8ff6cba6583ecc32b37624ab4d83c5bbe0df6a8dd9d525a8c233476ef1c14dbc01b54560db9f11c259584a47c198aee1d5de1ab732ec3311a08066aa824bf7e34b463f4da668eb53a529bd862ac35d6e3ee5e9ef97739918b576441470de17368bdaf856c24847f68fbeb45ba61c1d3571209b2493d663338a11302276268e94b6e261ee9ee91464fb88c327904086d39146d03ba09ad56e0a1c24189694e1f4d20c7ce31e5d14daccff87e2971264aff98fa9cdc1fde5af32b27b697f14e77c962109d5168306edadef4614a6928dfbd002302a11274f60", 0x1000, 0x8}, {&(0x7f00000010c0)="ecd944916c0de9c9ba26bc14fcaaa75e530a7b0847bcbab0230d2e9522579e817869734874ab41c8bd54fbbeb4a0bb64e2203f23970c0cc723f7d1ca47c18a58703015faf415dcdc305689cf50b633f56aac23743234fe5f6c8c4f3e8fb3d0f6316d7f1dcc80e37c807d226895f75691511f1f07bded700fea4699c8b6f4abbbcb728899e85a74ed532365b7d875362480661fe293cdf1501ee81659f941bd24ede438d27f73635782b581876c45ec9bf235774d", 0xb4, 0x100000001}, {&(0x7f0000001180)="52e3157b22151ff400cad87c698d355a08eff3dad8d4aa25a1945adb1dae3490020f7be07363625f080894821126a364e66c373559e5decc6ffe46eb3478a8cb3fecdc2f6a7bced10d655a227930f417ba6473a7353fc5fecc0c1425646f78ac589973ab6a517322e62f08664cd2271790024d8b7c0a2c9b875ec5b5548c3184c443c2055dae198ecacb3d4fae662901635a7c2534730ab427af9af49bb8819d7451fead34ad83fa7bc782638ba70b2f88042a89787546b86b6f6b488792816c3979d32048eac55ffbb9a3c2616b451639b9679caadd1572be7f1cb0876ad4a99ac2f22636ab80be32", 0xe9, 0x1}, {&(0x7f0000001280)="92f09ffacbffef056ba674f7021c2c09b73dd0e73874c5f38ff32b", 0x1b, 0x3}, {&(0x7f00000012c0)="5154600b04b76899e38df2ada1a53820267eb4d02a6d6de98ae999d20adaac2045ec010e87f6356c3b1f9342491a8a7400ee18bbd37db684624173f7a0380cc5c06d753bb76e6be2d3643e9d498bab9c5846b3b222e35ce1e6e124eb5210bebc486c3a141e351fccde3a19c73ca72b787ee3ad85e0431e8e4b72a49ba0d717523f92088dd92ab61a2ced2c7786461718475669c6e0189ef16ac0b0afb52c45d3a408283df43fb52bea8f9121ca63ce", 0xaf, 0xd8}], 0x0, &(0x7f0000001400)={[{@grpquota='grpquota'}, {@iocharset={'iocharset', 0x3d, 'cp857'}}], [{@dont_measure='dont_measure'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsdef={'smackfsdef'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/avc/hash_stats\x00'}}, {@subj_type={'subj_type', 0x3d, '--'}}, {@fowner_lt={'fowner<', r2}}]}) 08:57:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000600000000000000", 0x28}], 0x1) 08:57:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x1c) 08:57:17 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:17 executing program 5: socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x28320, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 08:57:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000700000000000000", 0x28}], 0x1) 08:57:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 853.694731] jfs: Unrecognized mount option "dont_measure" or missing value [ 853.712393] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000800000000000000", 0x28}], 0x1) 08:57:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}, 0x1c) 08:57:17 executing program 5: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9222, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x2, "d80a611d3ada197f"}) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sysfs$3(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r2, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_int(r1, 0x0, 0x0, 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ptrace(0x4206, r3) ptrace(0x8, r3) connect$netlink(r0, 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x53, 0x0, 0x7d, 0x7, @scatter={0x0, 0x0, 0x0}, &(0x7f00000002c0)="9e9d0693e3f44b2fa6859e080a581db57936ff5113569a1d1324c874117168fb8eab8ed2161969c21552f71e416fd5eb2c688ad663afe891608078828aef4262661198a7cb9a57cb8b2eebc989f844ab084888067c5b309601c6f6a2282e0025866deb94fc1c26384f4c0f125cdd34b2d58fde854f41671224debc0346", 0x0, 0x2, 0x1, 0x1, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x3}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={r5, 0x20}, 0x8) close(r4) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) [ 853.844541] jfs: Unrecognized mount option "dont_measure" or missing value [ 853.900553] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000040)=0x1c) 08:57:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:17 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000900000000000000", 0x28}], 0x1) [ 853.962788] sd 0:0:1:0: [sg0] tag#6519 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 853.971625] sd 0:0:1:0: [sg0] tag#6519 CDB: Service action in(16), sa=0x1d [ 853.978719] sd 0:0:1:0: [sg0] tag#6519 CDB[00]: 9e 9d 06 93 e3 f4 4b 2f a6 85 9e 08 0a 58 1d b5 [ 853.987599] sd 0:0:1:0: [sg0] tag#6519 CDB[10]: 79 36 ff 51 13 56 9a 1d 13 24 c8 74 11 71 68 fb [ 853.996496] sd 0:0:1:0: [sg0] tag#6519 CDB[20]: 8e ab 8e d2 16 19 69 c2 15 52 f7 1e 41 6f d5 eb 08:57:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}, 0x1c) [ 854.005385] sd 0:0:1:0: [sg0] tag#6519 CDB[30]: 2c 68 8a d6 63 af e8 91 60 80 78 82 8a ef 42 62 [ 854.014342] sd 0:0:1:0: [sg0] tag#6519 CDB[40]: 66 11 98 a7 cb 9a 57 cb 8b 2e eb c9 89 f8 44 ab [ 854.023182] sd 0:0:1:0: [sg0] tag#6519 CDB[50]: 08 48 88 06 7c 5b 30 96 01 c6 f6 a2 28 2e 00 25 [ 854.032090] sd 0:0:1:0: [sg0] tag#6519 CDB[60]: 86 6d eb 94 fc 1c 26 38 4f 4c 0f 12 5c dd 34 b2 [ 854.041010] sd 0:0:1:0: [sg0] tag#6519 CDB[70]: d5 8f de 85 4f 41 67 12 24 de bc 03 46 [ 854.209673] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000a00000000000000", 0x28}], 0x1) 08:57:27 executing program 5: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9222, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x2, "d80a611d3ada197f"}) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sysfs$3(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r2, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_int(r1, 0x0, 0x0, 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ptrace(0x4206, r3) ptrace(0x8, r3) connect$netlink(r0, 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x53, 0x0, 0x7d, 0x7, @scatter={0x0, 0x0, 0x0}, &(0x7f00000002c0)="9e9d0693e3f44b2fa6859e080a581db57936ff5113569a1d1324c874117168fb8eab8ed2161969c21552f71e416fd5eb2c688ad663afe891608078828aef4262661198a7cb9a57cb8b2eebc989f844ab084888067c5b309601c6f6a2282e0025866deb94fc1c26384f4c0f125cdd34b2d58fde854f41671224debc0346", 0x0, 0x2, 0x1, 0x1, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x3}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={r5, 0x20}, 0x8) close(r4) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) 08:57:27 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, 0x0, 0x0) 08:57:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:27 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x100000000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f00000001c0)="285c0ec5b87e0f5a9c5fdb6fbd923662b8385a651b95f89e295c7150bfe8804b74ca0b66e9a3b9a27afb4d9eaa128c01", &(0x7f0000000200)=""/22}, 0x18) socket$inet_icmp_raw(0x2, 0x3, 0x1) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x8000000000003) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xcd, 0x80040) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0xb862, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400202) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:57:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c) [ 864.135379] validate_nla: 5 callbacks suppressed [ 864.135492] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 864.140037] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c) [ 864.190230] sd 0:0:1:0: [sg0] tag#6476 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 864.199002] sd 0:0:1:0: [sg0] tag#6476 CDB: Service action in(16), sa=0x1d [ 864.206072] sd 0:0:1:0: [sg0] tag#6476 CDB[00]: 9e 9d 06 93 e3 f4 4b 2f a6 85 9e 08 0a 58 1d b5 [ 864.214951] sd 0:0:1:0: [sg0] tag#6476 CDB[10]: 79 36 ff 51 13 56 9a 1d 13 24 c8 74 11 71 68 fb [ 864.223830] sd 0:0:1:0: [sg0] tag#6476 CDB[20]: 8e ab 8e d2 16 19 69 c2 15 52 f7 1e 41 6f d5 eb 08:57:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000e00000000000000", 0x28}], 0x1) 08:57:27 executing program 5: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9222, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x2, "d80a611d3ada197f"}) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sysfs$3(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r2, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_int(r1, 0x0, 0x0, 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ptrace(0x4206, r3) ptrace(0x8, r3) connect$netlink(r0, 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x53, 0x0, 0x7d, 0x7, @scatter={0x0, 0x0, 0x0}, &(0x7f00000002c0)="9e9d0693e3f44b2fa6859e080a581db57936ff5113569a1d1324c874117168fb8eab8ed2161969c21552f71e416fd5eb2c688ad663afe891608078828aef4262661198a7cb9a57cb8b2eebc989f844ab084888067c5b309601c6f6a2282e0025866deb94fc1c26384f4c0f125cdd34b2d58fde854f41671224debc0346", 0x0, 0x2, 0x1, 0x1, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x3}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={r5, 0x20}, 0x8) close(r4) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) [ 864.232808] sd 0:0:1:0: [sg0] tag#6476 CDB[30]: 2c 68 8a d6 63 af e8 91 60 80 78 82 8a ef 42 62 [ 864.241743] sd 0:0:1:0: [sg0] tag#6476 CDB[40]: 66 11 98 a7 cb 9a 57 cb 8b 2e eb c9 89 f8 44 ab [ 864.250706] sd 0:0:1:0: [sg0] tag#6476 CDB[50]: 08 48 88 06 7c 5b 30 96 01 c6 f6 a2 28 2e 00 25 [ 864.259614] sd 0:0:1:0: [sg0] tag#6476 CDB[60]: 86 6d eb 94 fc 1c 26 38 4f 4c 0f 12 5c dd 34 b2 [ 864.268523] sd 0:0:1:0: [sg0] tag#6476 CDB[70]: d5 8f de 85 4f 41 67 12 24 de bc 03 46 [ 864.369508] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 864.381651] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000001000000000000000", 0x28}], 0x1) 08:57:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$KDDISABIO(r1, 0x4b37) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0xfffffffffffffffe, @empty, 0x2}, 0x1c) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:57:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}, 0x1c) [ 864.472740] sd 0:0:1:0: [sg0] tag#6477 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 864.481469] sd 0:0:1:0: [sg0] tag#6477 CDB: Service action in(16), sa=0x1d [ 864.488530] sd 0:0:1:0: [sg0] tag#6477 CDB[00]: 9e 9d 06 93 e3 f4 4b 2f a6 85 9e 08 0a 58 1d b5 [ 864.497416] sd 0:0:1:0: [sg0] tag#6477 CDB[10]: 79 36 ff 51 13 56 9a 1d 13 24 c8 74 11 71 68 fb [ 864.506345] sd 0:0:1:0: [sg0] tag#6477 CDB[20]: 8e ab 8e d2 16 19 69 c2 15 52 f7 1e 41 6f d5 eb [ 864.515291] sd 0:0:1:0: [sg0] tag#6477 CDB[30]: 2c 68 8a d6 63 af e8 91 60 80 78 82 8a ef 42 62 [ 864.524219] sd 0:0:1:0: [sg0] tag#6477 CDB[40]: 66 11 98 a7 cb 9a 57 cb 8b 2e eb c9 89 f8 44 ab [ 864.533075] sd 0:0:1:0: [sg0] tag#6477 CDB[50]: 08 48 88 06 7c 5b 30 96 01 c6 f6 a2 28 2e 00 25 [ 864.541947] sd 0:0:1:0: [sg0] tag#6477 CDB[60]: 86 6d eb 94 fc 1c 26 38 4f 4c 0f 12 5c dd 34 b2 [ 864.550842] sd 0:0:1:0: [sg0] tag#6477 CDB[70]: d5 8f de 85 4f 41 67 12 24 de bc 03 46 [ 864.567088] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 864.664076] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:37 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000), 0x1) 08:57:37 executing program 5: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9222, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x2, "d80a611d3ada197f"}) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sysfs$3(0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r2, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_int(r1, 0x0, 0x0, 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ptrace(0x4206, r3) ptrace(0x8, r3) connect$netlink(r0, 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000440)={0x53, 0x0, 0x7d, 0x7, @scatter={0x0, 0x0, 0x0}, &(0x7f00000002c0)="9e9d0693e3f44b2fa6859e080a581db57936ff5113569a1d1324c874117168fb8eab8ed2161969c21552f71e416fd5eb2c688ad663afe891608078828aef4262661198a7cb9a57cb8b2eebc989f844ab084888067c5b309601c6f6a2282e0025866deb94fc1c26384f4c0f125cdd34b2d58fde854f41671224debc0346", 0x0, 0x2, 0x1, 0x1, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x3}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={r5, 0x20}, 0x8) close(r4) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) 08:57:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000002001001000000000000000", 0x28}], 0x1) 08:57:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c) 08:57:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x389, 0x0, 0x200006, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 08:57:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3e, 0x402400) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000040)={0x9c, 0x2, 0xffffffffffff7fff, 0x1, 0x8}) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 874.377644] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 874.398778] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 874.466188] sd 0:0:1:0: [sg0] tag#6494 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 874.474970] sd 0:0:1:0: [sg0] tag#6494 CDB: Service action in(16), sa=0x1d [ 874.482014] sd 0:0:1:0: [sg0] tag#6494 CDB[00]: 9e 9d 06 93 e3 f4 4b 2f a6 85 9e 08 0a 58 1d b5 [ 874.490931] sd 0:0:1:0: [sg0] tag#6494 CDB[10]: 79 36 ff 51 13 56 9a 1d 13 24 c8 74 11 71 68 fb [ 874.499823] sd 0:0:1:0: [sg0] tag#6494 CDB[20]: 8e ab 8e d2 16 19 69 c2 15 52 f7 1e 41 6f d5 eb 08:57:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}, 0x1c) 08:57:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x20000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0x5, 0x2, 0x8002, 0x8, 0x3, 0x8, 0x3, 0xffffffffffffffe0, r3}, &(0x7f0000000100)=0x20) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000340)={0x7, r2}) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000140)) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000300)) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:57:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:38 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x8006, 0x16e8) r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000280)="ac0d840bb87d83c0754871fe419a5083e322b7901fac1e44ff53748ea416dadb3650494e9c9c8fafc5c7181ca7999bf3f3d07e0afe8895cba06021bceadef07e632262f788899959ba54445ebd332af962bab80b4fdbbd98fa999fbda1c21d9f470aa8785a944a11e359133da5bf63c5de49fcf750db1a78266a1869cf6149de6937d7e9ca01a7aa0a27a4b83f11694d980dc8a27319496d31b7509730478b52e593cdd79d00dcb85c8855624a8be03eba3b33bb2c19bd8c234ba9e18db8e7cee0892fec13bd9f8c8f7f11e9380349864ef01f49a85636c0ad652dd7ce39a818998aa34495d9bc2e6c0c69e805c845b02a3ce7859a403ed6ec961efb5c0c8df40b359a0dd63caa687ddd8d6503009c7d17ae43b792cec5ceee817d4739e3afc05da44b6fda9b0d3684bfc56080e828a93975f8beb5c28550b09ea18e5ba938af3c0e79a77fd338a60b55a56120bba1c30f9556150ca6a7192bedc184feaaa995a881101e8a35add806237aaee95e5d77a852ea77c4255298cbe825d31be64fa1f99397efc1d9b2ba48f350f0b1787eb24f5c4e524649c650478c0ddcfa595878a4a343158ea61db18f", 0x1a9}], 0x1}, 0x0) 08:57:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000001100000000000000", 0x28}], 0x1) [ 874.508792] sd 0:0:1:0: [sg0] tag#6494 CDB[30]: 2c 68 8a d6 63 af e8 91 60 80 78 82 8a ef 42 62 [ 874.517688] sd 0:0:1:0: [sg0] tag#6494 CDB[40]: 66 11 98 a7 cb 9a 57 cb 8b 2e eb c9 89 f8 44 ab [ 874.526633] sd 0:0:1:0: [sg0] tag#6494 CDB[50]: 08 48 88 06 7c 5b 30 96 01 c6 f6 a2 28 2e 00 25 [ 874.535542] sd 0:0:1:0: [sg0] tag#6494 CDB[60]: 86 6d eb 94 fc 1c 26 38 4f 4c 0f 12 5c dd 34 b2 [ 874.544413] sd 0:0:1:0: [sg0] tag#6494 CDB[70]: d5 8f de 85 4f 41 67 12 24 de bc 03 46 [ 874.600442] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 874.625976] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c) 08:57:48 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000100)={0xa, 0x0}) 08:57:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000001000012000000000000000", 0x28}], 0x1) 08:57:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001c00)={0xffffffffffffffff}) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x125, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) mount$9p_tcp(&(0x7f0000000480)='127.0.0.1\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000580)='9p\x00', 0x800, &(0x7f0000000a40)=ANY=[@ANYBLOB]) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000140)={0x5, 0x5339, 0x0, 0x0, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x7, &(0x7f0000000540)=@framed={{}, [@ldst={0x0, 0x3, 0x0, 0xe, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0xbf, 0x0, 0x0, 0x0, 0xffffffff7fffffff}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xf}, 0x48) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2f, 0x0, @remote, @local, {[], @udp={0x0, 0x883e, 0x8}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x11, &(0x7f00000007c0)=ANY=[@ANYBLOB="232af359dee5ac5f9626bacb89e6f99596092a5e29a047445c8f044c1e6554cd0ec535a851652b1891b8e1f7ec7ce73d7c153cf8cb436461b684e745afc6b203da1568e515d3a5ea670199cfa12e7ec2dbdeea9468e7fef3946e94d9192bdabc19cdde62278c9844da54659c339559b93d4de85baff7124ce3f0e18f05e3189467d929dbd60e1afb2bf3fa40"], 0x0, 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000cc0), 0x4) write$cgroup_int(r2, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 08:57:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000040)={0x11000, 0x10000}) [ 884.613881] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 884.658072] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:48 executing program 4: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$inet6_int(r0, 0x29, 0x7, 0x0, &(0x7f0000000080)=0xacafcb82cc385f81) 08:57:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000003000000000000000", 0x28}], 0x1) 08:57:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c) 08:57:48 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 884.736539] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x5 [ 884.760880] device nr0 entered promiscuous mode [ 884.837955] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 884.877003] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00bb with DS=0x5 08:57:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) syz_execute_func(&(0x7f0000000140)="cd8075fcb0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b0b5d90000797c2a0f0fcdc4e3a95fd965eae23c3b4d4d408064797f41dfdf400f01efe5e59d7d2f2f1c0a1a63460fc4c161fccddfde9f") syz_execute_func(&(0x7f0000000140)="cd80c20000b0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b02db5d90000007cc4c4e3a95fd965ea262e410f0ff5bb408064797f41dfdf400e01efc4a1fd28d29d7d2f67450f483b1c0a1a63460fc4c161fc4d96040476789f") [ 884.883248] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000003f00000000000000", 0x28}], 0x1) 08:57:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c) 08:57:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) timer_create(0x6, &(0x7f0000000040)={0x0, 0xa, 0x1, @tid=r1}, &(0x7f0000000080)) inotify_init() [ 885.132095] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 885.416705] audit: type=1326 audit(1546851469.056:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10073 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 [ 885.620526] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:49 executing program 5: r0 = open(&(0x7f0000000000)='./file1\x00', 0x400043, 0x0) close(r0) prctl$PR_GET_TIMERSLACK(0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001f00)) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) sendto(r0, &(0x7f0000000240), 0x25d, 0x0, 0x0, 0xfdc1) 08:57:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000004000000000000000", 0x28}], 0x1) 08:57:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x1c) 08:57:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xf0\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) socketpair(0x13, 0x4, 0x2, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xd, &(0x7f0000000140)=""/37, &(0x7f0000000180)=0x25) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r3, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0xe}, {&(0x7f0000000200)=""/98, 0xffffff03}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4, &(0x7f0000000440)=""/45, 0xfda0}}], 0x1, 0x0, &(0x7f00000050c0)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r5, 0x4010aeab, &(0x7f00000001c0)={0x1}) 08:57:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x02\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 885.773332] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000006000000000000000", 0x28}], 0x1) [ 885.804033] audit: type=1326 audit(1546851469.426:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10073 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0xffff0000 08:57:49 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1, 0x0, 0x0) 08:57:49 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x0, 0x4, 0x3}, 0x2c) r2 = socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='::,.:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, 0x0, 0x82, 0x0) recvmmsg(r2, 0x0, 0x0, 0x10043, &(0x7f0000004340)) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x2288, &(0x7f0000000140)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000100), 0x0}, 0x20) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@ng={0x4, 0x13, "4c722e05e2"}, 0x7, 0x2) [ 885.935254] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}}, 0x1c) 08:57:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000006b6b6b00000000000000", 0x28}], 0x1) 08:57:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x03\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:49 executing program 4: [ 886.076219] libceph: resolve '.' (ret=-3): failed [ 886.088269] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 886.098716] libceph: parse_ips bad ip '::,.:nullb' 08:57:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}, 0x1c) 08:57:49 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000007800000000000000", 0x28}], 0x1) [ 886.140439] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 886.155758] libceph: resolve '.' (ret=-3): failed [ 886.176125] libceph: parse_ips bad ip '::,.:nullb' 08:57:49 executing program 4: [ 886.275928] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendfile(r0, r0, &(0x7f0000000040)=0x5d, 0x2) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x80000, 0x0) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x30, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCDISCONN(r2, 0x7439) 08:57:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x04\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:50 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x0, 0x4, 0x3}, 0x2c) r2 = socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='::,.:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, 0x0, 0x82, 0x0) recvmmsg(r2, 0x0, 0x0, 0x10043, &(0x7f0000004340)) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x2288, &(0x7f0000000140)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000100), 0x0}, 0x20) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@ng={0x4, 0x13, "4c722e05e2"}, 0x7, 0x2) 08:57:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, 0x1c) 08:57:50 executing program 4: 08:57:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000007e00000000000000", 0x28}], 0x1) 08:57:50 executing program 4: [ 886.788291] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 886.809534] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000007f00000000000000", 0x28}], 0x1) [ 886.836775] libceph: resolve '.' (ret=-3): failed 08:57:50 executing program 5: socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x0, 0x4, 0x3}, 0x2c) r2 = socket$alg(0x26, 0x5, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='::,.:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, 0x0, 0x82, 0x0) recvmmsg(r2, 0x0, 0x0, 0x10043, &(0x7f0000004340)) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x2288, &(0x7f0000000140)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000100), 0x0}, 0x20) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@ng={0x4, 0x13, "4c722e05e2"}, 0x7, 0x2) 08:57:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x05\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 886.872010] libceph: parse_ips bad ip '::,.:nullb' 08:57:50 executing program 4: 08:57:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}, 0x1c) 08:57:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000ffffff8d00000000000000", 0x28}], 0x1) 08:57:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0xffffffffffff0000, 0x20a00) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000200)={0x0, r2, 0x2}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x10000, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() fchownat(r3, &(0x7f0000000080)='./file0\x00', r4, r5, 0x1100) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x1000800, 0x0) 08:57:50 executing program 4: [ 886.990472] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 887.024847] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:57:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x06\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000]}}, 0x1c) [ 887.095756] libceph: resolve '.' (ret=-3): failed [ 887.114318] libceph: parse_ips bad ip '::,.:nullb' 08:57:50 executing program 5: 08:57:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000005dc00000000000000", 0x28}], 0x1) 08:57:50 executing program 4: [ 887.209913] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\a\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:57:51 executing program 5: 08:57:51 executing program 4: 08:57:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x5400000000000000]}}, 0x1c) 08:57:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000e000000000000000", 0x28}], 0x1) 08:57:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000040)='./file1\x00') mknod(0x0, 0x1040, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000002c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x841, 0x0) syz_execute_func(&(0x7f00000000c0)="64ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3193e66430f3a0ce397") fstat(r0, &(0x7f0000000200)) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) write$P9_RCREATE(r1, 0x0, 0x0) [ 887.455412] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:57:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c) 08:57:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC=r1, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000003c0)) 08:57:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\b\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000fffffff500000000000000", 0x28}], 0x1) 08:57:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x7bffaf1f00000000]}}, 0x1c) 08:57:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) [ 887.642442] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 887.642491] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:57:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c) 08:57:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000fc00000000000000", 0x28}], 0x1) 08:57:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\n\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:51 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') read(r0, &(0x7f0000000040)=""/13, 0xd) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r2, 0x0, 0x1) 08:57:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC=r1, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000003c0)) 08:57:51 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:57:51 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') read(r0, &(0x7f0000000040)=""/13, 0xd) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r2, 0x0, 0x1) 08:57:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x91ffffff00000000]}}, 0x1c) 08:57:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\f\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 887.978549] FAULT_INJECTION: forcing a failure. [ 887.978549] name failslab, interval 1, probability 0, space 0, times 0 [ 887.999672] CPU: 0 PID: 10245 Comm: syz-executor4 Not tainted 4.20.0+ #13 [ 888.006623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.015988] Call Trace: [ 888.018588] dump_stack+0x1db/0x2d0 [ 888.022240] ? dump_stack_print_info.cold+0x20/0x20 [ 888.027312] ? check_preemption_disabled+0x48/0x290 [ 888.032384] should_fail.cold+0xa/0x15 [ 888.036289] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 888.041436] ? ___might_sleep+0x1e7/0x310 [ 888.045598] ? arch_local_save_flags+0x50/0x50 [ 888.050200] ? find_held_lock+0x35/0x120 [ 888.054277] ? __fget+0x472/0x710 [ 888.057746] __should_failslab+0x121/0x190 [ 888.062005] should_failslab+0x9/0x14 [ 888.065829] kmem_cache_alloc_node+0x265/0x710 [ 888.070420] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 888.075706] ? rcu_read_unlock_special+0x380/0x380 [ 888.080680] __alloc_skb+0xf4/0x730 [ 888.084325] ? skb_scrub_packet+0x440/0x440 [ 888.088677] ? ___might_sleep+0x1e7/0x310 [ 888.092951] vhci_write+0xc4/0x470 [ 888.096524] __vfs_write+0x764/0xb40 [ 888.100257] ? kernel_read+0x120/0x120 [ 888.104154] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 888.109737] ? rw_verify_area+0x118/0x360 [ 888.113901] vfs_write+0x20c/0x580 [ 888.117471] ksys_write+0x105/0x260 [ 888.121114] ? __ia32_sys_read+0xb0/0xb0 [ 888.125188] ? trace_hardirqs_off_caller+0x300/0x300 [ 888.130316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 888.135103] __x64_sys_write+0x73/0xb0 [ 888.139003] do_syscall_64+0x1a3/0x800 [ 888.142912] ? syscall_return_slowpath+0x5f0/0x5f0 [ 888.147871] ? prepare_exit_to_usermode+0x232/0x3b0 [ 888.152902] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.157778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 888.162978] RIP: 0033:0x457ec9 08:57:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000080fe00000000000000", 0x28}], 0x1) [ 888.166189] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 888.185095] RSP: 002b:00007fa3b4fb8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 888.185110] RAX: ffffffffffffffda RBX: 00007fa3b4fb8c90 RCX: 0000000000457ec9 [ 888.185119] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000003 [ 888.185127] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 888.185135] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa3b4fb96d4 [ 888.185144] R13: 00000000004c7292 R14: 00000000004dca48 R15: 0000000000000004 08:57:51 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') read(r0, &(0x7f0000000040)=""/13, 0xd) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r2, 0x0, 0x1) [ 888.266055] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:57:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xa0db010000000000]}}, 0x1c) 08:57:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x0e\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:57:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC=r1, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KDGKBMODE(r3, 0x4b44, &(0x7f00000003c0)) 08:57:52 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 08:57:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000c0fe00000000000000", 0x28}], 0x1) 08:57:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x0f\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 888.510106] FAULT_INJECTION: forcing a failure. [ 888.510106] name failslab, interval 1, probability 0, space 0, times 0 [ 888.557492] CPU: 0 PID: 10271 Comm: syz-executor3 Not tainted 4.20.0+ #13 [ 888.564440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.573809] Call Trace: [ 888.576413] dump_stack+0x1db/0x2d0 [ 888.580056] ? dump_stack_print_info.cold+0x20/0x20 [ 888.585090] ? mark_held_locks+0x100/0x100 [ 888.589340] should_fail.cold+0xa/0x15 [ 888.593243] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 888.598363] ? ___might_sleep+0x1e7/0x310 [ 888.602546] ? arch_local_save_flags+0x50/0x50 [ 888.607147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.612698] __should_failslab+0x121/0x190 [ 888.616960] should_failslab+0x9/0x14 [ 888.620793] kmem_cache_alloc_trace+0x2d1/0x760 [ 888.625498] ? __lock_is_held+0xb6/0x140 [ 888.629579] alloc_pipe_info+0x152/0x580 [ 888.633657] ? pipe_read+0x940/0x940 [ 888.637392] ? __might_sleep+0x95/0x190 [ 888.641400] splice_direct_to_actor+0x795/0x9d0 [ 888.646077] ? avc_policy_seqno+0xd/0x70 [ 888.650139] ? generic_pipe_buf_nosteal+0x10/0x10 [ 888.655016] ? selinux_file_permission+0x92/0x550 [ 888.659882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.665458] ? do_splice_to+0x190/0x190 [ 888.669459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.675024] ? rw_verify_area+0x118/0x360 [ 888.679208] do_splice_direct+0x2c7/0x420 [ 888.683378] ? splice_direct_to_actor+0x9d0/0x9d0 [ 888.688238] ? rcu_read_lock_sched_held+0x110/0x130 [ 888.693265] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 888.698026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 888.703567] ? __sb_start_write+0x1ac/0x360 [ 888.707901] do_sendfile+0x61a/0xe60 [ 888.711662] ? do_compat_pwritev64+0x1c0/0x1c0 [ 888.716263] ? fput+0x128/0x1a0 [ 888.719559] ? do_syscall_64+0x8c/0x800 [ 888.723573] ? do_syscall_64+0x8c/0x800 [ 888.727578] __x64_sys_sendfile64+0x1f8/0x240 [ 888.732093] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 888.736691] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 888.741473] do_syscall_64+0x1a3/0x800 [ 888.745376] ? syscall_return_slowpath+0x5f0/0x5f0 [ 888.750316] ? prepare_exit_to_usermode+0x232/0x3b0 [ 888.755343] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.760227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 888.765437] RIP: 0033:0x457ec9 [ 888.768663] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 888.787572] RSP: 002b:00007f6e18cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 888.795291] RAX: ffffffffffffffda RBX: 00007f6e18cf3c90 RCX: 0000000000457ec9 [ 888.802562] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 888.809832] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 888.817104] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f6e18cf46d4 [ 888.824378] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000004 [ 888.852169] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:58:01 executing program 4 (fault-call:2 fault-nth:1): r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:58:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xb8ff000000000000]}}, 0x1c) 08:58:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000fffffffe00000000000000", 0x28}], 0x1) 08:58:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x10\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:01 executing program 3 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 08:58:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC=r1, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) [ 898.026898] net_ratelimit: 6 callbacks suppressed [ 898.026909] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 898.046556] validate_nla: 5 callbacks suppressed [ 898.046565] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 898.068480] FAULT_INJECTION: forcing a failure. 08:58:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00H\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 898.068480] name failslab, interval 1, probability 0, space 0, times 0 [ 898.089196] XFS (loop5): unknown mount option [uid>18446744073709551615]. [ 898.104141] CPU: 0 PID: 10288 Comm: syz-executor3 Not tainted 4.20.0+ #13 [ 898.111086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.120438] Call Trace: [ 898.123036] dump_stack+0x1db/0x2d0 [ 898.126679] ? dump_stack_print_info.cold+0x20/0x20 [ 898.131736] ? percpu_ref_put_many+0x129/0x270 [ 898.136333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.141883] should_fail.cold+0xa/0x15 [ 898.142243] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 898.145776] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 898.145801] ? ___might_sleep+0x1e7/0x310 [ 898.145818] ? arch_local_save_flags+0x50/0x50 [ 898.145845] __should_failslab+0x121/0x190 [ 898.145864] should_failslab+0x9/0x14 08:58:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00L\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 898.145878] __kmalloc+0x2dc/0x740 [ 898.145891] ? kmem_cache_alloc_trace+0x354/0x760 [ 898.145910] ? alloc_pipe_info+0x286/0x580 [ 898.145929] alloc_pipe_info+0x286/0x580 [ 898.145948] ? pipe_read+0x940/0x940 [ 898.145974] ? __might_sleep+0x95/0x190 [ 898.145993] splice_direct_to_actor+0x795/0x9d0 [ 898.204139] ? avc_policy_seqno+0xd/0x70 [ 898.208210] ? generic_pipe_buf_nosteal+0x10/0x10 [ 898.213064] ? selinux_file_permission+0x92/0x550 [ 898.217918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.223472] ? do_splice_to+0x190/0x190 08:58:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000ff00000000000000", 0x28}], 0x1) 08:58:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xc4f87dc77b000000]}}, 0x1c) [ 898.227454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.233000] ? rw_verify_area+0x118/0x360 [ 898.237161] do_splice_direct+0x2c7/0x420 [ 898.241325] ? splice_direct_to_actor+0x9d0/0x9d0 [ 898.246187] ? rcu_read_lock_sched_held+0x110/0x130 [ 898.251215] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 898.255982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.261533] ? __sb_start_write+0x1ac/0x360 [ 898.265896] do_sendfile+0x61a/0xe60 [ 898.269656] ? do_compat_pwritev64+0x1c0/0x1c0 [ 898.274262] ? fput+0x128/0x1a0 [ 898.277566] ? do_syscall_64+0x8c/0x800 [ 898.281551] ? do_syscall_64+0x8c/0x800 [ 898.285543] __x64_sys_sendfile64+0x1f8/0x240 [ 898.290056] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 898.294657] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 898.299432] do_syscall_64+0x1a3/0x800 [ 898.303327] ? syscall_return_slowpath+0x5f0/0x5f0 [ 898.308267] ? prepare_exit_to_usermode+0x232/0x3b0 [ 898.313295] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.318165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.323373] RIP: 0033:0x457ec9 [ 898.326569] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 898.345480] RSP: 002b:00007f6e18cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 898.353208] RAX: ffffffffffffffda RBX: 00007f6e18cf3c90 RCX: 0000000000457ec9 [ 898.360481] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 898.367756] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 898.375024] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f6e18cf46d4 [ 898.382318] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000004 08:58:02 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:58:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000008dffffff00000000000000", 0x28}], 0x1) 08:58:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f000000000000]}}, 0x1c) [ 898.451218] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 898.479407] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:58:02 executing program 3 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 08:58:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC=r1, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) syz_mount_image$jfs(&(0x7f0000002740)='jfs\x00', &(0x7f0000002780)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:58:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00`\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 898.592952] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 898.608644] FAULT_INJECTION: forcing a failure. [ 898.608644] name failslab, interval 1, probability 0, space 0, times 0 [ 898.630530] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 898.643868] CPU: 1 PID: 10319 Comm: syz-executor3 Not tainted 4.20.0+ #13 [ 898.650813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.660201] Call Trace: [ 898.662800] dump_stack+0x1db/0x2d0 [ 898.666453] ? dump_stack_print_info.cold+0x20/0x20 [ 898.671476] ? print_usage_bug+0xd0/0xd0 [ 898.675542] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.681097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.686743] should_fail.cold+0xa/0x15 [ 898.690691] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 898.695842] ? ___might_sleep+0x1e7/0x310 [ 898.700020] ? arch_local_save_flags+0x50/0x50 [ 898.704627] __should_failslab+0x121/0x190 [ 898.708872] should_failslab+0x9/0x14 [ 898.712677] kmem_cache_alloc_node_trace+0x270/0x720 [ 898.717794] ? lock_downgrade+0x910/0x910 [ 898.721958] ? kasan_check_read+0x11/0x20 [ 898.726131] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 898.731428] __kmalloc_node+0x3d/0x70 [ 898.735246] kvmalloc_node+0x68/0x100 [ 898.739060] iov_iter_get_pages_alloc+0x87f/0x15a0 [ 898.744095] ? kernel_text_address+0x73/0xf0 [ 898.748519] ? __kernel_text_address+0xd/0x40 [ 898.753027] ? iov_iter_revert+0xaa0/0xaa0 [ 898.757279] ? save_stack+0xa9/0xd0 [ 898.760916] ? save_stack+0x45/0xd0 [ 898.764548] ? kasan_kmalloc+0xcf/0xe0 [ 898.768437] ? __kmalloc+0x15c/0x740 [ 898.772166] ? alloc_pipe_info+0x286/0x580 [ 898.776402] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 898.781424] ? iov_iter_pipe+0xba/0x2f0 [ 898.785444] default_file_splice_read+0x1b1/0xac0 [ 898.790377] ? add_lock_to_list.isra.0+0x450/0x450 [ 898.795330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.800898] ? iter_file_splice_write+0xfc0/0xfc0 [ 898.805786] ? __lock_is_held+0xb6/0x140 [ 898.809869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.815426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.820987] ? fsnotify+0x4f5/0xed0 [ 898.824636] ? arch_local_save_flags+0x50/0x50 [ 898.829240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.834800] ? __fsnotify_parent+0xe2/0x450 [ 898.839155] ? fsnotify_first_mark+0x350/0x350 [ 898.843747] ? init_wait_entry+0x1c0/0x1c0 [ 898.847999] ? avc_policy_seqno+0xd/0x70 [ 898.852079] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 898.857100] ? selinux_file_permission+0x92/0x550 [ 898.861975] ? security_file_permission+0x94/0x320 [ 898.866939] ? rw_verify_area+0x118/0x360 [ 898.871111] ? iter_file_splice_write+0xfc0/0xfc0 [ 898.875987] do_splice_to+0x12a/0x190 [ 898.879808] splice_direct_to_actor+0x31b/0x9d0 [ 898.884488] ? generic_pipe_buf_nosteal+0x10/0x10 [ 898.889351] ? do_splice_to+0x190/0x190 [ 898.893344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.898906] ? rw_verify_area+0x118/0x360 [ 898.903082] do_splice_direct+0x2c7/0x420 [ 898.907243] ? splice_direct_to_actor+0x9d0/0x9d0 [ 898.912107] ? rcu_read_lock_sched_held+0x110/0x130 [ 898.917153] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 898.921924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 898.927468] ? __sb_start_write+0x1ac/0x360 [ 898.931801] do_sendfile+0x61a/0xe60 [ 898.935535] ? do_compat_pwritev64+0x1c0/0x1c0 [ 898.940136] ? fput+0x128/0x1a0 [ 898.943426] ? do_syscall_64+0x8c/0x800 [ 898.947405] ? do_syscall_64+0x8c/0x800 [ 898.951390] __x64_sys_sendfile64+0x1f8/0x240 [ 898.955894] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 898.960482] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 898.965255] do_syscall_64+0x1a3/0x800 [ 898.969178] ? syscall_return_slowpath+0x5f0/0x5f0 [ 898.974131] ? prepare_exit_to_usermode+0x232/0x3b0 [ 898.979160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.984023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 898.989227] RIP: 0033:0x457ec9 [ 898.992421] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 899.011322] RSP: 002b:00007f6e18cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 899.019030] RAX: ffffffffffffffda RBX: 00007f6e18cf3c90 RCX: 0000000000457ec9 [ 899.026297] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 899.033594] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 08:58:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000f5ffffff00000000000000", 0x28}], 0x1) 08:58:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe0a9131300000000]}}, 0x1c) 08:58:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00h\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 899.040880] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f6e18cf46d4 [ 899.048154] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000004 [ 899.062897] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 899.071963] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:58:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000feffffff00000000000000", 0x28}], 0x1) [ 899.136295] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:58:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c) [ 899.186410] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:58:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC=r1, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) [ 899.259796] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 899.306049] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:58:12 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x2, 'c'}, 0x2) 08:58:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00l\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000400000000", 0x28}], 0x1) 08:58:12 executing program 3 (fault-call:1 fault-nth:3): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 08:58:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c) 08:58:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC=r1, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) [ 908.910367] FAULT_INJECTION: forcing a failure. [ 908.910367] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 908.925617] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 908.934211] CPU: 0 PID: 10345 Comm: syz-executor3 Not tainted 4.20.0+ #13 [ 908.941146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 908.941154] Call Trace: [ 908.941175] dump_stack+0x1db/0x2d0 [ 908.941196] ? dump_stack_print_info.cold+0x20/0x20 [ 908.961765] ? is_bpf_text_address+0xd3/0x170 [ 908.966289] should_fail.cold+0xa/0x15 [ 908.970192] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 908.972274] XFS (loop5): unknown mount option [uid>18446744073709551615]. [ 908.975332] ? arch_local_save_flags+0x50/0x50 [ 908.975346] ? lock_release+0xc40/0xc40 [ 908.975376] should_fail_alloc_page+0x50/0x60 [ 908.975391] __alloc_pages_nodemask+0x323/0xdc0 [ 908.975404] ? add_lock_to_list.isra.0+0x450/0x450 [ 908.975424] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 908.975450] ? __kmalloc_node+0x3d/0x70 [ 909.013964] ? rcu_read_lock_sched_held+0x110/0x130 [ 909.019004] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 909.024554] alloc_pages_current+0x107/0x210 [ 909.029048] push_pipe+0x3fc/0x7a0 [ 909.032604] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 909.037552] ? kernel_text_address+0x73/0xf0 [ 909.041963] ? __kernel_text_address+0xd/0x40 [ 909.046469] ? iov_iter_revert+0xaa0/0xaa0 [ 909.050713] ? save_stack+0xa9/0xd0 [ 909.054359] ? save_stack+0x45/0xd0 [ 909.057992] ? kasan_kmalloc+0xcf/0xe0 [ 909.058006] ? __kmalloc+0x15c/0x740 [ 909.058033] ? alloc_pipe_info+0x286/0x580 [ 909.058047] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 909.058072] ? iov_iter_pipe+0xba/0x2f0 [ 909.058092] default_file_splice_read+0x1b1/0xac0 [ 909.058102] ? add_lock_to_list.isra.0+0x450/0x450 [ 909.058115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 909.058148] ? iter_file_splice_write+0xfc0/0xfc0 [ 909.058158] ? __lock_is_held+0xb6/0x140 [ 909.058168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 909.058192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 909.065959] ? fsnotify+0x4f5/0xed0 [ 909.065974] ? arch_local_save_flags+0x50/0x50 [ 909.065994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 909.066019] ? __fsnotify_parent+0xe2/0x450 [ 909.066035] ? fsnotify_first_mark+0x350/0x350 [ 909.066049] ? init_wait_entry+0x1c0/0x1c0 [ 909.066070] ? avc_policy_seqno+0xd/0x70 [ 909.066082] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 909.066099] ? selinux_file_permission+0x92/0x550 [ 909.066120] ? security_file_permission+0x94/0x320 [ 909.079451] ? rw_verify_area+0x118/0x360 [ 909.079466] ? iter_file_splice_write+0xfc0/0xfc0 [ 909.079483] do_splice_to+0x12a/0x190 [ 909.079501] splice_direct_to_actor+0x31b/0x9d0 [ 909.079517] ? generic_pipe_buf_nosteal+0x10/0x10 [ 909.099645] ? do_splice_to+0x190/0x190 [ 909.099660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 909.099678] ? rw_verify_area+0x118/0x360 [ 909.099696] do_splice_direct+0x2c7/0x420 [ 909.118501] ? splice_direct_to_actor+0x9d0/0x9d0 [ 909.118523] ? rcu_read_lock_sched_held+0x110/0x130 08:58:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00t\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000001000000000", 0x28}], 0x1) 08:58:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c) [ 909.118538] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 909.118550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 909.118565] ? __sb_start_write+0x1ac/0x360 [ 909.118584] do_sendfile+0x61a/0xe60 [ 909.137722] ? do_compat_pwritev64+0x1c0/0x1c0 [ 909.137742] ? fput+0x128/0x1a0 [ 909.137757] ? do_syscall_64+0x8c/0x800 [ 909.137771] ? do_syscall_64+0x8c/0x800 [ 909.151076] __x64_sys_sendfile64+0x1f8/0x240 [ 909.151096] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 909.151112] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 909.151137] do_syscall_64+0x1a3/0x800 [ 909.173653] ? syscall_return_slowpath+0x5f0/0x5f0 [ 909.173672] ? prepare_exit_to_usermode+0x232/0x3b0 [ 909.173692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 909.173716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 909.192676] RIP: 0033:0x457ec9 [ 909.192690] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:58:12 executing program 3 (fault-call:1 fault-nth:4): r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) [ 909.192698] RSP: 002b:00007f6e18cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 909.192711] RAX: ffffffffffffffda RBX: 00007f6e18cf3c90 RCX: 0000000000457ec9 [ 909.192719] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 909.192730] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 909.210852] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f6e18cf46d4 [ 909.210861] R13: 00000000004c4cdc R14: 00000000004d85c0 R15: 0000000000000004 08:58:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:58:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) [ 909.428270] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 909.445786] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 909.509696] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:58:23 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0xfdef) 08:58:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000034000000000", 0x28}], 0x1) 08:58:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00z\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c) 08:58:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x2) 08:58:23 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) [ 919.811256] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 919.821202] XFS (loop5): unknown mount option [uid>18446744073709551615]. [ 919.827828] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:58:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xf0\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x3) 08:58:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c) 08:58:23 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000006b6b6b00000000", 0x28}], 0x1) 08:58:23 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) [ 919.999986] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 920.010502] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:58:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x5) [ 920.049859] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:58:33 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x20000002) 08:58:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\x03'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000001000000", 0x28}], 0x1) 08:58:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c) 08:58:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x8) 08:58:33 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) [ 930.033139] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:58:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\x05'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x9) [ 930.077064] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:58:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000002000000", 0x28}], 0x1) 08:58:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c) 08:58:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x10) 08:58:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\x06'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 930.208530] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:58:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\a'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:43 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:58:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c) 08:58:43 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0xfffffdef) 08:58:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x300) 08:58:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000003000000", 0x28}], 0x1) 08:58:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x7ffff000) 08:58:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000004000000", 0x28}], 0x1) [ 940.277876] XFS (loop5): unknown mount option [uid>18446744073709551615]. [ 940.293707] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 08:58:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00I\a'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}}, 0x1c) 08:58:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0xffff88808f8b3001) 08:58:44 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:58:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000005000000", 0x28}], 0x1) 08:58:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\n'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:44 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000100)=0x4e25a111) sendfile(r0, r0, 0x0, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000040)) [ 940.469959] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 940.509464] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:58:54 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0xfffffffffffffdef) 08:58:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}, 0x1c) 08:58:54 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40200, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'irlan0\x00', @random="32b702976f28"}) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0xffffffffffff8d0f) 08:58:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\f'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000006000000", 0x28}], 0x1) 08:58:54 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:58:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 08:58:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000007000000", 0x28}], 0x1) 08:58:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\x0e'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:58:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, 0x1c) [ 950.539692] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 950.564277] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:58:54 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:58:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\x0f'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 950.718215] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:59:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) signalfd(r0, &(0x7f0000000000)={0x1}, 0x8) 08:59:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000008000000", 0x28}], 0x1) 08:59:04 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x10b00, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x1, 0x9, 0x9400000000000000}}, 0x28) 08:59:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x1c) 08:59:04 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00 '}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00?'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 960.761866] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:59:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') write$UHID_CREATE2(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000024840e924a57e3b0ba0a6a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400006001f0000008100000000040000174f00009d72c94fe10316eb8aa49456d04ec97cec9fd776b5f37cd4513f1ebc56d1d170c4db3ae90c499e87ec26028c58fb1a654bcd458154379e0eecd734a5fce78f320000"], 0x158) sendfile(r0, r0, 0x0, 0x1) 08:59:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000009000000", 0x28}], 0x1) 08:59:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c) 08:59:04 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:04 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000200)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xffeb) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r1, 0x0, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x9, @link='syz1\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x0) getgid() r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r2, r2, 0x0, 0x1) 08:59:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00H'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000000000a000000", 0x28}], 0x1) [ 960.982791] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:59:14 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="fa11"], 0x2) 08:59:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c) 08:59:14 executing program 3: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x47ffd, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x90000, 0x0) 08:59:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\aI'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000000000e000000", 0x28}], 0x1) [ 971.028728] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:59:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00L'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000010000000", 0x28}], 0x1) 08:59:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) 08:59:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}, 0x1c) 08:59:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00eX'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 971.240293] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:59:24 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000040)={0xa, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) write$vhci(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="04ebdf70daa82144ff0dca266bd31963"], 0x2) 08:59:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000011000000", 0x28}], 0x1) 08:59:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c) 08:59:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/34, 0x20000, 0x1800, 0x5}, 0x18) sendfile(r0, r0, 0x0, 0x3f) 08:59:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00`'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000010000120000000", 0x28}], 0x1) 08:59:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00Xe'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') r1 = accept4$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0_to_team\x00', r2}) clock_gettime(0x0, &(0x7f0000007340)={0x0, 0x0}) recvmmsg(r1, &(0x7f00000070c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/187, 0xbb}, {&(0x7f0000000180)=""/63, 0x3f}], 0x2, &(0x7f0000000240)=""/203, 0xcb}, 0x3}, {{&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000003c0)=""/79, 0x4f}, {&(0x7f0000000440)=""/12, 0xc}, {&(0x7f0000000480)=""/140, 0x8c}, {&(0x7f0000000540)=""/110, 0x6e}, {&(0x7f00000005c0)=""/8, 0x8}, {&(0x7f0000000600)}, {&(0x7f0000000640)=""/138, 0x8a}, {&(0x7f0000000700)=""/15, 0xf}, {&(0x7f0000000740)=""/109, 0x6d}], 0x9, &(0x7f0000000880)=""/18, 0x12}, 0x1000}, {{&(0x7f00000008c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000940)=""/161, 0xa1}], 0x1, &(0x7f0000000a40)=""/68, 0x44}, 0x3}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000001b00)=""/4096, 0x1000}, 0x2}, {{&(0x7f0000002b00)=@generic, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002b80)=""/242, 0xf2}, {&(0x7f0000002c80)=""/131, 0x83}, {&(0x7f0000002d40)=""/2, 0x2}, {&(0x7f0000002d80)=""/148, 0x94}, {&(0x7f0000002e40)=""/157, 0x9d}], 0x5, &(0x7f0000002f80)=""/60, 0x3c}, 0x7fffffff}, {{&(0x7f0000002fc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000003080)=[{&(0x7f0000003040)=""/47, 0x2f}], 0x1, &(0x7f00000030c0)=""/4096, 0x1000}, 0x8000}, {{&(0x7f00000040c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000005380)=[{&(0x7f0000004140)=""/70, 0x46}, {&(0x7f00000041c0)=""/212, 0xd4}, {&(0x7f00000042c0)=""/4096, 0x1000}, {&(0x7f00000052c0)=""/70, 0x46}, {&(0x7f0000005340)=""/30, 0x1e}], 0x5, &(0x7f0000005400)=""/200, 0xc8}, 0x3f}, {{&(0x7f0000005500)=@pppoe, 0x80, &(0x7f0000006640)=[{&(0x7f0000005580)=""/4096, 0x1000}, {&(0x7f0000006580)=""/173, 0xad}], 0x2, &(0x7f0000006680)=""/111, 0x6f}, 0x2}, {{&(0x7f0000006700)=@alg, 0x80, &(0x7f0000006b80)=[{&(0x7f0000006780)=""/151, 0x97}, {&(0x7f0000006840)=""/250, 0xfa}, {&(0x7f0000006940)}, {&(0x7f0000006980)=""/189, 0xbd}, {&(0x7f0000006a40)=""/130, 0x82}, {&(0x7f0000006b00)=""/85, 0x55}], 0x6, &(0x7f0000006c00)=""/135, 0x87}, 0x9}, {{&(0x7f0000006cc0)=@l2, 0x80, &(0x7f0000006f80)=[{&(0x7f0000006d40)=""/89, 0x59}, {&(0x7f0000006dc0)=""/152, 0x98}, {&(0x7f0000006e80)=""/52, 0x34}, {&(0x7f0000006ec0)=""/157, 0x9d}], 0x4, &(0x7f0000006fc0)=""/201, 0xc9}, 0x7fffffff}], 0xa, 0x2000, &(0x7f0000007380)={r3, r4+30000000}) sendfile(r0, r0, 0x0, 0x1) 08:59:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}, 0x1c) [ 981.275942] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:59:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00h'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:35 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xfff, 0x101481) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000140)={0x5, 0x3, {0x56, 0x20, 0x6, {0x4, 0x5}, {0xff, 0x5}, @cond=[{0x10001, 0x8000, 0xffff, 0x0, 0x7, 0x4}, {0x4, 0xe8f, 0x5, 0x3, 0x5, 0xfffffffffffffff7}]}, {0x0, 0x7, 0xe7, {0x80000000, 0xc00000000000000}, {0x4, 0x8}, @ramp={0x8000, 0x3, {0x8000, 0x9, 0x8, 0x2}}}}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r1, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="9b7989470463"], 0x2) 08:59:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000030000000", 0x28}], 0x1) 08:59:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c) 08:59:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8002}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="d8000080", @ANYRES16=r1, @ANYBLOB="01022cbd7000ffdbdf250e00000008000500f7ffffff08000500ff070000140001000800020032000000080004004e24000008000400090000002000020014000100fe80000000000000000000000000001108000500ff0300000c000300080007004e2000001c0003000800010000000000080007004e21000008000500ffffffff40000200080005000500000014000100ff020000000000000000000000000001080002004e230000080007000200000008000900060000000800050011a10000080006000500000008000600ebbc0000"], 0xd8}, 0x1, 0x0, 0x0, 0x4000}, 0x90) syz_genetlink_get_family_id$net_dm(&(0x7f0000000340)='NET_DM\x00') sendfile(r0, r0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x7f, 0x7, 0x7, 0x4, 0x1}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000300)) fsetxattr$security_smack_transmute(r0, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x3) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 08:59:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00l'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00t'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:35 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000000003f000000", 0x28}], 0x1) 08:59:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) sendfile(r0, r0, 0x0, 0x1) 08:59:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c) 08:59:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00z'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:45 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x200, 0x4080) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x100000001, 0x8000) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x281, 0x0) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000040)={0x0, 0x401, 0x7fff, 0x5}) write$vhci(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8738522d85c53db0b737d1d94a1a3dcdc4515590e2cd1552b2f1d5f6242afe030000ecded0e86d771557bf7f4ac0429809e0134130352779b7c43f7af70000eff6578bfe3968aa931b1db8e974c8df3575d7b99d013c5baab2aeddc66df68fae982275a4d24943ba144094134edfa7d1a0c2bd537a51c84e182347e01cb29fe021b2432ad5f1f358287ffcec4b88f233a4532aad49de24fd63acf1d436129e014ca39b61d1af95a6e220a92da9d3e5cf557e6c68674bd561e05e3450dec345be205f14a1f628970a1db012526fc37088a44156e8656d41eb"], 0x2) 08:59:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c) 08:59:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0xffffffffffffff11) 08:59:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\x81'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000040000000", 0x28}], 0x1) 08:59:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') dup2(r0, r0) sendfile(r0, r0, 0x0, 0x1) 08:59:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\xf0'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000060000000", 0x28}], 0x1) 08:59:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x1c) 08:59:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0xb6, "e2f1c2626de9f1f09dacaca7c77040cd0b212cddcf09b4bf458840c2af29262d51e7fc39675f14bf41d6c9d4d8d7be5112aab0d4d35a343791dfb972ec6982cc08d420904430efafd694d1f9fbcc09d2e8ca284a9d68c2a04f9dbf6ff0bf257e92d3ce287cb26ac67242a6148c8deabd933a986f3727a03af9c5412c2cc6fab2793f65b995b0d916ccb65475d358476e81ef6cb12b8bd6f702a44e499b5f59c2ed22ffe403eee16b87a1fa515fa2bb339305f0a4d50f"}, &(0x7f00000000c0)=0xbe) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in={{0x2, 0x4e24, @multicast2}}, 0x6, 0x81}, 0x90) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000200)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x67, 0x9, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default]}) 08:59:55 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x150) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:59:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000000000078000000", 0x28}], 0x1) 08:59:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54]}}, 0x1c) 08:59:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x7, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 08:59:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 08:59:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000000)='uid_map\x00') sendfile(r0, r0, 0x0, 0x1) 08:59:55 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 08:59:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000000007e000000", 0x28}], 0x1) 08:59:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c) 08:59:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) [ 1012.075062] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:59:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$UI_DEV_DESTROY(r0, 0x5502) sendfile(r0, r0, 0x0, 0x1) [ 1012.169621] XFS (loop5): unknown mount option [uid>18446744073709551615]. 08:59:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c) 08:59:55 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000000007f000000", 0x28}], 0x1) 08:59:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) [ 1012.264157] netlink: 'syz-executor0': attribute type 17 has an invalid length. 08:59:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x4) fchdir(r0) 08:59:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 08:59:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}}, 0x1c) [ 1012.370789] XFS (loop5): unknown mount option [uid>18446744073709551615]. [ 1012.401642] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:05 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x83fe) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:00:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000ffffff8d000000", 0x28}], 0x1) 09:00:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0xffff) 09:00:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}}, 0x1c) 09:00:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='largeio,largeio,usrquota,noattr2,attr2,bsdgroups,uid>', @ANYRESDEC, @ANYBLOB=',fscontext=unconfined_u,obj_role=^em0,smackfsfloor=jfs\x00,dont_hash,context=unconfined_u,fowner>', @ANYRESDEC, @ANYBLOB="2c6f62535f747970653df95e2b2d2c64cc62745f61a98e301d5f9960c43c3421707062616973652c00d7967e55f20a3d00000000000000000000000000000000"]) 09:00:05 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x14000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r2, r2, 0x0, 0x1) ftruncate(r2, 0x393) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) [ 1022.192413] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1022.209159] XFS (loop5): unknown mount option [uid>18446744073709551615]. 09:00:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000000005dc000000", 0x28}], 0x1) 09:00:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}, 0x1c) 09:00:05 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='jn'], 0x2) 09:00:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:00:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') fcntl$dupfd(r0, 0x0, r0) sendfile(r0, r0, 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1022.347507] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000000000e0000000", 0x28}], 0x1) 09:00:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 1022.416919] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:00:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c) 09:00:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000380)={0xfffffffffffffd6b, 0xf, 0x1, {{0x10, 0x3, 0x3}, 0x40000800}}, 0x18) r1 = socket$inet6(0xa, 0xffffffffffffffff, 0x6) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000200)) r2 = syz_open_dev$evdev(&(0x7f00000005c0)='/dev/input/event#\x00', 0x8000000, 0x400001) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f00000004c0), 0x3}, 0xa0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000280)=r2, 0xfffffc5e) r3 = socket(0x40000000015, 0x5, 0x3) fcntl$getflags(r2, 0x401) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r3, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000080), 0x4) sendto$inet(r3, &(0x7f0000000a00)="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", 0x241, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f00000003c0)='\aoj9\xbc\xf6u=w\x0e\xecuWOA\xe8\x85\x02^;\x8f\x9c\xd2a\xc1c\x1f8h\x84\x9ej2#\xe3g\xdd\x13\xedI\xdc\xa1\xfc1\xe5\x01VZ.\xfbD\x7f.\xbb\x99\xdb\xb7\xef\xbe\x1c\xc9\xb6\x17g\xff\xec\xf4\xe8lD{\xa8\x04\x0f\x8f\b\x8e\xf9ln\x90\xca\xf1\x97\xb6[\x14})\v\xeeU\x14o\x1b1fV\xbf\r\xa51zhq\x10\v\xf5\xb1g\x9c\x1c\x83b\xd3\xa3\xd7\xb9\xeb\xf9\xc0\xd1\x15\xf1\xa3\x8a^\xbe\x12\x97\xc8lf\x95\x9e \x00\x00\x00\x00\x00\x00\x00\x0er\x05\x1d\xd8\xaa\xf5\xd4\xc0\xd0\x80,\x05V\xe46/9x\xd5P\xd1v\'?\x1d|\xe5\xe2\xe9\x7fy|\x1f\xb47d\x10\x8c\xcc\x91\x82\x925\xeb\xe8\x88\"\x96B\xec\x9c\xa8\xa7\x7fr$\xb4\xa0', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000340)={0x0, 0x8, 0x5, 0x20, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) mq_timedsend(r4, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000200)=""/122) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f00000002c0)=""/60) mq_timedsend(r4, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)={0x77359400}) mq_timedreceive(r4, &(0x7f0000000100)=""/24, 0x3b4, 0x0, 0x0) unshare(0x800) pread64(r5, &(0x7f00000001c0)=""/25, 0x19, 0x0) 09:00:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000fffffff5000000", 0x28}], 0x1) [ 1022.516250] XFS (loop5): Invalid superblock magic number [ 1022.545602] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c) 09:00:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:00:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000000000fc000000", 0x28}], 0x1) [ 1022.714279] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 1022.747457] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1022.843509] XFS (loop5): Invalid superblock magic number 09:00:16 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x7fffffff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r1, 0x0, &(0x7f0000000140)}, &(0x7f00000001c0)=0x10) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:00:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}, 0x1c) 09:00:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x973a, &(0x7f0000000040)=0x2) sendfile(r0, r0, 0x0, 0x1) 09:00:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000000080fe000000", 0x28}], 0x1) 09:00:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1033.069464] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1033.077356] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:00:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c) 09:00:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000000000000c0fe000000", 0x28}], 0x1) 09:00:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1033.182035] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000fffffffe000000", 0x28}], 0x1) [ 1033.223012] XFS (loop5): Invalid superblock magic number [ 1033.255508] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 1033.333139] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:26 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x10101, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x400, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, 0xffffffffffffffff) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="a5d1211c087bc96f53c353804e4bfab1f6df7a251763"], 0x2) 09:00:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x64400) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@initdev, 0x0}, &(0x7f0000000080)=0x14) connect(r0, &(0x7f00000000c0)=@hci={0x1f, r2, 0x1}, 0x80) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000140)=0x5, 0x4) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) sendfile(r0, r0, 0x0, 0x1) 09:00:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c) 09:00:26 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000200)='./file0\x00', 0x8007, 0x16ea) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="3800000000000000000000000000000077fddb316b94d1fb12ba191239a0cf3efc9eca000000e2ff9489911c55aa35cda7529ed3e46ba3e86fccfa326af9f605a35c5aa56dbcd1f9dc20691a3d10eb552ded3a5a4d4fd275d00cc25704db419bd724ac4313b7a14e1857fb16190c0000003ba81652931fc5ab68e2"], 0x7b}, 0x0) 09:00:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000000000ff000000", 0x28}], 0x1) [ 1043.307797] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1043.335050] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:00:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @loopback}}}, 0x0) 09:00:27 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000000ffffffff000000", 0x28}], 0x1) 09:00:27 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000000)={0x2, 0x200, 0x401, 0x100}) 09:00:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c) [ 1043.447798] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 1043.560424] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 1043.590088] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:37 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000001180)=@HCI_SCODATA_PKT={0x3, "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"}, 0x10a2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20000, 0x0) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000140)={0x0, @src_change}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000040)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="90860000c4d90824d9209efd0f128773f1757f8b4726524cc092c15289670122d1e2247a97621e95e507dfa5de6514304ab932cb8682d7ecf6bb4914ba93cee0429b375b320000447f20a9676d105e2700897391ad1260be30634c8ba480cf763dd6650d5d", @ANYRES16=r3, @ANYBLOB="00002bbd7000ffdbdf25070000007c0005003c000200080003000200000008000200030000000800020008000000080002000500000008000200090000000800030000000100080003000600000008000100756470000c000200080002008100000014000200080001001400000008000200060000001400020008000400950000000800040006000000"], 0x90}, 0x1, 0x0, 0x0, 0x40800}, 0xdbf95b677967bdbf) 09:00:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:00:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000080)) sendfile(r0, r0, 0x0, 0x1) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000040)=0x4) 09:00:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000002000000000000000000", 0x28}], 0x1) 09:00:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c) [ 1053.562820] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1053.589998] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:00:37 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000003000000000000000000", 0x28}], 0x1) 09:00:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}}, 0x1c) 09:00:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x34a) 09:00:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:00:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000000)={0x1, 0x5, 0x1f, 0x7, 0xfffffffffffffffd, 0x80000001}) sendfile(r0, r0, 0x0, 0x1) [ 1053.771388] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:47 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x4000000000040400) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) r1 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x800, 0xa800) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000003c0)=0x37, 0x8) r2 = shmget(0x2, 0x2000, 0x120, &(0x7f0000ffe000/0x2000)=nil) r3 = geteuid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)='(\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000280)='/dev/vhci\x00', 0xffffffffffffffff}, 0x30) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000300)={{0x5, r3, r4, r5, r6, 0x29, 0x3}, 0x9, 0xb24, 0x9, 0x80, r7, r8, 0x7}) write$vhci(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="042345ed30de9419e7b5c49e7bf0b1623efb0967a917043eb89cc8a5b7fd82a7f84f6956001a4862c85fd53c2ad7537dc57efe82daea2cf3f7549fa44d6679453ff2240330406bdafe2f19d266a819d03d5492a940a57458c4d1320c50e273c0be53b88e63c9e0acd85685ff2ee6aa034156a910fb46f80480fc3d85b53068dccd05120d6d32abe06ed83f"], 0x2) r9 = syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x2, 0x80100) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r9, 0x40505412, &(0x7f0000000680)={0x4, 0x5fe8, 0x1000, 0x0, 0x1d}) sendmsg$nl_route_sched(r1, &(0x7f0000000600)={&(0x7f0000000000), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=@deltaction={0xe4, 0x31, 0xf20, 0x70bd29, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}]}, @TCA_ACT_TAB={0xbc, 0x1, [{0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x4d}}, {0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x18, 0x15, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x14, 0x5, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x18, 0x11, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8f}}, {0x10, 0x17, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0xd, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x20000881}, 0x800) 09:00:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000004000000000000000000", 0x28}], 0x1) 09:00:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}}, 0x1c) 09:00:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:00:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:47 executing program 3: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x8200, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f00000000c0)=0x2, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100), 0x4) fsetxattr$security_smack_transmute(r1, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x3) recvmsg$kcm(r1, &(0x7f00000015c0)={&(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)=""/8, 0x8}, {&(0x7f0000000240)=""/4, 0x4}, {&(0x7f0000000280)=""/64, 0x40}, {&(0x7f00000002c0)=""/52, 0x34}, {&(0x7f0000000300)=""/100, 0x64}, {&(0x7f0000000380)=""/204, 0xcc}, {&(0x7f0000000480)=""/59, 0x3b}, {&(0x7f00000004c0)=""/72, 0x48}], 0x8, &(0x7f00000005c0)=""/4096, 0x1000}, 0x100) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000001780)=""/218, &(0x7f00000018c0)=0xda) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001600)={'teql0\x00', r2}) 09:00:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000005000000000000000000", 0x28}], 0x1) [ 1063.826890] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1063.836859] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:00:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:00:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:47 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000080)='co\xa0cC&\xc5\xd8\xbfMfilte\x8d\x00J|\x87\xd9\xc9<\xc4\xdaV7\xffRO\xb5[\f\xea\b\xe6pt\\a\x1a^\xc8\f])\xc3\x88io\x12\xfbj\x80&k\xfd\xb5\xc1\x059\xb75\x12\xf0s\xba`\x9ah>\xa7') sendfile(r1, r1, 0x0, 0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x71fb}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000002c0)={r2, 0x40}, 0x56b04911) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000100)={0x7f95, 0x0, [], {0x0, @bt={0x9, 0x5, 0x0, 0x3, 0x1, 0x6, 0x0, 0x9, 0x2b056bb3, 0x48b, 0x23, 0x9, 0x8, 0x84b, 0x7177bc579f26a2c5, 0x1}}}) 09:00:47 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x83fd) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:00:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}}, 0x1c) 09:00:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) [ 1064.008751] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000006000000000000000000", 0x28}], 0x1) 09:00:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/189, 0xbd}], 0x1, 0x0) sendfile(r0, r0, 0x0, 0x1) [ 1064.076697] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:00:47 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000140)=@HCI_SCODATA_PKT={0x3, "8f49076611e2a8501e5be6dca114e3179d61f60f4c8c219b6007d0d90c38c3c6c22150357033273dac8b24b427624a84ec777888b10346fd7a44bda2f2a64519326360d911d8e47ae77a52f031daec7d567f1d2288f7428f714b68aecbb67a14b06c987acefacacde33ee6a980d1d7a8c0446f54cc100c6c938c9c4b94e499f761bb293b603a0ce407ef6a812828864ca124fe81d2a5306ddc9d6b40a0e01d20c63aa2bebd4a56c743233f72b1df4e6617bedd8611abdd19dda1589af38d61dfb64631d548363a09320ec4e6dfe7642ee6fde24f41d4b9c4efb79be8110d37730dcce124894940cf69ca1c10a0b179ffda2e1cc9c6449ffe4f"}, 0xfa) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:00:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:00:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}, 0x1c) [ 1064.174812] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000007000000000000000000", 0x28}], 0x1) 09:00:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:47 executing program 3: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='coredumpkfilter\x00') sendfile(r1, r1, 0x0, 0x1) 09:00:47 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) r1 = add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)="14a6689f8c65ff32bfd72b6e9115cffa8e1bdfb7a01f48d31a9fe1040e5fc2692ba28f276243dd66d31d1a636456608a4d0fd6a9c6e08746ed3d2f7a1a3ebd5f6b410fbfa883b3ccdc28c360d01b71edc52ecec94c509c9a947670570ee15e64ee2903d57af60f83abc1fa734d5f4278da0a5529a3670fda61c8", 0x7a, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="c4f8415a3374b1422d03946120721aef5da5bac38e04c716a7379cceffe131a7f96996c8dcc9", 0x26, 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)="e1f46176c222a4d953a048498b03c44d1c0174907960fae0e942279c7118ec", 0x1f, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000340)={r1, r2, r3}, &(0x7f0000000380)=""/79, 0x4f, &(0x7f0000000500)={&(0x7f0000000400)={'crct10dif-pclmul\x00'}, &(0x7f0000000440)="349ea8a3fe012824beaff0f3ee029c7abff09e039b58f3b725dc258dc8e367ed4b03fd55d5a2dc877015804a57c5589c5b944139e80e88098465732d23dd1ef623eea7853af5f14a43dc56844aa8765af8fcd1190857cca7bb2b86b408cc72b7efb44876d18a2b04eb370ea001e5ff888b2625dd16d97137fb9b46496347a42427107a3846ae1e4c3036e6ae9ab0a9c6645182dddaa7ad0d54a6858fe61e8d0bb540eb689d895c15c14e1c16f6d32dd789f4", 0xb2}) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:00:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) [ 1064.301333] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 1064.331759] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000008000000000000000000", 0x28}], 0x1) 09:00:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}}, 0x1c) 09:00:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) 09:00:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x7003, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 09:00:48 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000009000000000000000000", 0x28}], 0x1) [ 1064.504423] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:48 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 09:00:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:48 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x7003, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 09:00:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5400]}}, 0x1c) [ 1064.669179] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1064.737264] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:00:58 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x6, 0x40100) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000340)={0x34, 0xec1, 0x4, 0x1}, 0x8) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x8c, 0x2, 0x3, "7a3b6d719d0d07f881a1caa54f35bf73", "ee8de2da0a2fc1b0cf07abc9be227072114f66721b834735a9ced77d5582c87d8e39b3f6f2eccb8521b6938c44c915ed45c3caf37c2eb4aade410160088ae77b647c310521744cd192fdea34a00c6caf4795d348e54d97aa5ba17728b1695b65fdcbaa277566c3324f58724e8184cdd4571ed1520a704b"}, 0x8c, 0x2) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280), &(0x7f0000000300)=[&(0x7f00000002c0)='#\'GPLkeyring\x00']) write$vhci(r1, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) sendto$inet(r0, &(0x7f0000000380)="0e5b6da70eeced6687642a459bdf7cfd845d266698376e756c518a7ce9976f7495b2d5bd75c6f8a43b8bb9504eda7452b91bd836b030b281b75ec9b28e7b2b868bbc79f6097273a3539f89879550dfa429868a15d284211ce73ed275d26a2fe7918a5bad2977b8582d015c61fe650d6d3b22e5a4c7d4856830f14a0ac332c71cd5bf6e3c71d36e6e57cec0d0e4f27b5633f3a75402a08a09a9c6d138296c405a6dac963bd21e1854416f4d25b0d331f04b192c35d4f527899206ad4b79d923ace8337c7a8d88a6d1e5", 0xc9, 0x0, &(0x7f0000000480)={0x2, 0x4e20, @loopback}, 0x10) write$vhci(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="96ec12372b2d64c162ac0463fa46865d5754d5dbd0bdebdb17a6a0b5d0e08da46adec6fc5fac8bd7dda055a926b1d0c7b637dd7c2314f16a4b9a4a05fb3af6d53bfa49bd62ed9b4b8420a0cda37df84dc50093ec5055383e85aeed3267c0f20658bd1b"], 0x2) 09:00:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000a000000000000000000", 0x28}], 0x1) 09:00:58 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) 09:00:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x7003, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 09:00:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fdc]}}, 0x1c) 09:00:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:58 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) [ 1074.678072] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:00:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_fil;|\xe6k\x83ter\x00') fsync(r0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:devtty_t:s0\x00', 0x1e, 0x1) sendfile(r0, r0, 0x0, 0x1) 09:00:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x1c) 09:00:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000000e000000000000000000", 0x28}], 0x1) 09:00:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:00:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@local, @remote, @local, 0x3ff, 0x0, 0x2, 0x100, 0x3ff, 0x200000, r1}) [ 1074.857523] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:01:08 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x5) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r1, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8990a22f7ad00e551a0463"], 0x2) 09:01:08 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 09:01:08 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x5, 0x40) write$evdev(r0, &(0x7f0000000080), 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x2c0000) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r2, r2, 0x0, 0xfffffffffffffff9) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r0}) 09:01:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8ff]}}, 0x1c) 09:01:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000010000000000000000000", 0x28}], 0x1) 09:01:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:08 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) [ 1084.921824] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:01:08 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 09:01:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c) 09:01:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:08 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000011000000000000000000", 0x28}], 0x1) 09:01:08 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) [ 1085.074846] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:01:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000030000000000000000000", 0x28}], 0x1) 09:01:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc7f]}}, 0x1c) 09:01:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$int_out(r0, 0x200000008000450a, 0x0) r1 = dup2(r0, r0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r2, r2, 0x0, 0x1) fsetxattr$security_smack_entry(r1, &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='*mime_typeproceth1{\x00', 0x14, 0x2) 09:01:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:18 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000140)=@HCI_SCODATA_PKT={0x3, "552848077621360faced5ba9bfdb07cd5804aa70c67bb9e03c18cb69ad05af0ec5013551691444a292c87cc1ef507e39a7aab350b5a5b3a8146e11b55bd62fa8fe61a3161e071cdfdee182b1c5bbda6fa844d3d359d056b2c5bd6362d81863984b67f924dedb7f72"}, 0x69) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "5cf0356821ff8a00e9cd4f661c636528afb792b5"}, 0x18) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:01:18 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 09:01:18 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 09:01:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000060000000000000000000", 0x28}], 0x1) 09:01:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c) 09:01:18 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x18401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x1015, 0x5, 0x5, "826762edb691d0580124b2c7b8c4016c", "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"}, 0x1015, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:01:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x9, 0x3, 0x0, 0x8, 0x6}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) sendfile(r0, r0, 0x0, 0x1) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) 09:01:19 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 09:01:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000078000000000000000000", 0x28}], 0x1) 09:01:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c) 09:01:19 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) r1 = socket$caif_seqpacket(0x25, 0x5, 0x3) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8003, &(0x7f0000000140)=0x8, 0x3, 0x4) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000080), 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x224000, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x3}) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:01:19 executing program 3: getpgid(0xffffffffffffffff) getpgid(0x0) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/dev\x00') sendfile(r1, r1, 0x0, 0x1) 09:01:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:19 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 09:01:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000007e000000000000000000", 0x28}], 0x1) 09:01:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c) 09:01:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000006, 0x40030, r0, 0x0) sendfile(r0, r0, 0x0, 0x1) 09:01:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x88\xa8'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:19 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 09:01:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000e0000000000000000000", 0x28}], 0x1) [ 1095.666437] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:01:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000fc000000000000000000", 0x28}], 0x1) 09:01:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x00\xf0'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:30 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) r1 = getuid() ioprio_get$uid(0x3, r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000180)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}}}, &(0x7f0000000240)=0x84) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:01:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:01:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c) 09:01:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x7f\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 09:01:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000030000000000000000", 0x28}], 0x1) 09:01:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\x9e\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:01:30 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 09:01:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000050000000000000000", 0x28}], 0x1) 09:01:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c) 09:01:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xf0\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:40 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000380)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4001, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)=0x9) 09:01:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x6) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={0x0, 0xffffffffffffffff}, &(0x7f0000000380)=0x8) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000240)={0x3, 0x6}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000400)=@assoc_value={r3, 0x994f}, &(0x7f0000000440)=0xfffffffffffffff1) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000180)={0x7c8, 0xffffffff, r1, 0x0, r2, 0x0, 0x7, 0x20}) 09:01:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:01:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000dc050000000000000000", 0x28}], 0x1) 09:01:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c) 09:01:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xfc\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00\xff\xff'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 1116.945549] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:01:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:01:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}}, 0x1c) 09:01:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000060000000000000000", 0x28}], 0x1) 09:01:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000000)={0xe, 0x3, 0x2, 0x401, 0xba, "9f81e5567ca018af67180dd7afd3fcaf48b6518cad75100e92e82b214f38617cd5691cae429b9335cd9b88216401a2eda731326c6a02523a23ce167540a76ee62301ed5c6f27079381a1c824e3835d41059302499e194cb5823ff18bc64884d9b086a7cc3cb274601457a80484cdc09236983e6bf033d86c1d89e2156370778074eb04c218ec4cdfacb4d149174e8868024bd7c06088e2ca8ef2bff9e19f6fd21653de7d15b757b1772d3bbd1bfe732908b86f2b35cca91ec321"}, 0xc6) sendfile(r0, r0, 0x0, 0x5) 09:01:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 1117.141058] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:01:50 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0x10000, 0x1}, {0x9, 0x8}], r1}, 0x18, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x78) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x7ffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) 09:01:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) fcntl$setflags(r0, 0x2, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x800, @mcast2, 0x4}, 0xffffffffffffff79) 09:01:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffb8]}}, 0x1c) 09:01:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:01:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000070000000000000000", 0x28}], 0x1) [ 1127.171864] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:01:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) r1 = shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f00000000c0)=""/158) 09:01:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:01:50 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000090000000000000000", 0x28}], 0x1) 09:01:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:01:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1dba0]}}, 0x1c) 09:01:51 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xf8f, 0x10003) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xdc, 0x42, 0x1, 0x70bd27, 0x25dfdbfb, {0x12}, [@generic="fbbd4892416ad66f3f0f9e2b7a2313cd5c2aa62234a451b871f1893046ddc28cdde7aa67274a6c6725582de1ebac0ea3bd867a0cf000d7aa3acb93acd6602af83d7d49de15682c06bda4bd8362cd05e49d0a513438c559c7ab346c25046131cb1293ea2449c29f5fa2c240247fac613d498646b162d0fbc985aa45fbbf936161c91b06b4b9a81ca0ef2fbcca2390b0b0ac68dfd8a272bb67819bafde3037fb992c95a331852c9e96fb95a70815a1d9cc0dce819a96d47f0256054716d33ceb7b9141cd5eac3d"]}, 0xdc}, 0x1, 0x0, 0x0, 0x1}, 0x48004) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) [ 1127.366757] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:02:01 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x800) ioctl$VIDIOC_G_STD(0xffffffffffffff9c, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000140)=r2) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:02:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:02:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000a0000000000000000", 0x28}], 0x1) 09:02:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}}, 0x1c) 09:02:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:01 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) sendfile(r0, r0, 0x0, 0x1) [ 1137.401723] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1137.429411] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:01 executing program 3: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x65) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$SIOCX25GCAUSEDIAG(r0, 0x89e6, &(0x7f00000000c0)={0x3, 0xd3b7}) setitimer(0x0, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, &(0x7f0000000080)) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) pipe(&(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) 09:02:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:02:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000000e0000000000000000", 0x28}], 0x1) 09:02:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c) [ 1137.553051] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1137.591442] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:01 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) 09:02:11 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x400000, 0x0) statx(r1, &(0x7f00000002c0)='./file0\x00', 0x4000, 0x189, &(0x7f0000000300)) write$vhci(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="042e5e3210a33563"], 0x2) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400, 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x80) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000000)) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000400)=""/14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000440)={@dev={0xfe, 0x80, [], 0x1a}, @mcast2, @local, 0x8, 0x2, 0x5, 0x100, 0xffff, 0x200, r3}) 09:02:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:02:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000110000000000000000", 0x28}], 0x1) 09:02:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000]}}, 0x1c) 09:02:11 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x420002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000040)={0x3, 0x973e, 0x5}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') fsetxattr$security_selinux(r0, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:user_cron_spool_t:s0\x00', 0x27, 0x0) sendfile(r1, r1, 0x0, 0x1) [ 1147.663840] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1147.667144] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 09:02:11 executing program 3: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='coredumper\x00') sendfile(r1, r1, 0x0, 0x1) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000000)=0x401) [ 1147.729334] QAT: Invalid ioctl [ 1147.749210] QAT: Invalid ioctl 09:02:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000300000000000000000", 0x28}], 0x1) [ 1147.774452] QAT: Invalid ioctl 09:02:11 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 09:02:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x1c) [ 1147.804574] QAT: Invalid ioctl [ 1147.807898] QAT: Invalid ioctl [ 1147.844204] QAT: Invalid ioctl [ 1147.875393] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1147.926503] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:22 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x80) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\b\\'], 0x2) 09:02:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000003f0000000000000000", 0x28}], 0x1) 09:02:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 09:02:22 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1000000000001) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) 09:02:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}, 0x1c) [ 1158.485314] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1158.512666] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) 09:02:22 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x7, 0x200000) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x28, "68efec7b4da24d7fe9f82a87e3a2e0f1cb0581f71a7c76684ad625912d7a1402e614daada1c68e7a"}, &(0x7f0000000040)=0x30) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000080)={r2, @in={{0x2, 0x4e21, @remote}}, 0x38000, 0x3}, 0x90) sendfile(r1, r1, 0x0, 0x7ffffffffc) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) 09:02:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000400000000000000000", 0x28}], 0x1) 09:02:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:22 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40aa40, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 09:02:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x1c) 09:02:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendto$inet6(r0, &(0x7f0000000200)="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", 0x1000, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x1, @mcast1, 0xaf}, 0x1c) sendfile(r0, r0, 0x0, 0x1) 09:02:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000600000000000000000", 0x28}], 0x1) [ 1158.714196] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1158.736600] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:22 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80, 0x0) splice(r0, &(0x7f0000000200), r0, &(0x7f0000000240)=0x5e, 0x0, 0x4) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000000280)=""/68, 0x44) recvfrom$unix(r0, &(0x7f0000000040)=""/227, 0xe3, 0x40010102, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') 09:02:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c) 09:02:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000780000000000000000", 0x28}], 0x1) [ 1158.894390] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1158.929961] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:22 executing program 5: r0 = inotify_init() creat(&(0x7f00000001c0)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000240)='./file0\x00', 0x80000002) read(r0, &(0x7f0000000000)=""/177, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) 09:02:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') fdatasync(r0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000000)) sendfile(r0, r0, 0x0, 0x1) 09:02:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:22 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000007e0000000000000000", 0x28}], 0x1) [ 1159.088699] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:02:32 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:02:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c) 09:02:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000007f0000000000000000", 0x28}], 0x1) 09:02:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget$private(0x0, 0xfffffffffeffffff, 0x0, &(0x7f00006f2000/0x4000)=nil) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x70802, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000080)="646a1214374c9aa0f7883979a5c2a4ea5e4dcec0f15bf91a2ecd5bd757fd8e9bf810a716b8cb829ce11b496a33d71960c5b176304ab4ad4035ef76ccfec896e6290bdfaad8ba9d28adac174fad2c17d41f741076b44b00ac20271938fcede6d2be4b474e3806a65eb8a9f294add45e8199be1769fbea2ec9bc459c61c8f812c437ce51c12cd6d21580ba2a0ff7e50c83560596cdfd55a763a8f26591f5487ef8f78564d449244a2d410ff14fd7792c", &(0x7f0000000140)="b42b113d13d2aa437c19dc162347d422eb51d34111350e9e075058fdd9aba2755fc1e23a9dd0197aa8285b3c792416f0b36f2d2b5e2f4487"}, 0x20) syz_open_procfs(0x0, &(0x7f00000001c0)='cor\x00\x00\x00\x00p_filt&\xbeT') 09:02:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:32 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000000002, 0x10, r1, 0x0) flock(r0, 0x3) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="64869cdd7e0ae16087447e65923909ccbfe4f1e44fe110ec5b9591d50a96e502270dad1d2810e824e58dd6c37a478c0c2be331a9e32045e84a35a7e8dcc1377707000000b9488acd0b6557753c38b775f402f510ad345ef69c1ec001b502746b530800", @ANYRES64=0x0], 0x2, 0x0, 0x0) [ 1169.394332] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1169.406039] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:33 executing program 5: setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9222, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r1, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x16, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000440)={0x53, 0x0, 0x0, 0x7, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0}) 09:02:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}, 0x1c) 09:02:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000fe800000000000000000", 0x28}], 0x1) 09:02:33 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x7) 09:02:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:33 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f00000002c0)) [ 1169.578682] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1169.597075] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:43 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) uselib(&(0x7f0000000040)='./file0\x00') 09:02:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000080)=0x20) sendfile(r0, r0, 0x0, 0x10000000001) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x700, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x100000001}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800001}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x84, r2, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd743}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x482fb44200000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x888}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x800}, 0x8010) 09:02:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c) 09:02:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000fec00000000000000000", 0x28}], 0x1) 09:02:43 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000001440)={{0xa, 0x0, 0x5, @mcast1, 0x6}, {0xa, 0x0, 0x8000}, 0x0, [0x0, 0x0, 0xe4f, 0x0, 0x1, 0x0, 0x7]}, 0x5c) write(r0, &(0x7f0000000600)="edca4c00e7b354e40b9e0fd32a1175327fea151502c06217aca17db3131e6072cdfd69e7cd5135eaf6568d7607c841192f7e70236b57d96863375712e7058c4ec548f381d55e4615590c64443ae8179f6366cb59df8f61a1b11de7270c39ed664c816cb657ed2f4356b28b105e42ae1edb6fb192cdea77ca26c662b4f30fd0c225f5b7cf5a2de1929e24eaea1551b46903f3dda28db6ba3305c52cc91723e93bc452f55b53a12a59b2975c6e3bea28edefd3726a64e3967b6e87164f0cb0de76bf87225d1748b0a068ece9ff12be45a4142ab3d2c88d67d8248d0d8c4b3d64dce1c6bc4cd8c39d96e8da06a72feb2a5a470b45ab3b18d7e0331b480bc058a009ee7ada1645f5e67d55bbbc623bf8478c0aa18881cbda37c97961535d77556a35ce2863776499910491a8bed4f921a43e3b70809cd53b0e8f15834e10cac343cce6935b5dc6069cf82895a814b8be42d95f41e20aea0ba0012139613289a155ae79402d93ea47425daca8e2ff0db9d2580179f22f7adf5e971427d02c606d7d9399303280e6f2f53eafee5078b9ccbdd3633b95008e1ebf72b8acd87047684af0c322f142e1a155afed365d3990ada50cfc5924224a9102959f9bb0a66765bcf2f7b8780168148dacc98065901ac465f6a6e5f4425e4d232599a5a968135816e5a0863a6eaddb6aa7f7b0e32b589254494242497d0c569165d1e40865a2fdfa3b36e348f289f57a9de57fd076f96ba3d6da5f646dc85ba6fa1681e2bc7cc96e998df36b940e423007046d78e150137075b0488a8f94f056ed5a8ee93f26952a36a755d2a2099d4e14489ac60a4b318cad79b60d7a58cf71fdf149aaf0dcc3ac30a4ab41c9bd3ef0ac9f310d8b44ffd4d5988f552f544d5eeefe295bf51d6e2ca0556a61c081b0ca54eea19ed7f5a187ac1109539ed7bf5a59750600377e451b831b56bc6b5fd534187e1cf113585e07ad578f7bd0d2424306cdd45e69727e13f18d69107b107ad558472aab0ee915839862a94a45ecdfdeb4732c3558a0ea878aeb5eb54e6f3fdfc149838fbfbac8c219d87e29c724670e706d2479fb4e41ce189b379d9d1f37af43fd2d53434fcaeaea0ea94eacd62071e924fccfdc26d8e1635efdbd7bb678fc0ee60081f47ac16d82c340c53421761a549511fac31fb4ef513c6c95635231863ec86035182a50ef7142ec000ebae17d822f91a58663ec3b7b2754cc526f3f4dc6b8adace6e8244fb6d12c2c0da3f4086a0ef28e84e1af34a2fdfc07b9c8e652f097bdfd5517c1ad6711d60637fb8f3fe0d83cb2689b396e6d406d661aa474b883ef1e1ab9f5c11f7ac5fd61a77700d65652e04f7bb4ae0d81ed84236618149fefaeafd36c2345d6156b80988a5b6e12e97f17570b7c66a91dc895293137e11d8ea2c3a5ee255ebdebc5815e436d2eb1976e22f4d72704b9863bcac10a697917fba6ca5d0aa8f44dca72bf59e82e21cc4fdeadd3baa90cbde1a287aab6c163cd3a6a898de9a18bce8749523f1bc9d99e96b49069954d90a60e08fdae720f8b1e1205783d525573fe329486eaa1bae4975723d0c5d715248c26558bdf8a04347e6202ff079ff207c215db8cc295ae153963489a6928af57bddca93cc03b4fd3fc0cd886d4de975125e4ea888c9baa1fd4ac7e81fc24ea42f854bce47810d44aa3887a9e47fe9a28e6e8244de7bfe91671a9cd9a0ff77ca1f1c42506c61ee668ad75875f6b947a8983a61042b478b376039e190aa5f1db4fe52c7fcd401a3b25c3008b1eef4dad0313ba261c3301f0923b9394a3fa233440e1d84282edbd18a24730b460354c362fb21016b79a934dac80e4d00534cf88bce6db34823b6a630479147a8abcbccf2ca41f8bedcc9695a01840669fe22dd32916bae5fea1af5ba89be819444f235d0faa7e8c32c4d3da1efb8b367e738c94248c9a69322409d869289484761415a2ff0e9bcfa337b5ab751da35ed1dc2e77d36a20129808780eab232064c98ee4ea1cd9801d6e71e1b16a28911dd249f49387a361517febdfcc305d9d0cb3992674dab33b41bdf232f151ccd3192025aaead5a30e3cf0a057fe36dc29577980f81bcc57c2f052136a13eed2bb6816e44d43af2b80a218fc7d5e06669a5b175fbdb288b7f70386043ca97a059b3c3e868a861b7053288d36d875a8152ab2ae5cefe454baa6d6a32a64beeff8991004dbeafb43b1a095391db2a8ed9c2f93a47157145fd1515ccc0d96d876edf92cd196382278496db5b41e0478b32eba040b8e088b9014dc3b44410ede0d400a0a0d1b77271695e6494d3c2e4cf11aa25593891b80e2eeff5ac31b522ba5b906425830bd215fe1b1227a5af91978af872decba7db9455bb37252b4d152ac41d8b0cd5edb75902be27dcce1816dd07c2d095b259f6892b937e83c21a5c36488816dd28baf4b010009c62147f66770b4ced321bf17b1aceb7f9afe864f6c389a25c3c0a22f4fd8a900ffb18e633e0ffaaa413df47b9e689416092eb3a69c32b2e41b573b49ffabdd73db7b97d9864d038039843c21b36c0394a1104d1feee652e3c4c1a6d991d518e0ad9dc210cc6b6480f97c9856737ee9c1e349b1d129ac8bb53939964da7fa8c511f9ce648bb9c7679181c1f433b35337089e9b50f97b346c25eff2fc3486d69575f28025ab0253ef56a405a51a6da27ab9de3e189daccd5eaa88a6212d866bd2382952d7e57a5b93391ff1400eac67f6c9fef11ef9931b9162710198ea6d00041b113010f7aed955a1cfff0bceb1f0fb714429fbc9f695bb2ac7de7bac3f52c23690c46fa0febf80df782e72daf5a9cd0acfed6f26b851313a0b04f37eb1bcdfe17a37794fa9058feee52a58d4c2959c66f71933fcd66a0187d8a31880341cae695f50e80d7f9cfbf98b57eb024b2e61f31cdae882b53211da15e2e26f6577a408542674c56cb10a95d44b9c2a5e8970832c007d5ff9f26cd96ddc9dc059fff8cdadfc60fd78f47e7cc99f648d65ff18fd824d990c3c137b3b79ea6a55eac895cfebfc12ab8addef871baee1317021440fa8a8dc049a9bf4ff9452a5695577abce5ba96897677fb698f1ae17771a9b71aef8f2c06f4459fe6052737377834333421bdf38aa3c7ecbd22b518a51fbbad3b85f322df1dbbf79f68377718d3810558055170ebaeb90cb1463699679cb2f486e7845f729fc8f23b65283f098c910bbe4b06f7f06b1b0c41ff5b2d097d46cf4050cc74c9413b6809cc4d2e1a1e770bd69251f2010f4994aa73a229991abd79b222b79bd2e45f7b3d912365cab124bbac4078c416f9df21f53e6076dfd3e2d6153f0b91d484f0f0d36a0073099b4ee997bac02345e5fa49670a8b5968449ab508bb8d8663428974633f07e3f5f4b3d2cc0b6ffd5fdec7417137f4c05a1162412b6c4bdeaf110a90a2ba17947fe82fe2c1ddbc9a5a2cae29b8cc929c9ed47f195d06968cc036022c35a225678972fefbd7b6d6d8e7a26bbeb702246a736daca4bc1ed6cc8b3ee9894abc5178601289120c64884ed3055bb062e0c3891df2fa2ca33ce6da4bb884a4b43ba94871cd5ad5771b1503b61759fc843b7a2829cf0cfeabad5cf690212431345119e9d4d97d8881", 0xa00) r1 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000140)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000580)) getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000001100)=0xc) fstat(r1, 0x0) ioctl$void(0xffffffffffffffff, 0x5451) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x1ffe0) [ 1179.649588] audit: type=1800 audit(1546851763.286:128): pid=11439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=16942 res=0 [ 1179.683282] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1179.686021] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:43 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000005dc0000000000000000", 0x28}], 0x1) 09:02:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}, 0x1c) 09:02:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x101) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x0, 0x2, 0x81, 0xb49d, 0x80000000, 0x7}}, 0xa) 09:02:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 1179.762381] audit: type=1804 audit(1546851763.316:129): pid=11439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir298605854/syzkaller.WGK8Z4/1481/file0" dev="sda1" ino=16942 res=1 [ 1179.832771] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:43 executing program 3: r0 = accept4$x25(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000040)=0x12, 0x80000) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/validatetrans\x00', 0x1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x430801, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r0, 0x40}, {r1, 0x410}, {r2, 0x400}, {r3, 0x20}], 0x4, 0x7) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r4, r4, 0x0, 0x1000000004) r5 = getpgrp(0xffffffffffffffff) fcntl$setown(r4, 0x8, r5) 09:02:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c) [ 1179.924114] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1180.005914] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 1180.328616] audit: type=1804 audit(1546851763.966:130): pid=11439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir298605854/syzkaller.WGK8Z4/1481/file0" dev="sda1" ino=16942 res=1 [ 1180.370067] audit: type=1800 audit(1546851763.966:131): pid=11439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor5" name="file0" dev="sda1" ino=16942 res=0 09:02:53 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000140)=@HCI_SCODATA_PKT={0x3, "2b29bf05d5453814bb11bb4998a1328d80cc321e7c571b845be78cda17b5d5b9de9d78a5e26d86db9eb62ce99d16239dd626623f255033e880e8d607bd30cf0227d09b8825dec0e0bca8063944fd76dddeb5478b59342049d215cf147e787b95caad318e90dd26191d9cdb953a713877e186c0712c54c6e9cf7508b8276b09d7fe4b6ffaf3abd5e5354408aa6542c6249a987a"}, 0x94) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:02:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000e00000000000000000", 0x28}], 0x1) 09:02:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:53 executing program 3: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) 09:02:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c) 09:02:53 executing program 5: 09:02:53 executing program 5: 09:02:53 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x400000000006, 0xa000) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x10000, 0x636e127811633f5a) write$P9_RRENAME(r2, &(0x7f00000002c0)={0x7, 0x15, 0x1}, 0x7) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000000)={0x2, 0x1, @start={0xf50e}}) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, @empty, 0x8, 0x100000000, 0x479, 0x400, 0x5, 0x40000000, r3}) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000080)=0x401) [ 1189.897778] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 1189.932406] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:02:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000fc0000000000000000", 0x28}], 0x1) 09:02:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:02:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c) 09:02:53 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x41}, 0xfffffea3) 09:02:53 executing program 5: [ 1190.059373] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:02:53 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f0000000080)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, 0x0, 0x4d0, 0x3, [@default, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}) getpgid(0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000000)='coredump_filter\x00') sendfile(r3, r3, 0x0, 0x1) setsockopt$RXRPC_SECURITY_KEY(r3, 0x110, 0x1, &(0x7f0000000140)='bdev!wlan0**nodev,vmnet1security\x00', 0x21) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000180)) 09:02:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 1190.111995] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000080fe0000000000000000", 0x28}], 0x1) 09:02:53 executing program 5: 09:02:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x1c) 09:02:53 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000040)=0x9, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0xf0, 0x3, 0x5, "6329b32c16f12ec395fbd14a9e2a61fc", "63191317d0e8174f4fb7d5256fee4c3a129e4a7dbece35e350b3bf16a37f8b4c7257e89ca7182cb0425ce9643801311b50664d96972289cdce6c586d770a7a8d8e12ce75438ad57d4435c92f47b5de69aaf7561749f3cf214c6b96267c06dc9c16671d979ef04769740fce6d181002f00af087260521b85bb70fb66752f259e318a0f90b5d83ccde4126a841c1eb43fc1a286897df827032490c21fa3a5bc484bd44ab60aadbe9c7c3dfacf41c8a385374d80a840d8887cbb6cf36d925594cee0347690e93236641ba3712e977806efee3e6e049cab8ce47094236"}, 0x41e, 0x3) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r2, 0xa04, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x8, @link='syz1\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x40) sendfile(r1, r1, 0x0, 0x1) [ 1190.219703] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:02:53 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) close(r0) 09:02:53 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f17275975000000000000c0fe0000000000000000", 0x28}], 0x1) 09:02:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 1190.311045] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:02:54 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000ff0000000000000000", 0x28}], 0x1) [ 1190.407285] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:03:04 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="a8ddb0d8d11da43841cfc1ff429a6328f5b056372c51ba9ab381389620d27a4a8a817f66f1fdc4d83b9fcdef8b796cf74a9460b71fc7975c9388c8dade3bee97783304117d73281187b445c4333a6e9adbb6613d5d8442b1ca72c33a12d492ac1b7ec16eea987a4ca0445c6569cccde0705b7179ab40375a92c08af611ad51639dbc7754a0ba186802e224d8ba3e3243970764bf4e1a1f11719c133f8e303ec16504dd8b0fa52c953a23ac9e8d42660d948ce2fdd33bc8cba116b0"], 0x2) 09:03:04 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000200)={"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"}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f0000000600)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000007c0)={r0, &(0x7f0000000680), &(0x7f00000006c0)=""/219}, 0x18) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') recvfrom$rose(r1, &(0x7f0000000000)=""/68, 0x44, 0x2, &(0x7f0000000100)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x40) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0x3, 0x4) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{0x20, 0x100000001, 0xfffffffffffffffd, 0x7}, 'syz0\x00', 0x32}) fsetxattr$security_selinux(r1, &(0x7f0000000680)='security.selinux\x00', &(0x7f0000000800)='system_u:object_r:dhcpd_exec_t:s0\x00', 0x22, 0x1) sendfile(r1, r1, 0x0, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x8, 0x400) r3 = syz_genetlink_get_family_id$team(&(0x7f00000008c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000900)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000a00)=0xe8) socket(0x5, 0xa, 0x7fff) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000a40)={@dev, @multicast2, 0x0}, &(0x7f0000000a80)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002280)={'vcan0\x00', 0x0}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000f40)={0x0, 0x9}, &(0x7f0000000f80)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000fc0)=@assoc_value={r7, 0x8000}, &(0x7f0000001000)=0x8) accept4$packet(r2, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002340)=0x14, 0x80000) accept4$packet(r2, &(0x7f0000002380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000023c0)=0x14, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000002400)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in=@empty}}, &(0x7f0000002500)=0xe8) recvmsg$kcm(r0, &(0x7f0000000f00)={&(0x7f0000000ac0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000b40)=""/203, 0xcb}, {&(0x7f0000000c40)=""/235, 0xeb}, {&(0x7f0000000d40)=""/104, 0x68}], 0x3, &(0x7f0000000e00)=""/198, 0xc6}, 0x2000) getpeername$packet(r0, &(0x7f0000004840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004880)=0x14) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000048c0)={@initdev, 0x0}, &(0x7f0000004900)=0x14) getpeername$packet(r0, &(0x7f00000060c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006100)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006140)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000065c0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000006580)={&(0x7f0000006180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="08022dbd7000fedbdf250100000008000100", @ANYRES32=r4, @ANYBLOB="2002020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000100000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000100000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000700000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400018000000800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004008d54000008000600", @ANYRES32=r5, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000200000008000600", @ANYRES32=r8, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="88010200400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400ffffffff08000600", @ANYRES32=r11, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000900000008000600", @ANYRES32=r12, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="08000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e6700000000"], 0x3cc}, 0x1, 0x0, 0x0, 0x800}, 0x50) 09:03:04 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2713, 0x0, &(0x7f0000000300)) 09:03:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1313a9e0]}}, 0x1c) 09:03:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:03:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000400300000000000000", 0x28}], 0x1) [ 1200.775369] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:03:04 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r0) 09:03:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000400000000000000", 0x28}], 0x1) 09:03:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}}, 0x1c) 09:03:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:03:04 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r0, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x17a0000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffc}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x700000000}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004000}, 0x24000000) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f00000002c0)=0x2220) write$vhci(r1, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) write$vhci(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="eea2"], 0x2) 09:03:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x10) 09:03:04 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc00c5512, &(0x7f00000001c0)={0x0, 0x5517, 0x70f000}) [ 1200.939091] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 1200.968603] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:03:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:03:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fafff7b]}}, 0x1c) 09:03:04 executing program 3: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000200)='attr/exec\x00') sendfile(r1, r1, 0x0, 0x1) getrusage(0x1, &(0x7f0000000000)) 09:03:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000001000000000000000", 0x28}], 0x1) 09:03:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x2d}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) [ 1201.141135] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1201.172017] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:03:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}}, 0x1c) 09:03:04 executing program 3: socketpair(0x0, 0x80000, 0x7ff0000, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') 09:03:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000034000000000000000", 0x28}], 0x1) 09:03:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 1201.312684] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 1201.332338] netlink: 'syz-executor0': attribute type 17 has an invalid length. 09:03:15 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x200) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0x4, 0x0}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000140)={0xa000000000000000, r2}) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:03:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}}, 0x1c) 09:03:15 executing program 3: gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='coredump_filter\x00') bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r1, 0x5, 0x3}, 0x10) sendfile(r1, r1, 0x0, 0x1) 09:03:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:03:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f172759750000000000006b6b6b00000000000000", 0x28}], 0x1) 09:03:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c) 09:03:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x4e24, @remote}, {0x306, @broadcast}, 0x2, {0x2, 0x4e21, @remote}, 'team_slave_0\x00'}) 09:03:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000001000000000000", 0x28}], 0x1) [ 1211.647307] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1211.672030] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 1211.683217] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:03:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:03:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}, 0x1c) 09:03:15 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000380)={0xfffffffffffffd6b, 0xf, 0x1, {{0x10, 0x3, 0x3}, 0x40000800}}, 0x18) r1 = socket$inet6(0xa, 0xffffffffffffffff, 0x6) ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000200)) r2 = syz_open_dev$evdev(&(0x7f00000005c0)='/dev/input/event#\x00', 0x8000000, 0x400001) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f00000004c0), 0x3}, 0xa0) ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000040)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000280)=r2, 0xfffffc5e) r3 = socket(0x40000000015, 0x5, 0x3) fcntl$getflags(r2, 0x401) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r3, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000080), 0x4) sendto$inet(r3, &(0x7f0000000a00)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9", 0x241, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) r4 = mq_open(&(0x7f00000003c0)='\aoj9\xbc\xf6u=w\x0e\xecuWOA\xe8\x85\x02^;\x8f\x9c\xd2a\xc1c\x1f8h\x84\x9ej2#\xe3g\xdd\x13\xedI\xdc\xa1\xfc1\xe5\x01VZ.\xfbD\x7f.\xbb\x99\xdb\xb7\xef\xbe\x1c\xc9\xb6\x17g\xff\xec\xf4\xe8lD{\xa8\x04\x0f\x8f\b\x8e\xf9ln\x90\xca\xf1\x97\xb6[\x14})\v\xeeU\x14o\x1b1fV\xbf\r\xa51zhq\x10\v\xf5\xb1g\x9c\x1c\x83b\xd3\xa3\xd7\xb9\xeb\xf9\xc0\xd1\x15\xf1\xa3\x8a^\xbe\x12\x97\xc8lf\x95\x9e \x00\x00\x00\x00\x00\x00\x00\x0er\x05\x1d\xd8\xaa\xf5\xd4\xc0\xd0\x80,\x05V\xe46/9x\xd5P\xd1v\'?\x1d|\xe5\xe2\xe9\x7fy|\x1f\xb47d\x10\x8c\xcc\x91\x82\x925\xeb\xe8\x88\"\x96B\xec\x9c\xa8\xa7\x7fr$\xb4\xa0', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000340)={0x0, 0x8, 0x5, 0x20, 0x0, 0x0, 0x0, 0xfffffffffffffffd}) mq_timedsend(r4, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000200)=""/122) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f00000002c0)=""/60) mq_timedsend(r4, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)={0x77359400}) mq_timedreceive(r4, &(0x7f0000000100)=""/24, 0x3b4, 0x0, 0x0) unshare(0x800) pread64(r5, &(0x7f00000001c0)=""/25, 0x19, 0x0) 09:03:15 executing program 3: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x1) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}) syncfs(r2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000000c0)={0x0, @aes128, 0x2, "50079f08a9d63fa9"}) [ 1211.821747] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1211.839007] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:03:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}}, 0x1c) 09:03:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000002000000000000", 0x28}], 0x1) 09:03:25 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT, 0x0) write$vhci(r0, &(0x7f0000000000)=@HCI_EVENT_PKT={0x4, 'c'}, 0x2) 09:03:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:03:25 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:03:25 executing program 3: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)='coredump_filter\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000400)='mounts\x00') mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sched_setscheduler(0x0, 0x5, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f00000001c0)={0x3, 0xffffffffffffff00}) sendfile(r1, r1, 0x0, 0x1) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0xa0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00634040010000000000000001000000000000000000000000000000000000000000000028000000000000000800000000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="852a52700100007e", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000002000000000000001f00000000000000"], @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='8\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0e630c4000000000040000000000000011634840020000000000000000000000000000000000000010000000000000000000000000000000000000000800000000000000", @ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00'], 0x92, 0x0, &(0x7f00000002c0)="46e60dc07ab839b1811655243ba22bdf5e98558c619b04ecdcbd5686b8ab946e464aec18464108d8047a9cabc25a8b9fcf89700531f6ec49162519a83c2c3dd97d9bf0767d996e71325b3db47a7b8919d37ba0b2ff6cee3cc66c15a338dc80e638c5dee4070d73b179cebb03a8bdb2db320a1b4f950b75dc846342f054d07e899abd06dcc608968cdcf8e730b3c39b5d2e53"}) [ 1221.880406] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1221.889472] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:03:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 09:03:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:03:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000003000000000000", 0x28}], 0x1) 09:03:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54000000]}}, 0x1c) 09:03:25 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x8401) write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT, 0x2) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000040)=0x3) write$vhci(r0, &(0x7f0000000240)=@HCI_EVENT_PKT={0x4, "2255e514ac7dc019ce0664510d4c3c5d091ac410176204c2015081ac707d4e36b87a60ce7a4c0eb0cf82f40874a469ed080ac6ba10173df3876e0dfd0e163fc2b77d8f42b8fb15c0d48958f3183b6bd5f67e1f26bf1d3a2fab5448df3060a670346c0b"}, 0x64) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000140)=0x4) 09:03:25 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x2) [ 1222.046128] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1222.056629] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1222.107067] ================================================================== [ 1222.114728] BUG: KASAN: slab-out-of-bounds in bacpy+0x23/0x30 [ 1222.120656] Read of size 6 at addr ffff88809f2104fb by task kworker/u5:1/9217 [ 1222.127937] [ 1222.129584] CPU: 0 PID: 9217 Comm: kworker/u5:1 Not tainted 4.20.0+ #13 [ 1222.136374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.145752] Workqueue: hci0 hci_rx_work [ 1222.149740] Call Trace: [ 1222.152346] dump_stack+0x1db/0x2d0 [ 1222.155996] ? dump_stack_print_info.cold+0x20/0x20 [ 1222.161296] ? bacpy+0x23/0x30 [ 1222.163008] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 1222.164520] print_address_description.cold+0x7c/0x20d [ 1222.164540] ? bacpy+0x23/0x30 [ 1222.164555] ? bacpy+0x23/0x30 [ 1222.164573] kasan_report.cold+0x1b/0x40 [ 1222.164619] ? bacpy+0x23/0x30 [ 1222.179895] check_memory_region+0x123/0x190 [ 1222.198031] memcpy+0x24/0x50 [ 1222.201289] bacpy+0x23/0x30 [ 1222.204439] hci_event_packet+0x3afc/0xc22e [ 1222.204481] ? hci_cmd_complete_evt+0xbe60/0xbe60 [ 1222.204505] ? up_write+0x1c0/0x230 [ 1222.204530] ? update_curr+0x4ae/0xbc0 [ 1222.204549] ? print_usage_bug+0xd0/0xd0 [ 1222.225923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1222.225942] ? check_preemption_disabled+0x48/0x290 [ 1222.225964] ? debug_smp_processor_id+0x1c/0x20 [ 1222.225978] ? perf_trace_lock+0x12f/0x750 [ 1222.225991] ? mark_held_locks+0x100/0x100 [ 1222.226011] ? add_lock_to_list.isra.0+0x450/0x450 [ 1222.226026] ? __lock_acquire+0x572/0x4a30 [ 1222.226042] ? print_usage_bug+0xd0/0xd0 [ 1222.226060] ? debug_smp_processor_id+0x1c/0x20 [ 1222.263099] ? skb_dequeue+0x12e/0x180 [ 1222.263123] ? mark_held_locks+0xb1/0x100 [ 1222.263143] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1222.263160] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1222.286425] ? trace_hardirqs_on+0xbd/0x310 [ 1222.290770] ? kasan_check_read+0x11/0x20 [ 1222.295036] ? skb_dequeue+0x12e/0x180 [ 1222.298940] ? trace_hardirqs_off_caller+0x300/0x300 [ 1222.304097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1222.309780] ? hci_send_to_monitor+0x306/0x470 [ 1222.314387] ? hci_sock_release+0x3c0/0x3c0 [ 1222.318734] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1222.323873] hci_rx_work+0x578/0xcd0 [ 1222.327646] ? hci_rx_work+0x578/0xcd0 [ 1222.331552] ? find_held_lock+0x35/0x120 [ 1222.331572] ? add_lock_to_list.isra.0+0x450/0x450 [ 1222.331623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1222.346303] ? hci_alloc_dev+0x21a0/0x21a0 [ 1222.350567] ? __lock_is_held+0xb6/0x140 09:03:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) 09:03:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000004000000000000", 0x28}], 0x1) [ 1222.354727] process_one_work+0xd0c/0x1ce0 [ 1222.358982] ? preempt_notifier_register+0x200/0x200 [ 1222.364124] ? __switch_to_asm+0x34/0x70 [ 1222.368284] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 1222.372996] ? __schedule+0x89f/0x1e60 [ 1222.376941] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1222.381983] ? worker_thread+0x3b7/0x14a0 [ 1222.382000] ? find_held_lock+0x35/0x120 [ 1222.382021] ? lock_acquire+0x1db/0x570 [ 1222.394227] ? worker_thread+0x3cd/0x14a0 [ 1222.398425] ? kasan_check_read+0x11/0x20 [ 1222.402715] ? do_raw_spin_lock+0x156/0x360 [ 1222.407051] ? lock_release+0xc40/0xc40 [ 1222.411050] ? rwlock_bug.part.0+0x90/0x90 [ 1222.415383] ? trace_hardirqs_on_caller+0x310/0x310 [ 1222.420440] worker_thread+0x143/0x14a0 [ 1222.424458] ? process_one_work+0x1ce0/0x1ce0 [ 1222.428990] ? __kthread_parkme+0xc3/0x1b0 [ 1222.433286] ? lock_acquire+0x1db/0x570 [ 1222.437290] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1222.442557] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1222.447192] ? trace_hardirqs_on+0xbd/0x310 [ 1222.451533] ? __kthread_parkme+0xc3/0x1b0 [ 1222.455790] ? trace_hardirqs_off_caller+0x300/0x300 [ 1222.460924] ? do_raw_spin_trylock+0x270/0x270 [ 1222.465548] ? schedule+0x108/0x350 [ 1222.469218] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1222.474345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1222.479910] ? __kthread_parkme+0xfb/0x1b0 [ 1222.484291] kthread+0x357/0x430 [ 1222.487681] ? process_one_work+0x1ce0/0x1ce0 [ 1222.492298] ? kthread_stop+0x920/0x920 [ 1222.496304] ret_from_fork+0x3a/0x50 [ 1222.500047] [ 1222.501688] Allocated by task 11647: [ 1222.505418] save_stack+0x45/0xd0 [ 1222.509135] kasan_kmalloc+0xcf/0xe0 [ 1222.512871] __kmalloc_node_track_caller+0x4e/0x70 [ 1222.517822] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1222.522507] __alloc_skb+0x12d/0x730 [ 1222.526245] vhci_write+0xc4/0x470 [ 1222.529832] __vfs_write+0x764/0xb40 [ 1222.533672] vfs_write+0x20c/0x580 [ 1222.537260] ksys_write+0x105/0x260 [ 1222.540903] __x64_sys_write+0x73/0xb0 [ 1222.544812] do_syscall_64+0x1a3/0x800 [ 1222.548733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1222.554040] [ 1222.555680] Freed by task 7: [ 1222.558717] save_stack+0x45/0xd0 [ 1222.562189] __kasan_slab_free+0x102/0x150 [ 1222.566463] kasan_slab_free+0xe/0x10 [ 1222.570299] kfree+0xcf/0x230 [ 1222.573441] skb_free_head+0x93/0xb0 [ 1222.577172] skb_release_data+0x6ea/0x970 [ 1222.581333] skb_release_all+0x4d/0x60 [ 1222.585248] consume_skb+0x18c/0x550 [ 1222.588998] netlink_broadcast_filtered+0x6e7/0x16f0 [ 1222.594120] nlmsg_notify+0x93/0x1c0 [ 1222.598040] rtnl_notify+0xc5/0xf0 [ 1222.601627] __neigh_notify+0xe3/0x160 [ 1222.605533] neigh_cleanup_and_release+0x7b/0xe0 [ 1222.610372] neigh_flush_dev+0x611/0x970 [ 1222.614451] __neigh_ifdown+0x45/0x300 [ 1222.618436] neigh_ifdown+0x20/0x30 [ 1222.622079] rt6_disable_ip+0x62b/0x730 [ 1222.626077] addrconf_ifdown+0x13e/0x15e0 [ 1222.630282] addrconf_notify+0x629/0x25f0 [ 1222.634449] notifier_call_chain+0x179/0x380 [ 1222.638871] raw_notifier_call_chain+0x2e/0x40 [ 1222.643506] call_netdevice_notifiers_info+0x3f/0x90 [ 1222.648649] dev_close_many+0x42e/0x890 [ 1222.652685] rollback_registered_many+0x544/0x1370 [ 1222.657650] unregister_netdevice_many.part.0+0x8e/0x470 [ 1222.663135] unregister_netdevice_many+0xba/0x120 [ 1222.667997] ip6gre_exit_batch_net+0x5c9/0x7f0 [ 1222.672648] ops_exit_list.isra.0+0x105/0x160 [ 1222.677159] cleanup_net+0x51d/0xb10 [ 1222.680976] process_one_work+0xd0c/0x1ce0 [ 1222.685264] worker_thread+0x143/0x14a0 [ 1222.689289] kthread+0x357/0x430 [ 1222.692685] ret_from_fork+0x3a/0x50 [ 1222.696472] [ 1222.698114] The buggy address belongs to the object at ffff88809f210300 [ 1222.698114] which belongs to the cache kmalloc-512 of size 512 [ 1222.710791] The buggy address is located 507 bytes inside of [ 1222.710791] 512-byte region [ffff88809f210300, ffff88809f210500) [ 1222.722675] The buggy address belongs to the page: [ 1222.727658] page:ffffea00027c8400 count:1 mapcount:0 mapping:ffff88812c3f0940 index:0x0 [ 1222.735819] flags: 0x1fffc0000000200(slab) [ 1222.740086] raw: 01fffc0000000200 ffffea00027a2588 ffffea00023f6188 ffff88812c3f0940 [ 1222.747989] raw: 0000000000000000 ffff88809f210080 0000000100000006 0000000000000000 [ 1222.755974] page dumped because: kasan: bad access detected [ 1222.761704] [ 1222.763343] Memory state around the buggy address: [ 1222.768299] ffff88809f210400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1222.775674] ffff88809f210480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1222.783067] >ffff88809f210500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1222.790431] ^ [ 1222.793817] ffff88809f210580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1222.801205] ffff88809f210600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1222.808623] ================================================================== [ 1222.815999] Disabling lock debugging due to kernel taint [ 1222.828678] Kernel panic - not syncing: panic_on_warn set ... [ 1222.834638] CPU: 0 PID: 9217 Comm: kworker/u5:1 Tainted: G B 4.20.0+ #13 [ 1222.842794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.852170] Workqueue: hci0 hci_rx_work [ 1222.856165] Call Trace: 09:03:26 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)={0x1, 0x4, [@broadcast, @link_local, @broadcast, @remote]}) getsockname$ax25(r0, &(0x7f0000000000)={{}, [@netrom, @netrom, @remote, @null, @remote, @bcast, @default, @bcast]}, &(0x7f0000000080)=0x48) sendfile(r0, r0, 0x0, 0x1) 09:03:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x4b47) [ 1222.858771] dump_stack+0x1db/0x2d0 [ 1222.858852] kobject: 'loop3' (00000000bdb0bd75): kobject_uevent_env [ 1222.862524] ? dump_stack_print_info.cold+0x20/0x20 [ 1222.862550] panic+0x2cb/0x65c [ 1222.877170] ? add_taint.cold+0x16/0x16 [ 1222.881172] ? bacpy+0x23/0x30 [ 1222.881691] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1222.884392] ? preempt_schedule+0x4b/0x60 [ 1222.884409] ? ___preempt_schedule+0x16/0x18 [ 1222.884426] ? trace_hardirqs_on+0xb4/0x310 [ 1222.884442] ? bacpy+0x23/0x30 09:03:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7bffaf1f]}}, 0x1c) [ 1222.884460] end_report+0x47/0x4f [ 1222.884474] ? bacpy+0x23/0x30 [ 1222.884491] kasan_report.cold+0xe/0x40 [ 1222.918817] ? bacpy+0x23/0x30 [ 1222.922040] check_memory_region+0x123/0x190 [ 1222.926624] memcpy+0x24/0x50 [ 1222.929754] bacpy+0x23/0x30 [ 1222.932793] hci_event_packet+0x3afc/0xc22e [ 1222.937174] ? hci_cmd_complete_evt+0xbe60/0xbe60 [ 1222.939854] kobject: 'loop3' (00000000bdb0bd75): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1222.942032] ? up_write+0x1c0/0x230 [ 1222.942052] ? update_curr+0x4ae/0xbc0 09:03:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000005000000000000", 0x28}], 0x1) 09:03:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000005bc0)={&(0x7f0000000780)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'veth1_to_team\x00'}, @IFLA_LINKMODE={0x8}]}, 0x3c}}, 0x0) [ 1222.959029] ? print_usage_bug+0xd0/0xd0 [ 1222.963110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1222.968782] ? check_preemption_disabled+0x48/0x290 [ 1222.973821] ? debug_smp_processor_id+0x1c/0x20 [ 1222.978506] ? perf_trace_lock+0x12f/0x750 [ 1222.982756] ? mark_held_locks+0x100/0x100 [ 1222.987017] ? add_lock_to_list.isra.0+0x450/0x450 [ 1222.991972] ? __lock_acquire+0x572/0x4a30 [ 1222.996224] ? print_usage_bug+0xd0/0xd0 [ 1223.000460] ? debug_smp_processor_id+0x1c/0x20 [ 1223.005152] ? skb_dequeue+0x12e/0x180 09:03:26 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) ioctl$RTC_AIE_ON(r1, 0x4b49) 09:03:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7fff, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c) [ 1223.009085] ? mark_held_locks+0xb1/0x100 [ 1223.013259] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1223.018380] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1223.021353] kobject: 'loop1' (00000000c83e1a91): kobject_uevent_env [ 1223.023499] ? trace_hardirqs_on+0xbd/0x310 [ 1223.023514] ? kasan_check_read+0x11/0x20 [ 1223.023530] ? skb_dequeue+0x12e/0x180 [ 1223.042299] ? trace_hardirqs_off_caller+0x300/0x300 [ 1223.047435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1223.053003] ? hci_send_to_monitor+0x306/0x470 [ 1223.057641] ? hci_sock_release+0x3c0/0x3c0 [ 1223.061998] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1223.067132] hci_rx_work+0x578/0xcd0 [ 1223.070870] ? hci_rx_work+0x578/0xcd0 [ 1223.074798] ? find_held_lock+0x35/0x120 [ 1223.077101] kobject: 'loop1' (00000000c83e1a91): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1223.078872] ? add_lock_to_list.isra.0+0x450/0x450 [ 1223.078899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1223.078915] ? hci_alloc_dev+0x21a0/0x21a0 [ 1223.092784] netlink: 'syz-executor0': attribute type 17 has an invalid length. [ 1223.093438] ? __lock_is_held+0xb6/0x140 [ 1223.093465] process_one_work+0xd0c/0x1ce0 [ 1223.093483] ? preempt_notifier_register+0x200/0x200 [ 1223.124147] ? __switch_to_asm+0x34/0x70 [ 1223.128234] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 1223.132946] ? __schedule+0x89f/0x1e60 [ 1223.136858] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1223.141911] ? worker_thread+0x3b7/0x14a0 [ 1223.145173] kobject: 'loop5' (00000000e1853d5a): kobject_uevent_env [ 1223.146085] ? find_held_lock+0x35/0x120 [ 1223.146103] ? lock_acquire+0x1db/0x570 09:03:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="01b416ff0f0009000000000000000000abf7c00f1727597500000000000000000006000000000000", 0x28}], 0x1) [ 1223.146118] ? worker_thread+0x3cd/0x14a0 [ 1223.146135] ? kasan_check_read+0x11/0x20 [ 1223.166478] kobject: 'loop5' (00000000e1853d5a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1223.168926] ? do_raw_spin_lock+0x156/0x360 [ 1223.168938] ? lock_release+0xc40/0xc40 [ 1223.168954] ? rwlock_bug.part.0+0x90/0x90 [ 1223.190934] ? trace_hardirqs_on_caller+0x310/0x310 [ 1223.195975] worker_thread+0x143/0x14a0 [ 1223.199983] ? process_one_work+0x1ce0/0x1ce0 [ 1223.204494] ? __kthread_parkme+0xc3/0x1b0 [ 1223.208750] ? lock_acquire+0x1db/0x570 [ 1223.212747] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1223.217868] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1223.222485] ? trace_hardirqs_on+0xbd/0x310 [ 1223.226827] ? __kthread_parkme+0xc3/0x1b0 [ 1223.231080] ? trace_hardirqs_off_caller+0x300/0x300 [ 1223.236206] ? do_raw_spin_trylock+0x270/0x270 [ 1223.236455] kobject: 'loop2' (00000000579efd8e): kobject_uevent_env [ 1223.240816] ? schedule+0x108/0x350 [ 1223.240837] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1223.240854] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1223.261623] ? __kthread_parkme+0xfb/0x1b0 [ 1223.265884] kthread+0x357/0x430 [ 1223.267624] kobject: 'loop2' (00000000579efd8e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1223.269292] ? process_one_work+0x1ce0/0x1ce0 [ 1223.269305] ? kthread_stop+0x920/0x920 [ 1223.269322] ret_from_fork+0x3a/0x50 [ 1223.292010] Kernel Offset: disabled [ 1223.295652] Rebooting in 86400 seconds..