0][T18642] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1241.208541][T18642] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1241.236017][T18642] team0: Port device team_slave_0 added [ 1241.244126][T18642] team0: Port device team_slave_1 added [ 1241.264527][T18642] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1241.272381][T18642] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1241.298326][T18642] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1241.310362][T18642] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1241.317355][T18642] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1241.344170][T18642] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1241.375538][T18642] device hsr_slave_0 entered promiscuous mode [ 1241.382833][T18642] device hsr_slave_1 entered promiscuous mode [ 1241.460589][T18642] bridge0: port 2(bridge_slave_1) entered blocking state [ 1241.467737][T18642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1241.475293][T18642] bridge0: port 1(bridge_slave_0) entered blocking state [ 1241.482430][T18642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1241.534123][T18642] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1241.549217][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1241.559344][T13518] bridge0: port 1(bridge_slave_0) entered disabled state [ 1241.566875][T13518] bridge0: port 2(bridge_slave_1) entered disabled state [ 1241.575635][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1241.591898][T18642] 8021q: adding VLAN 0 to HW filter on device team0 [ 1241.605212][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1241.614538][T16142] bridge0: port 1(bridge_slave_0) entered blocking state [ 1241.621661][T16142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1241.635752][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1241.644165][T13518] bridge0: port 2(bridge_slave_1) entered blocking state [ 1241.651314][T13518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1241.670153][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1241.679386][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1241.695150][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1241.708421][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1241.720027][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1241.733202][T18642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1241.752268][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1241.759870][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1241.775301][T18642] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1241.792193][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1241.814811][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1241.823111][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1241.831528][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1241.842507][T18642] device veth0_vlan entered promiscuous mode [ 1241.856741][T18642] device veth1_vlan entered promiscuous mode [ 1241.879483][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1241.890065][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1241.898366][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1241.909047][T18642] device veth0_macvtap entered promiscuous mode [ 1241.919538][T18642] device veth1_macvtap entered promiscuous mode [ 1241.936488][T18642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1241.947723][T18642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1241.957914][T18642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1241.972408][T18642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1241.982323][T18642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1241.997129][T18642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.006935][T18642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1242.018039][T18642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.028641][T18642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1242.039274][T18642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.052337][T18642] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1242.062010][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1242.074821][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1242.084536][T18642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1242.095969][T18642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.106033][T18642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1242.117573][T18642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.127432][T18642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1242.137899][T18642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.148575][T18642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1242.159339][T18642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.169221][T18642] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1242.181411][T18642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1242.193080][T18642] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1242.202785][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1242.434313][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1242.449322][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1242.603225][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1242.631626][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1242.639780][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1242.651474][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1242.698754][T18648] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:53:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000040000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:13 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x7) 10:53:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000f00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:13 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x400000000000000) 10:53:13 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:13 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1243.036856][ T141] Bluetooth: hci4: command 0x0409 tx timeout [ 1243.054205][T18654] __nla_validate_parse: 6 callbacks suppressed [ 1243.054224][T18654] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1243.064589][T18658] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1243.103556][T18657] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1243.122754][T18657] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:53:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000050000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001200000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1243.302199][T18662] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1243.318193][T18664] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000060000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001400000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1243.574795][T18668] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1243.585543][T18669] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000070000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001600000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:14 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x8) [ 1243.829977][T18673] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1243.835927][T18672] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000080000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1243.978805][T18677] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1244.395354][T18655] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:53:15 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x500000000000000) 10:53:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000090000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001900000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:15 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:15 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x9) 10:53:15 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000004800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000a0000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1244.983141][T18688] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1245.108107][T15753] Bluetooth: hci4: command 0x041b tx timeout 10:53:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000004c00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000b0000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000006000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000c0000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1245.921621][T18689] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:53:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000e0000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000006800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:16 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x600000000000000) 10:53:16 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xa) 10:53:16 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:16 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000006c00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000f0000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1246.246095][T18716] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1246.281796][T18708] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:53:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000007400000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000120000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000007a00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000140000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:17 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x700000000000000) 10:53:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000008800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:17 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xe) [ 1247.187551][ T141] Bluetooth: hci4: command 0x040f tx timeout [ 1247.358856][T18714] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:53:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000a800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000180000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:18 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:18 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x10) 10:53:18 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000f000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000002b01000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000190000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1247.763953][T18742] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1248.674881][T18750] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1248.689018][T18750] __nla_validate_parse: 30 callbacks suppressed [ 1248.689037][T18750] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1249.731856][ T3706] device hsr_slave_0 left promiscuous mode [ 1249.738480][ T3706] device hsr_slave_1 left promiscuous mode [ 1249.745223][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1249.752832][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1249.770568][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1249.778332][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1249.786795][ T3706] device bridge_slave_1 left promiscuous mode [ 1249.793370][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1249.803156][ T3706] device bridge_slave_0 left promiscuous mode [ 1249.812596][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1249.826965][ T3706] device veth1_macvtap left promiscuous mode [ 1249.833427][ T3706] device veth0_macvtap left promiscuous mode [ 1249.839721][ T3706] device veth1_vlan left promiscuous mode [ 1249.845513][ T3706] device veth0_vlan left promiscuous mode [ 1250.022811][ T3706] team0 (unregistering): Port device team_slave_1 removed [ 1250.044483][ T3706] team0 (unregistering): Port device team_slave_0 removed [ 1250.058288][ T3706] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1250.072888][ T3706] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1250.142760][ T3706] bond0 (unregistering): Released all slaves [ 1251.690084][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1251.698962][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1251.706826][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1251.715620][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1251.723218][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1251.730567][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1251.818154][T18758] chnl_net:caif_netlink_parms(): no params data found [ 1251.865901][T18758] bridge0: port 1(bridge_slave_0) entered blocking state [ 1251.874140][T18758] bridge0: port 1(bridge_slave_0) entered disabled state [ 1251.882444][T18758] device bridge_slave_0 entered promiscuous mode [ 1251.893034][T18758] bridge0: port 2(bridge_slave_1) entered blocking state [ 1251.900471][T18758] bridge0: port 2(bridge_slave_1) entered disabled state [ 1251.909466][T18758] device bridge_slave_1 entered promiscuous mode [ 1251.932350][T18758] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1251.943459][T18758] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1251.967638][T18758] team0: Port device team_slave_0 added [ 1251.975069][T18758] team0: Port device team_slave_1 added [ 1251.995338][T18758] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1252.002637][T18758] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1252.029492][T18758] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1252.044462][T18758] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1252.051847][T18758] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1252.078851][T18758] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1252.110979][T18758] device hsr_slave_0 entered promiscuous mode [ 1252.117801][T18758] device hsr_slave_1 entered promiscuous mode [ 1252.196532][T18758] bridge0: port 2(bridge_slave_1) entered blocking state [ 1252.203650][T18758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1252.211237][T18758] bridge0: port 1(bridge_slave_0) entered blocking state [ 1252.218365][T18758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1252.270965][T18758] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1252.284130][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1252.294438][T16142] bridge0: port 1(bridge_slave_0) entered disabled state [ 1252.302529][T16142] bridge0: port 2(bridge_slave_1) entered disabled state [ 1252.311161][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1252.326187][T18758] 8021q: adding VLAN 0 to HW filter on device team0 [ 1252.339104][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1252.348227][ T141] bridge0: port 1(bridge_slave_0) entered blocking state [ 1252.355296][ T141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1252.372982][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1252.381488][T15753] bridge0: port 2(bridge_slave_1) entered blocking state [ 1252.388612][T15753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1252.411505][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1252.420049][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1252.428780][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1252.438894][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1252.450868][T18758] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1252.462581][T18758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1252.472154][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1252.491066][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1252.498792][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1252.512977][T18758] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1252.539022][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1252.561163][T18758] device veth0_vlan entered promiscuous mode [ 1252.568538][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1252.576909][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1252.585100][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1252.599616][T18758] device veth1_vlan entered promiscuous mode [ 1252.621289][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1252.633357][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1252.641741][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1252.658920][T18758] device veth0_macvtap entered promiscuous mode [ 1252.668769][T18758] device veth1_macvtap entered promiscuous mode [ 1252.684041][T18758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1252.695549][T18758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.705631][T18758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1252.716222][T18758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.726197][T18758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1252.736843][T18758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.746769][T18758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1252.757485][T18758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.770257][T18758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1252.780891][T18758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.792804][T18758] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1252.803775][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1252.813307][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1252.824577][T18758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1252.835654][T18758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.845605][T18758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1252.856215][T18758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.866105][T18758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1252.876742][T18758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.886891][T18758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1252.898963][T18758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.909018][T18758] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1252.919505][T18758] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1252.930885][T18758] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1252.939875][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1252.949128][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1253.184692][ T5772] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1253.192938][ T5772] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1253.349660][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1253.368663][ T5772] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1253.376853][ T5772] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1253.388382][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1253.435528][T18764] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:53:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000003000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:24 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x11) 10:53:24 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x800000000000000) 10:53:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000480000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:24 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:24 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1253.790378][T18769] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1253.792538][T18773] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000005000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1253.834253][T18772] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1253.846879][T15753] Bluetooth: hci4: command 0x0409 tx timeout 10:53:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000004c0000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:24 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x30) [ 1253.899503][T18772] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1253.904000][T18778] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1253.971507][T18780] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000006000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000600000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:24 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x38) [ 1254.086717][T18784] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000007000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1254.154753][T18786] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000680000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1254.268538][T18790] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1254.315546][T18792] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1254.771496][T18774] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1254.790721][T18774] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1255.745085][ T3706] device hsr_slave_0 left promiscuous mode [ 1255.751420][ T3706] device hsr_slave_1 left promiscuous mode [ 1255.758734][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1255.767934][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1255.776684][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1255.784507][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1255.794756][ T3706] device bridge_slave_1 left promiscuous mode [ 1255.801428][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1255.812875][ T3706] device bridge_slave_0 left promiscuous mode [ 1255.820659][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1255.835715][ T3706] device veth1_macvtap left promiscuous mode [ 1255.843339][ T3706] device veth0_macvtap left promiscuous mode [ 1255.849660][ T3706] device veth1_vlan left promiscuous mode [ 1255.855455][ T3706] device veth0_vlan left promiscuous mode [ 1256.044456][ T3706] team0 (unregistering): Port device team_slave_1 removed [ 1256.061100][ T3706] team0 (unregistering): Port device team_slave_0 removed [ 1256.075585][ T3706] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1256.092781][ T3706] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1256.160849][ T3706] bond0 (unregistering): Released all slaves [ 1257.928526][ T3631] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1257.936807][ T3631] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1257.945775][ T3631] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1257.953760][ T3631] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1257.961344][ T3631] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1257.970081][ T3627] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1258.058605][T18795] chnl_net:caif_netlink_parms(): no params data found [ 1258.106419][T18795] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.113589][T18795] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.122607][T18795] device bridge_slave_0 entered promiscuous mode [ 1258.131778][T18795] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.139157][T18795] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.146899][T18795] device bridge_slave_1 entered promiscuous mode [ 1258.173865][T18795] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1258.185972][T18795] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1258.213268][T18795] team0: Port device team_slave_0 added [ 1258.220748][T18795] team0: Port device team_slave_1 added [ 1258.244129][T18795] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1258.251357][T18795] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1258.277679][T18795] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1258.291829][T18795] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1258.298848][T18795] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1258.326234][T18795] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1258.354878][T18795] device hsr_slave_0 entered promiscuous mode [ 1258.361565][T18795] device hsr_slave_1 entered promiscuous mode [ 1258.439731][T18795] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.446825][T18795] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1258.454217][T18795] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.461310][T18795] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1258.511299][T18795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1258.523560][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1258.534268][T13518] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.542307][T13518] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.553590][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1258.566750][T18795] 8021q: adding VLAN 0 to HW filter on device team0 [ 1258.589228][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1258.598160][T13518] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.605217][T13518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1258.613768][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1258.622172][T13518] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.629297][T13518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1258.650116][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1258.658794][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1258.673771][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1258.682210][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1258.696567][T18795] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1258.708378][T18795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1258.716592][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1258.738737][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1258.746164][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1258.756941][T18795] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1258.775433][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1258.798343][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1258.806767][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1258.815004][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1258.825222][T18795] device veth0_vlan entered promiscuous mode [ 1258.839969][T18795] device veth1_vlan entered promiscuous mode [ 1258.861778][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1258.870590][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1258.879175][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1258.890662][T18795] device veth0_macvtap entered promiscuous mode [ 1258.903103][T18795] device veth1_macvtap entered promiscuous mode [ 1258.919332][T18795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1258.930490][T18795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1258.942093][T18795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1258.953727][T18795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1258.963688][T18795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1258.974246][T18795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1258.984302][T18795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1258.994824][T18795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1259.004940][T18795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1259.017174][T18795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1259.030949][T18795] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1259.043597][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1259.055880][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1259.066343][T18795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1259.077534][T18795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1259.087856][T18795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1259.098444][T18795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1259.108420][T18795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1259.118882][T18795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1259.128963][T18795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1259.144210][T18795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1259.154162][T18795] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1259.168106][T18795] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1259.179437][T18795] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1259.188549][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1259.198165][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1259.436428][ T5773] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1259.444634][ T5773] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1259.603585][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1259.627373][ T3706] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1259.635466][ T3706] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1259.646013][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1259.693660][T18801] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:53:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000009000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:30 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xc5) 10:53:30 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x900000000000000) 10:53:30 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:30 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000006c0000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1259.991585][T16142] Bluetooth: hci4: command 0x0409 tx timeout [ 1260.040432][T18807] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1260.051544][T18808] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000740000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000b000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1260.096030][T18810] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1260.157953][T18810] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1260.247842][T18816] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1260.281522][T18817] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000007a0000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1260.490410][T18819] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1260.534299][T18821] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000880000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000270d000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:31 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xfc) [ 1260.661755][T18824] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1260.675681][T18825] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000a80000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000e000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1260.852336][T18830] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1261.074196][T18811] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:53:31 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xe00000000000000) 10:53:31 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x103) 10:53:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000f00000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000f000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:31 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000018000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:31 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000012000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000820100000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1261.391660][T18843] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1261.421254][T18837] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:53:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000014000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000016000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:32 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xf00000000000000) [ 1262.069074][ T20] Bluetooth: hci4: command 0x041b tx timeout 10:53:32 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x300) 10:53:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000018000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000600000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1262.553330][T18840] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:53:33 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000018000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000019000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:33 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:33 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x301) 10:53:33 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000900000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000001f000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1263.019825][T18870] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:53:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000020000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1264.315123][T18873] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1264.974440][ T10] device hsr_slave_0 left promiscuous mode [ 1264.982020][ T10] device hsr_slave_1 left promiscuous mode [ 1264.988917][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1264.996347][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1265.005145][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1265.012667][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1265.025593][ T10] device bridge_slave_1 left promiscuous mode [ 1265.032068][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1265.040612][ T10] device bridge_slave_0 left promiscuous mode [ 1265.046765][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1265.063722][ T10] device veth1_macvtap left promiscuous mode [ 1265.069798][ T10] device veth0_macvtap left promiscuous mode [ 1265.075846][ T10] device veth1_vlan left promiscuous mode [ 1265.081744][ T10] device veth0_vlan left promiscuous mode [ 1265.259114][ T10] team0 (unregistering): Port device team_slave_1 removed [ 1265.277432][ T10] team0 (unregistering): Port device team_slave_0 removed [ 1265.294289][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1265.312779][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1265.377390][ T10] bond0 (unregistering): Released all slaves [ 1266.576685][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1266.585440][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1266.594707][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1266.602847][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1266.610409][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1266.622782][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1266.713405][T18882] chnl_net:caif_netlink_parms(): no params data found [ 1266.759339][T18882] bridge0: port 1(bridge_slave_0) entered blocking state [ 1266.766443][T18882] bridge0: port 1(bridge_slave_0) entered disabled state [ 1266.774423][T18882] device bridge_slave_0 entered promiscuous mode [ 1266.784114][T18882] bridge0: port 2(bridge_slave_1) entered blocking state [ 1266.791315][T18882] bridge0: port 2(bridge_slave_1) entered disabled state [ 1266.799760][T18882] device bridge_slave_1 entered promiscuous mode [ 1266.823923][T18882] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1266.834986][T18882] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1266.862602][T18882] team0: Port device team_slave_0 added [ 1266.870434][T18882] team0: Port device team_slave_1 added [ 1266.891808][T18882] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1266.902829][T18882] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1266.930641][T18882] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1266.942759][T18882] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1266.950193][T18882] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1266.976283][T18882] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1267.006349][T18882] device hsr_slave_0 entered promiscuous mode [ 1267.013085][T18882] device hsr_slave_1 entered promiscuous mode [ 1267.091518][T18882] bridge0: port 2(bridge_slave_1) entered blocking state [ 1267.098608][T18882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1267.105880][T18882] bridge0: port 1(bridge_slave_0) entered blocking state [ 1267.113000][T18882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1267.164305][T18882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1267.176684][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1267.190276][ T6917] bridge0: port 1(bridge_slave_0) entered disabled state [ 1267.202557][ T6917] bridge0: port 2(bridge_slave_1) entered disabled state [ 1267.211945][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1267.228950][T18882] 8021q: adding VLAN 0 to HW filter on device team0 [ 1267.242242][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1267.250765][ T6917] bridge0: port 1(bridge_slave_0) entered blocking state [ 1267.257885][ T6917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1267.269174][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1267.278393][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 1267.285449][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1267.311899][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1267.320581][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1267.329656][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1267.345725][T18882] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1267.356752][T18882] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1267.369865][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1267.379696][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1267.388799][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1267.407334][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1267.414748][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1267.426514][T18882] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1267.448125][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1267.469863][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1267.478512][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1267.486319][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1267.496316][T18882] device veth0_vlan entered promiscuous mode [ 1267.510906][T18882] device veth1_vlan entered promiscuous mode [ 1267.541435][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1267.549455][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1267.558864][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1267.572572][T18882] device veth0_macvtap entered promiscuous mode [ 1267.582019][T18882] device veth1_macvtap entered promiscuous mode [ 1267.600290][T18882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1267.610971][T18882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.621138][T18882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1267.635054][T18882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.645714][T18882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1267.657339][T18882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.667599][T18882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1267.678414][T18882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.692384][T18882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1267.703900][T18882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.716193][T18882] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1267.725271][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1267.735840][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1267.755849][T18882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1267.766427][T18882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.776427][T18882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1267.787315][T18882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.797552][T18882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1267.808914][T18882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.819204][T18882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1267.830079][T18882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.840161][T18882] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1267.851739][T18882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1267.864102][T18882] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1267.873301][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1267.882679][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1268.117010][ T5773] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1268.125307][ T5773] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1268.287507][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1268.310436][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1268.319590][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1268.331092][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1268.376047][T18888] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:53:39 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1100000000000000) 10:53:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000d27000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:39 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x480) 10:53:39 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:39 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000018000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000012b000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1268.715110][T18893] __nla_validate_parse: 21 callbacks suppressed [ 1268.715131][T18893] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1268.717740][ T3670] Bluetooth: hci4: command 0x0409 tx timeout [ 1268.745585][T18897] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000b00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1268.815034][T18891] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1268.830964][T18891] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1268.909689][T18902] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1268.932228][T18904] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000c00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000040000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1269.066005][T18908] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1269.075786][T18906] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000048000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000e00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1269.260887][T18911] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1269.279674][T18912] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1269.732546][T18896] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1269.757544][T18896] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1270.665091][ T3706] device hsr_slave_0 left promiscuous mode [ 1270.672014][ T3706] device hsr_slave_1 left promiscuous mode [ 1270.680029][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1270.687762][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1270.696304][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1270.704071][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1270.714120][ T3706] device bridge_slave_1 left promiscuous mode [ 1270.721334][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.729778][ T3706] device bridge_slave_0 left promiscuous mode [ 1270.735921][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.754086][ T3706] device veth1_macvtap left promiscuous mode [ 1270.761539][ T3706] device veth0_macvtap left promiscuous mode [ 1270.767843][ T3706] device veth1_vlan left promiscuous mode [ 1270.773666][ T3706] device veth0_vlan left promiscuous mode [ 1270.953964][ T3706] team0 (unregistering): Port device team_slave_1 removed [ 1270.967232][ T3706] team0 (unregistering): Port device team_slave_0 removed [ 1270.982916][ T3706] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1271.002732][ T3706] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1271.066409][ T3706] bond0 (unregistering): Released all slaves [ 1272.885452][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1272.894350][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1272.902282][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1272.910748][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1272.918989][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1272.926353][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1273.018319][T18915] chnl_net:caif_netlink_parms(): no params data found [ 1273.061051][T18915] bridge0: port 1(bridge_slave_0) entered blocking state [ 1273.068264][T18915] bridge0: port 1(bridge_slave_0) entered disabled state [ 1273.076533][T18915] device bridge_slave_0 entered promiscuous mode [ 1273.084964][T18915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1273.092549][T18915] bridge0: port 2(bridge_slave_1) entered disabled state [ 1273.100625][T18915] device bridge_slave_1 entered promiscuous mode [ 1273.123492][T18915] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1273.136133][T18915] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1273.163004][T18915] team0: Port device team_slave_0 added [ 1273.170996][T18915] team0: Port device team_slave_1 added [ 1273.195473][T18915] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1273.202512][T18915] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1273.229142][T18915] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1273.242350][T18915] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1273.249710][T18915] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1273.276939][T18915] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1273.306350][T18915] device hsr_slave_0 entered promiscuous mode [ 1273.313051][T18915] device hsr_slave_1 entered promiscuous mode [ 1273.392028][T18915] bridge0: port 2(bridge_slave_1) entered blocking state [ 1273.399334][T18915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1273.406611][T18915] bridge0: port 1(bridge_slave_0) entered blocking state [ 1273.413692][T18915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1273.466718][T18915] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1273.480952][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1273.490513][ T141] bridge0: port 1(bridge_slave_0) entered disabled state [ 1273.498382][ T141] bridge0: port 2(bridge_slave_1) entered disabled state [ 1273.506431][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1273.520790][T18915] 8021q: adding VLAN 0 to HW filter on device team0 [ 1273.532613][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1273.541888][ T3670] bridge0: port 1(bridge_slave_0) entered blocking state [ 1273.548992][ T3670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1273.571710][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1273.580428][ T3671] bridge0: port 2(bridge_slave_1) entered blocking state [ 1273.587564][ T3671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1273.610168][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1273.619659][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1273.628790][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1273.643138][T18915] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1273.654414][T18915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1273.666053][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1273.673909][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1273.697524][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1273.704941][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1273.716846][T18915] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1273.735688][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1273.756637][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1273.765451][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1273.773601][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1273.783883][T18915] device veth0_vlan entered promiscuous mode [ 1273.799035][T18915] device veth1_vlan entered promiscuous mode [ 1273.822806][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1273.831448][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1273.840259][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1273.851008][T18915] device veth0_macvtap entered promiscuous mode [ 1273.862449][T18915] device veth1_macvtap entered promiscuous mode [ 1273.878286][T18915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1273.889947][T18915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1273.900424][T18915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1273.914136][T18915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1273.924225][T18915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1273.935291][T18915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1273.945290][T18915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1273.955879][T18915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1273.966302][T18915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1273.977196][T18915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1273.989999][T18915] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1273.999853][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1274.010003][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1274.022254][T18915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1274.033079][T18915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1274.043544][T18915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1274.054177][T18915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1274.065267][T18915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1274.076006][T18915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1274.086412][T18915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1274.097560][T18915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1274.108097][T18915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1274.118679][T18915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1274.130289][T18915] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1274.140720][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1274.149586][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1274.384768][ T5773] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1274.414460][ T5773] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1274.553113][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1274.574843][ T5773] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1274.586013][ T5773] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1274.596060][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1274.645680][T18921] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:53:45 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1200000000000000) 10:53:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000004c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000f00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:45 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x500) 10:53:45 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:45 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1274.957804][ T6917] Bluetooth: hci4: command 0x0409 tx timeout [ 1275.006164][T18931] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1275.009537][T18930] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000006c1100000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1275.050902][T18928] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1275.057306][T18933] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1275.087188][T18928] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:53:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000060000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1275.192421][T18935] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1275.248140][T18937] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001200000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000068000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1275.389651][T18939] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:45 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1400000000000000) [ 1275.446288][T18941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001400000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000006c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:46 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x5ac) [ 1275.646737][T18945] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1275.658933][T18947] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001600000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000074000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1275.833097][T18951] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1276.221473][T18929] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:53:47 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000007a000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:47 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:47 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x600) 10:53:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001900000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1276.713262][T18960] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1277.816561][T18963] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1278.560247][ T3706] device hsr_slave_0 left promiscuous mode [ 1278.566557][ T3706] device hsr_slave_1 left promiscuous mode [ 1278.573374][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1278.580956][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1278.594789][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1278.603964][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1278.613358][ T3706] device bridge_slave_1 left promiscuous mode [ 1278.620170][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.629029][ T3706] device bridge_slave_0 left promiscuous mode [ 1278.635167][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.648757][ T3706] device veth1_macvtap left promiscuous mode [ 1278.654822][ T3706] device veth0_macvtap left promiscuous mode [ 1278.661179][ T3706] device veth1_vlan left promiscuous mode [ 1278.667277][ T3706] device veth0_vlan left promiscuous mode [ 1278.846343][ T3706] team0 (unregistering): Port device team_slave_1 removed [ 1278.866951][ T3706] team0 (unregistering): Port device team_slave_0 removed [ 1278.880560][ T3706] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1278.894552][ T3706] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1278.966415][ T3706] bond0 (unregistering): Released all slaves [ 1280.156390][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1280.165197][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1280.173247][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1280.181883][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1280.190531][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1280.197879][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1280.286826][T18970] chnl_net:caif_netlink_parms(): no params data found [ 1280.331180][T18970] bridge0: port 1(bridge_slave_0) entered blocking state [ 1280.338407][T18970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1280.348268][T18970] device bridge_slave_0 entered promiscuous mode [ 1280.356275][T18970] bridge0: port 2(bridge_slave_1) entered blocking state [ 1280.363447][T18970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1280.371738][T18970] device bridge_slave_1 entered promiscuous mode [ 1280.395192][T18970] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1280.406325][T18970] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1280.433726][T18970] team0: Port device team_slave_0 added [ 1280.443436][T18970] team0: Port device team_slave_1 added [ 1280.463382][T18970] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1280.470403][T18970] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1280.497263][T18970] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1280.510478][T18970] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1280.517719][T18970] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1280.545684][T18970] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1280.578816][T18970] device hsr_slave_0 entered promiscuous mode [ 1280.585475][T18970] device hsr_slave_1 entered promiscuous mode [ 1280.704882][T18970] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1280.718967][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1280.726660][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1280.738468][T18970] 8021q: adding VLAN 0 to HW filter on device team0 [ 1280.747929][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1280.756992][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1280.765650][ T141] bridge0: port 1(bridge_slave_0) entered blocking state [ 1280.772727][ T141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1280.782146][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1280.797882][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1280.806446][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1280.814968][ T3671] bridge0: port 2(bridge_slave_1) entered blocking state [ 1280.822038][ T3671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1280.830314][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1280.838947][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1280.859249][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1280.868843][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1280.877603][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1280.886116][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1280.895169][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1280.903587][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1280.918494][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1280.927548][T18970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1280.946688][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1280.954793][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1280.968480][T18970] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1280.985720][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1281.008679][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1281.017695][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1281.025437][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1281.036886][T18970] device veth0_vlan entered promiscuous mode [ 1281.050618][T18970] device veth1_vlan entered promiscuous mode [ 1281.072604][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1281.080612][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1281.089438][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1281.100678][T18970] device veth0_macvtap entered promiscuous mode [ 1281.111691][T18970] device veth1_macvtap entered promiscuous mode [ 1281.129650][T18970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1281.143138][T18970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.153284][T18970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1281.165772][T18970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.175889][T18970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1281.187857][T18970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.197994][T18970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1281.209227][T18970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.219337][T18970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1281.230215][T18970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.242300][T18970] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1281.252207][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1281.264129][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1281.273991][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1281.285710][T18970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1281.296800][T18970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.307566][T18970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1281.318242][T18970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.328364][T18970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1281.339528][T18970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.350070][T18970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1281.360853][T18970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.372493][T18970] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1281.383570][T18970] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1281.395139][T18970] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1281.405093][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1281.413838][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1281.648884][ T5169] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1281.661443][ T5169] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1281.812231][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1281.833372][ T5169] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1281.842239][ T5169] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1281.853614][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1281.903407][T18976] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:53:52 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1500000000000000) 10:53:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000088000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001f00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:52 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x700) 10:53:52 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:52 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1282.258365][ T3670] Bluetooth: hci4: command 0x0409 tx timeout [ 1282.269252][T18987] __nla_validate_parse: 7 callbacks suppressed [ 1282.269271][T18987] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1282.290716][T18986] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000002000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1282.322152][T18984] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1282.350295][T18988] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1282.364264][T18984] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:53:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000a8000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1282.419914][T18990] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000004000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1282.558592][T18992] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000f0000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1282.693598][T18994] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:53 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1600000000000000) 10:53:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000004800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1282.800653][T18996] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:53:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000c20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:53 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x900) [ 1282.970464][T19000] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:53:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000004c00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000033a1120000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1283.168914][T19009] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1283.708844][T18985] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1283.731644][T18985] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:53:54 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000006000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000002520000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:53:54 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xa00) 10:53:54 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:53:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000152620000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1284.104617][T19011] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1284.311310][ T6917] Bluetooth: hci4: command 0x041b tx timeout [ 1285.125847][T19019] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1285.878216][ T5773] device hsr_slave_0 left promiscuous mode [ 1285.884774][ T5773] device hsr_slave_1 left promiscuous mode [ 1285.891539][ T5773] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1285.899178][ T5773] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1285.908991][ T5773] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1285.916415][ T5773] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1285.925295][ T5773] device bridge_slave_1 left promiscuous mode [ 1285.935743][ T5773] bridge0: port 2(bridge_slave_1) entered disabled state [ 1285.944210][ T5773] device bridge_slave_0 left promiscuous mode [ 1285.950655][ T5773] bridge0: port 1(bridge_slave_0) entered disabled state [ 1285.964010][ T5773] device veth1_macvtap left promiscuous mode [ 1285.970923][ T5773] device veth0_macvtap left promiscuous mode [ 1285.978120][ T5773] device veth1_vlan left promiscuous mode [ 1285.983905][ T5773] device veth0_vlan left promiscuous mode [ 1286.165307][ T5773] team0 (unregistering): Port device team_slave_1 removed [ 1286.180740][ T5773] team0 (unregistering): Port device team_slave_0 removed [ 1286.194398][ T5773] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1286.208945][ T5773] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1286.282287][ T5773] bond0 (unregistering): Released all slaves [ 1289.667297][ T3638] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1294.307289][ T3638] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1298.947199][ T3638] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1299.829649][ T1225] ieee802154 phy0 wpan0: encryption failed: -22 [ 1299.835953][ T1225] ieee802154 phy1 wpan1: encryption failed: -22 [ 1301.531790][ T3627] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1301.541156][ T3627] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1301.549482][ T3627] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1301.558197][ T3627] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1301.565668][ T3627] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1301.573185][ T3627] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1301.660899][T19028] chnl_net:caif_netlink_parms(): no params data found [ 1301.705529][T19028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1301.712818][T19028] bridge0: port 1(bridge_slave_0) entered disabled state [ 1301.721001][T19028] device bridge_slave_0 entered promiscuous mode [ 1301.729984][T19028] bridge0: port 2(bridge_slave_1) entered blocking state [ 1301.737383][T19028] bridge0: port 2(bridge_slave_1) entered disabled state [ 1301.746445][T19028] device bridge_slave_1 entered promiscuous mode [ 1301.772414][T19028] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1301.783919][T19028] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1301.811597][T19028] team0: Port device team_slave_0 added [ 1301.818973][T19028] team0: Port device team_slave_1 added [ 1301.839677][T19028] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1301.846925][T19028] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1301.873202][T19028] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1301.885501][T19028] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1301.892581][T19028] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1301.920561][T19028] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1301.950692][T19028] device hsr_slave_0 entered promiscuous mode [ 1301.957638][T19028] device hsr_slave_1 entered promiscuous mode [ 1302.031499][T19028] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.038577][T19028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1302.045848][T19028] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.052927][T19028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1302.106358][T19028] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1302.120709][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1302.128735][ T6917] bridge0: port 1(bridge_slave_0) entered disabled state [ 1302.136227][ T6917] bridge0: port 2(bridge_slave_1) entered disabled state [ 1302.146118][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1302.162039][T19028] 8021q: adding VLAN 0 to HW filter on device team0 [ 1302.172683][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1302.185014][ T6917] bridge0: port 1(bridge_slave_0) entered blocking state [ 1302.192106][ T6917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1302.205127][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1302.213629][T13518] bridge0: port 2(bridge_slave_1) entered blocking state [ 1302.220719][T13518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1302.242299][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1302.255939][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1302.267880][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1302.283003][T19028] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1302.294673][T19028] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1302.306439][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1302.314870][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1302.323368][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1302.342936][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1302.350498][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1302.365085][T19028] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1302.382367][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1302.409058][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1302.421068][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1302.429077][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1302.445496][T19028] device veth0_vlan entered promiscuous mode [ 1302.456090][T19028] device veth1_vlan entered promiscuous mode [ 1302.483225][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1302.491559][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1302.499979][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1302.511071][T19028] device veth0_macvtap entered promiscuous mode [ 1302.522142][T19028] device veth1_macvtap entered promiscuous mode [ 1302.538111][T19028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1302.550925][T19028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.562564][T19028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1302.573332][T19028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.584353][T19028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1302.595331][T19028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.605352][T19028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1302.616176][T19028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.626243][T19028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1302.636994][T19028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.648933][T19028] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1302.658005][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1302.673704][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1302.685510][T19028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1302.696834][T19028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.707805][T19028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1302.718560][T19028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.728398][T19028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1302.739066][T19028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.749098][T19028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1302.759835][T19028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.771579][T19028] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1302.785640][T19028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1302.798492][T19028] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1302.806972][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1302.816471][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1303.056066][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1303.071151][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1303.226616][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1303.247564][ T5169] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1303.255639][ T5169] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1303.265267][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1303.311355][T19035] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:54:14 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1700000000000000) 10:54:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000006800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000004020000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:14 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xbb8) 10:54:14 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:14 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1303.597692][ T141] Bluetooth: hci4: command 0x0409 tx timeout [ 1303.659223][T19044] __nla_validate_parse: 3 callbacks suppressed [ 1303.659244][T19044] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000006c00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000006720000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:14 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xe00) [ 1303.700758][T19042] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1303.738556][T19042] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1303.781735][T19049] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000000e920000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:14 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000116c00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1304.027922][T19056] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000002000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1304.216557][T19059] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1304.734304][T19043] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1304.747201][T19043] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1305.714583][ T3706] device hsr_slave_0 left promiscuous mode [ 1305.721010][ T3706] device hsr_slave_1 left promiscuous mode [ 1305.727530][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1305.735604][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1305.744361][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1305.752679][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1305.761379][ T3706] device bridge_slave_1 left promiscuous mode [ 1305.767672][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1305.775898][ T3706] device bridge_slave_0 left promiscuous mode [ 1305.782498][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1305.798581][ T3706] device veth1_macvtap left promiscuous mode [ 1305.804599][ T3706] device veth0_macvtap left promiscuous mode [ 1305.814907][ T3706] device veth1_vlan left promiscuous mode [ 1305.821036][ T3706] device veth0_vlan left promiscuous mode [ 1306.005298][ T3706] team0 (unregistering): Port device team_slave_1 removed [ 1306.019050][ T3706] team0 (unregistering): Port device team_slave_0 removed [ 1306.032283][ T3706] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1306.052063][ T3706] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1306.121656][ T3706] bond0 (unregistering): Released all slaves [ 1307.919769][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1307.928343][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1307.936034][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1307.944004][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1307.951985][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1307.959469][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1308.044318][T19064] chnl_net:caif_netlink_parms(): no params data found [ 1308.090326][T19064] bridge0: port 1(bridge_slave_0) entered blocking state [ 1308.100215][T19064] bridge0: port 1(bridge_slave_0) entered disabled state [ 1308.108596][T19064] device bridge_slave_0 entered promiscuous mode [ 1308.116411][T19064] bridge0: port 2(bridge_slave_1) entered blocking state [ 1308.123968][T19064] bridge0: port 2(bridge_slave_1) entered disabled state [ 1308.131905][T19064] device bridge_slave_1 entered promiscuous mode [ 1308.159467][T19064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1308.171472][T19064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1308.199507][T19064] team0: Port device team_slave_0 added [ 1308.206769][T19064] team0: Port device team_slave_1 added [ 1308.229609][T19064] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1308.236543][T19064] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1308.262652][T19064] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1308.275255][T19064] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1308.282545][T19064] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1308.309444][T19064] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1308.346051][T19064] device hsr_slave_0 entered promiscuous mode [ 1308.353582][T19064] device hsr_slave_1 entered promiscuous mode [ 1308.435174][T19064] bridge0: port 2(bridge_slave_1) entered blocking state [ 1308.442275][T19064] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1308.449849][T19064] bridge0: port 1(bridge_slave_0) entered blocking state [ 1308.456963][T19064] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1308.509683][T19064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1308.522218][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1308.534614][ T3671] bridge0: port 1(bridge_slave_0) entered disabled state [ 1308.542662][ T3671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1308.552503][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1308.565715][T19064] 8021q: adding VLAN 0 to HW filter on device team0 [ 1308.578103][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1308.586556][ T3671] bridge0: port 1(bridge_slave_0) entered blocking state [ 1308.593706][ T3671] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1308.607647][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1308.616014][T13518] bridge0: port 2(bridge_slave_1) entered blocking state [ 1308.623096][T13518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1308.650568][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1308.659186][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1308.668021][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1308.676359][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1308.690831][T19064] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1308.701995][T19064] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1308.710802][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1308.731916][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1308.741454][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1308.755629][T19064] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1308.773608][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1308.796863][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1308.806007][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1308.814369][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1308.823894][T19064] device veth0_vlan entered promiscuous mode [ 1308.838722][T19064] device veth1_vlan entered promiscuous mode [ 1308.856896][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1308.865251][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1308.873860][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1308.886488][T19064] device veth0_macvtap entered promiscuous mode [ 1308.896326][T19064] device veth1_macvtap entered promiscuous mode [ 1308.916582][T19064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1308.927737][T19064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.938013][T19064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1308.948492][T19064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.958345][T19064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1308.968949][T19064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1308.983158][T19064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1308.993846][T19064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1309.003900][T19064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1309.016566][T19064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1309.029607][T19064] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1309.040056][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1309.049574][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1309.061125][T19064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1309.072062][T19064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1309.083042][T19064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1309.094223][T19064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1309.108773][T19064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1309.121102][T19064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1309.131347][T19064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1309.142042][T19064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1309.152115][T19064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1309.162910][T19064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1309.174053][T19064] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1309.182936][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1309.191871][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1309.453042][ T5773] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1309.484886][ T5773] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1309.612266][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1309.633960][ T5773] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1309.642730][ T5773] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1309.653506][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1309.700640][T19071] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:54:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000003000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000007400000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:20 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x1100) 10:54:20 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1800000000000000) 10:54:20 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:20 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1309.987212][T13518] Bluetooth: hci4: command 0x0409 tx timeout [ 1310.060077][T19079] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1310.069719][T19081] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000007a00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1310.116727][T19077] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1310.140782][T19077] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1310.153309][T19083] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:54:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000004000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1310.264373][T19085] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1310.306315][T19087] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:54:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000005000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000018200000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1310.515555][T19090] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1310.520349][T19091] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:54:21 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1900000000000000) 10:54:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000006000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000008800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:21 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x1f00) [ 1310.741537][T19095] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1310.801392][T19099] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:54:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000007000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000a800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1310.963908][T19101] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1311.354767][T19078] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:54:22 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000f000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000008000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:22 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x2000) 10:54:22 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000009000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1311.719831][T19109] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1312.067719][ T141] Bluetooth: hci4: command 0x041b tx timeout [ 1312.633537][T19114] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1313.637719][ T5773] device hsr_slave_0 left promiscuous mode [ 1313.644028][ T5773] device hsr_slave_1 left promiscuous mode [ 1313.650679][ T5773] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1313.658195][ T5773] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1313.666703][ T5773] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1313.674707][ T5773] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1313.683401][ T5773] device bridge_slave_1 left promiscuous mode [ 1313.689693][ T5773] bridge0: port 2(bridge_slave_1) entered disabled state [ 1313.700506][ T5773] device bridge_slave_0 left promiscuous mode [ 1313.706647][ T5773] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.720861][ T5773] device veth1_macvtap left promiscuous mode [ 1313.727953][ T5773] device veth0_macvtap left promiscuous mode [ 1313.734015][ T5773] device veth1_vlan left promiscuous mode [ 1313.740739][ T5773] device veth0_vlan left promiscuous mode [ 1313.931328][ T5773] team0 (unregistering): Port device team_slave_1 removed [ 1313.943826][ T5773] team0 (unregistering): Port device team_slave_0 removed [ 1313.957987][ T5773] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1313.972837][ T5773] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1314.042315][ T5773] bond0 (unregistering): Released all slaves [ 1317.748976][ T3627] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1322.467221][ T3627] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1325.121677][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1325.131995][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1325.139767][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1325.147802][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1325.155207][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1325.162435][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1325.254788][T19124] chnl_net:caif_netlink_parms(): no params data found [ 1325.302255][T19124] bridge0: port 1(bridge_slave_0) entered blocking state [ 1325.309584][T19124] bridge0: port 1(bridge_slave_0) entered disabled state [ 1325.317855][T19124] device bridge_slave_0 entered promiscuous mode [ 1325.325659][T19124] bridge0: port 2(bridge_slave_1) entered blocking state [ 1325.332851][T19124] bridge0: port 2(bridge_slave_1) entered disabled state [ 1325.340944][T19124] device bridge_slave_1 entered promiscuous mode [ 1325.366811][T19124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1325.379572][T19124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1325.407959][T19124] team0: Port device team_slave_0 added [ 1325.415383][T19124] team0: Port device team_slave_1 added [ 1325.435481][T19124] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1325.445441][T19124] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1325.471422][T19124] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1325.485043][T19124] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1325.492632][T19124] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1325.519329][T19124] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1325.547728][T19124] device hsr_slave_0 entered promiscuous mode [ 1325.554419][T19124] device hsr_slave_1 entered promiscuous mode [ 1325.632588][T19124] bridge0: port 2(bridge_slave_1) entered blocking state [ 1325.639704][T19124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1325.646993][T19124] bridge0: port 1(bridge_slave_0) entered blocking state [ 1325.654114][T19124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1325.704683][T19124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1325.717913][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1325.726993][ T3671] bridge0: port 1(bridge_slave_0) entered disabled state [ 1325.735026][ T3671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1325.743250][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1325.760026][T19124] 8021q: adding VLAN 0 to HW filter on device team0 [ 1325.772695][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1325.781175][ T3671] bridge0: port 1(bridge_slave_0) entered blocking state [ 1325.788322][ T3671] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1325.808571][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1325.817456][ T3671] bridge0: port 2(bridge_slave_1) entered blocking state [ 1325.824537][ T3671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1325.848928][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1325.857959][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1325.866338][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1325.874897][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1325.886683][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1325.902181][T19124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1325.929579][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1325.936963][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1325.952300][T19124] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1325.969688][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1325.993503][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1326.001888][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1326.011558][T13518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1326.023680][T19124] device veth0_vlan entered promiscuous mode [ 1326.036250][T19124] device veth1_vlan entered promiscuous mode [ 1326.059095][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1326.068085][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1326.076179][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1326.090860][T19124] device veth0_macvtap entered promiscuous mode [ 1326.101325][T19124] device veth1_macvtap entered promiscuous mode [ 1326.118464][T19124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1326.129561][T19124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.139684][T19124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1326.151169][T19124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.161108][T19124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1326.171650][T19124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.183021][T19124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1326.197613][T19124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.207486][T19124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1326.218439][T19124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.230709][T19124] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1326.241549][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1326.251666][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1326.261626][T19124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1326.272325][T19124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.282563][T19124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1326.293128][T19124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.302983][T19124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1326.313794][T19124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.325240][T19124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1326.337160][T19124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.346978][T19124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1326.359458][T19124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1326.371239][T19124] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1326.381355][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1326.390491][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1326.629996][ T3706] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1326.644567][ T3706] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1326.799919][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1326.821842][ T5772] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1326.830988][ T5772] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1326.840828][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1326.882990][T19130] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:54:37 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1a00000000000000) 10:54:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000ffffe0000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000b000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:37 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x3000) 10:54:37 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:37 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1327.187248][ T141] Bluetooth: hci4: command 0x0409 tx timeout [ 1327.232739][T19135] __nla_validate_parse: 7 callbacks suppressed [ 1327.232758][T19135] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1327.241217][T19138] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:54:37 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000fffff0000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1327.306240][T19139] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1327.345937][T19139] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:54:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1327.354464][T19142] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1327.418649][T19144] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1327.512392][T19146] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:54:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000010a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000e000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000020a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:38 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1b00000000000000) [ 1327.772381][T19150] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:54:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000f000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:38 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x3800) 10:54:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000030a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1327.907427][T19154] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:54:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000012000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1328.076430][T19162] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1328.445444][T19140] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1328.466586][T19140] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:54:39 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000040a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000014000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:39 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x3f00) 10:54:39 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1328.718024][T19156] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1328.781367][T19166] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1328.789407][T19169] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:54:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000050a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000016000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:39 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1c00000000000000) 10:54:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000060a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000018000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000070a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1329.267757][ T3698] Bluetooth: hci4: command 0x041b tx timeout 10:54:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000019000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1329.739950][T19172] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:54:40 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000080a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:40 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x4000) 10:54:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000048000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:40 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x0, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1329.970122][T19180] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:54:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000004c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:40 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x0, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1330.155175][T19196] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:54:40 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1d00000000000000) 10:54:40 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000090a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000060000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:40 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x0, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000068000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:41 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000a0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000006c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:41 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x8004) 10:54:41 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1331.074288][T19209] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:54:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000b0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000074000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1331.185509][T19221] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:54:41 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1e00000000000000) 10:54:41 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x80fe) 10:54:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000c0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000007a000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1331.359795][ T3698] Bluetooth: hci4: command 0x040f tx timeout 10:54:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000e0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1332.100354][T19222] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:54:42 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000088000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:42 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xac05) 10:54:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000f0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:42 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1332.390370][T19242] __nla_validate_parse: 15 callbacks suppressed [ 1332.390473][T19242] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1332.405345][T19244] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:54:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000120a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:43 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xb80b) [ 1332.449238][T19244] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1333.448464][T19246] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1333.456738][T19246] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1334.283626][ T5772] device hsr_slave_0 left promiscuous mode [ 1334.290271][ T5772] device hsr_slave_1 left promiscuous mode [ 1334.296583][ T5772] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1334.304163][ T5772] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1334.316707][ T5772] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1334.324561][ T5772] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1334.333207][ T5772] device bridge_slave_1 left promiscuous mode [ 1334.342228][ T5772] bridge0: port 2(bridge_slave_1) entered disabled state [ 1334.350646][ T5772] device bridge_slave_0 left promiscuous mode [ 1334.356791][ T5772] bridge0: port 1(bridge_slave_0) entered disabled state [ 1334.372770][ T5772] device veth1_macvtap left promiscuous mode [ 1334.379011][ T5772] device veth0_macvtap left promiscuous mode [ 1334.385075][ T5772] device veth1_vlan left promiscuous mode [ 1334.391473][ T5772] device veth0_vlan left promiscuous mode [ 1334.577529][ T5772] team0 (unregistering): Port device team_slave_1 removed [ 1334.592969][ T5772] team0 (unregistering): Port device team_slave_0 removed [ 1334.605539][ T5772] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1334.620947][ T5772] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1334.690353][ T5772] bond0 (unregistering): Released all slaves [ 1335.842978][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1335.853067][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1335.862282][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1335.870814][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1335.878470][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1335.885684][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1336.019398][T19254] chnl_net:caif_netlink_parms(): no params data found [ 1336.064661][T19254] bridge0: port 1(bridge_slave_0) entered blocking state [ 1336.072259][T19254] bridge0: port 1(bridge_slave_0) entered disabled state [ 1336.080539][T19254] device bridge_slave_0 entered promiscuous mode [ 1336.089455][T19254] bridge0: port 2(bridge_slave_1) entered blocking state [ 1336.096575][T19254] bridge0: port 2(bridge_slave_1) entered disabled state [ 1336.104547][T19254] device bridge_slave_1 entered promiscuous mode [ 1336.127664][T19254] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1336.139439][T19254] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1336.166867][T19254] team0: Port device team_slave_0 added [ 1336.174545][T19254] team0: Port device team_slave_1 added [ 1336.194769][T19254] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1336.201895][T19254] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1336.228181][T19254] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1336.240769][T19254] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1336.248044][T19254] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1336.274856][T19254] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1336.304530][T19254] device hsr_slave_0 entered promiscuous mode [ 1336.314050][T19254] device hsr_slave_1 entered promiscuous mode [ 1336.393092][T19254] bridge0: port 2(bridge_slave_1) entered blocking state [ 1336.400239][T19254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1336.407656][T19254] bridge0: port 1(bridge_slave_0) entered blocking state [ 1336.414728][T19254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1336.469182][T19254] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1336.484712][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1336.493584][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 1336.502856][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 1336.510941][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1336.525665][T19254] 8021q: adding VLAN 0 to HW filter on device team0 [ 1336.538638][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1336.546986][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 1336.554087][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1336.567865][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1336.576266][ T3670] bridge0: port 2(bridge_slave_1) entered blocking state [ 1336.583346][ T3670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1336.605268][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1336.615088][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1336.634502][T19254] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1336.647984][T19254] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1336.661911][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1336.670943][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1336.680382][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1336.689765][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1336.709503][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1336.716918][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1336.731349][T19254] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1336.746810][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1336.767576][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1336.775991][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1336.784106][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1336.795916][T19254] device veth0_vlan entered promiscuous mode [ 1336.811023][T19254] device veth1_vlan entered promiscuous mode [ 1336.831607][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1336.839877][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1336.849341][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1336.860729][T19254] device veth0_macvtap entered promiscuous mode [ 1336.874077][T19254] device veth1_macvtap entered promiscuous mode [ 1336.889102][T19254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.900642][T19254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.910891][T19254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.921575][T19254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.935711][T19254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.947880][T19254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.958368][T19254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.970302][T19254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1336.980264][T19254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1336.994051][T19254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.006175][T19254] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1337.015904][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1337.025683][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1337.038786][T19254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.049395][T19254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.059370][T19254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.071327][T19254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.082719][T19254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.093887][T19254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.103808][T19254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.116381][T19254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.128019][T19254] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1337.138710][T19254] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1337.151013][T19254] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1337.159810][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1337.168685][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1337.413359][ T5169] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1337.423131][ T5169] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1337.596907][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1337.618104][ T5169] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1337.626250][ T5169] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1337.638253][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1337.685398][T19260] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1337.908097][ T141] Bluetooth: hci4: command 0x0409 tx timeout 10:54:48 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x1f00000000000000) 10:54:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000140a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000a8000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:48 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xc0fe) 10:54:48 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:48 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1338.036578][T19270] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1338.063516][T19264] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:54:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000160a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:48 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xc500) 10:54:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000f0000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1338.097401][T19264] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:54:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000180a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1338.204034][T19277] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:54:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000002b010a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:48 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000190a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1339.003575][T19268] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1339.018965][T19268] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:54:49 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x2000000000000000) 10:54:49 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xfc00) 10:54:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000030a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000001f0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:49 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:49 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000050a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:49 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xfe80) [ 1339.344232][T19290] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:54:49 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000200a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1339.385623][T19290] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:54:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000060a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:50 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xfec0) 10:54:50 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000400a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1339.987517][ T3670] Bluetooth: hci4: command 0x041b tx timeout [ 1340.267242][T19294] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1340.275644][T19294] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1341.195899][T19309] device hsr_slave_0 left promiscuous mode [ 1341.212898][T19309] device hsr_slave_1 left promiscuous mode [ 1341.232736][T19309] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1341.240570][T19309] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1341.250916][T19309] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1341.258694][T19309] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1341.267505][T19309] device bridge_slave_1 left promiscuous mode [ 1341.274549][T19309] bridge0: port 2(bridge_slave_1) entered disabled state [ 1341.282989][T19309] device bridge_slave_0 left promiscuous mode [ 1341.293031][T19309] bridge0: port 1(bridge_slave_0) entered disabled state [ 1341.305916][T19309] device veth1_macvtap left promiscuous mode [ 1341.312834][T19309] device veth0_macvtap left promiscuous mode [ 1341.319195][T19309] device veth1_vlan left promiscuous mode [ 1341.324967][T19309] device veth0_vlan left promiscuous mode [ 1341.513063][T19309] team0 (unregistering): Port device team_slave_1 removed [ 1341.528818][T19309] team0 (unregistering): Port device team_slave_0 removed [ 1341.541480][T19309] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1341.556302][T19309] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1341.632389][T19309] bond0 (unregistering): Released all slaves [ 1343.439663][ T3627] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1343.450167][ T3627] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1343.458256][ T3627] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1343.466237][ T3627] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1343.474079][ T3627] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1343.481396][ T3627] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1343.570489][T19312] chnl_net:caif_netlink_parms(): no params data found [ 1343.614390][T19312] bridge0: port 1(bridge_slave_0) entered blocking state [ 1343.624410][T19312] bridge0: port 1(bridge_slave_0) entered disabled state [ 1343.633024][T19312] device bridge_slave_0 entered promiscuous mode [ 1343.641594][T19312] bridge0: port 2(bridge_slave_1) entered blocking state [ 1343.648891][T19312] bridge0: port 2(bridge_slave_1) entered disabled state [ 1343.656777][T19312] device bridge_slave_1 entered promiscuous mode [ 1343.686694][T19312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1343.700157][T19312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1343.731716][T19312] team0: Port device team_slave_0 added [ 1343.740019][T19312] team0: Port device team_slave_1 added [ 1343.758998][T19312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1343.765953][T19312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1343.793485][T19312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1343.806279][T19312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1343.813442][T19312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1343.841799][T19312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1343.870586][T19312] device hsr_slave_0 entered promiscuous mode [ 1343.877479][T19312] device hsr_slave_1 entered promiscuous mode [ 1343.957626][T19312] bridge0: port 2(bridge_slave_1) entered blocking state [ 1343.964713][T19312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1343.972027][T19312] bridge0: port 1(bridge_slave_0) entered blocking state [ 1343.979173][T19312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1344.030512][T19312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1344.044535][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1344.054558][ T3671] bridge0: port 1(bridge_slave_0) entered disabled state [ 1344.063701][ T3671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1344.072648][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1344.085326][T19312] 8021q: adding VLAN 0 to HW filter on device team0 [ 1344.097162][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1344.105508][ T3671] bridge0: port 1(bridge_slave_0) entered blocking state [ 1344.112624][ T3671] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1344.131993][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1344.140959][ T141] bridge0: port 2(bridge_slave_1) entered blocking state [ 1344.148075][ T141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1344.169258][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1344.178705][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1344.193875][T19312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1344.205511][T19312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1344.217557][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1344.225597][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1344.234987][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1344.246236][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1344.266440][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1344.273927][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1344.289297][T19312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1344.305292][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1344.327998][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1344.336426][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1344.346367][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1344.356736][T19312] device veth0_vlan entered promiscuous mode [ 1344.370836][T19312] device veth1_vlan entered promiscuous mode [ 1344.393394][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1344.402424][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1344.411309][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1344.422574][T19312] device veth0_macvtap entered promiscuous mode [ 1344.434118][T19312] device veth1_macvtap entered promiscuous mode [ 1344.452193][T19312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.463045][T19312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.473274][T19312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.485972][T19312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.496073][T19312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.506924][T19312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.517868][T19312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.528482][T19312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.538564][T19312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1344.550311][T19312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.563877][T19312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1344.573471][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1344.587139][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1344.598023][T19312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1344.608770][T19312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.619272][T19312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1344.631106][T19312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.641245][T19312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1344.653495][T19312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.663562][T19312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1344.674148][T19312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.684244][T19312] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1344.694981][T19312] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1344.707533][T19312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1344.716446][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1344.725435][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1344.963742][T19309] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1344.976295][T19309] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1345.145829][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1345.167361][ T5772] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1345.175436][ T5772] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1345.185397][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1345.231193][T19319] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:54:56 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x2100000000000000) 10:54:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000070a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000480a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:56 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xff00) 10:54:56 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:56 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1345.508387][T19317] Bluetooth: hci4: command 0x0409 tx timeout 10:54:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000004c0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000090a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:56 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x20480) [ 1345.640970][T19327] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1345.656583][T19331] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1345.677267][T19327] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:54:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000600a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000b0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000680a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:56 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x2200000000000000) 10:54:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000006c0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000c0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000270d0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:57 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1346.654510][T19328] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1346.668329][T19328] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:54:57 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000116c0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000e0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:57 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x34000) [ 1346.924726][T19355] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1346.933459][T19355] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:54:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000f0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000740a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000120a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1347.587672][ T6917] Bluetooth: hci4: command 0x041b tx timeout 10:54:58 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x2300000000000000) 10:54:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000007a0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000140a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:58 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x40000) 10:54:58 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1347.753913][T19349] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1347.764545][T19369] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1347.777686][T19369] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:54:58 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:54:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000160a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000001820a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:58 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x100000) [ 1348.415226][T19379] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1348.425788][T19379] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:54:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000180a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000880a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000190a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:59 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x2400000000000000) 10:54:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000ffffff9e0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000001f0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:54:59 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x400300) 10:54:59 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1349.179850][T19396] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1349.195557][T19396] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1349.676979][ T3671] Bluetooth: hci4: command 0x040f tx timeout 10:55:00 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000a80a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000200a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:00 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xa2ffff) [ 1349.845638][T19406] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1349.855855][T19410] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1349.865934][T19410] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:55:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000fffffff00a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000d270a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:00 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x1000000) 10:55:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000fffffff50a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:00 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x2500000000000000) 10:55:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000012b0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000400a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1350.682115][T19416] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1350.694571][T19416] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:55:01 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000fffffffe0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000480a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:01 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:01 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x1030000) [ 1350.993569][T19430] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1351.003701][T19436] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1351.013126][T19436] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:55:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000e0ffff0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000004c0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000f0ffff0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:01 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x2600000000000000) 10:55:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000600a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000680a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000007fffffff0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1351.747176][ T3671] Bluetooth: hci4: command 0x0419 tx timeout 10:55:02 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:02 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x2000000) 10:55:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000009effffff0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1351.860445][T19448] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1351.872869][T19448] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1352.447149][T19466] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1352.470125][T19466] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:55:03 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000006c0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:03 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000f0ffffff0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:03 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x3000000) 10:55:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000740a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1353.182855][T19478] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1353.197234][T19478] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1354.217846][ T3706] device hsr_slave_0 left promiscuous mode [ 1354.228110][ T3706] device hsr_slave_1 left promiscuous mode [ 1354.245103][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1354.258138][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1354.276143][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1354.292273][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1354.303455][ T3706] device bridge_slave_1 left promiscuous mode [ 1354.309911][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1354.318798][ T3706] device bridge_slave_0 left promiscuous mode [ 1354.324937][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1354.338118][ T3706] device veth1_macvtap left promiscuous mode [ 1354.344167][ T3706] device veth0_macvtap left promiscuous mode [ 1354.350437][ T3706] device veth1_vlan left promiscuous mode [ 1354.356221][ T3706] device veth0_vlan left promiscuous mode [ 1354.535658][ T3706] team0 (unregistering): Port device team_slave_1 removed [ 1354.550105][ T3706] team0 (unregistering): Port device team_slave_0 removed [ 1354.563910][ T3706] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1354.585110][ T3706] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1354.653794][ T3706] bond0 (unregistering): Released all slaves [ 1356.557925][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1356.566765][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1356.574417][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1356.582633][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1356.590474][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1356.597789][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1356.685886][T19481] chnl_net:caif_netlink_parms(): no params data found [ 1356.731113][T19481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1356.738408][T19481] bridge0: port 1(bridge_slave_0) entered disabled state [ 1356.746167][T19481] device bridge_slave_0 entered promiscuous mode [ 1356.754864][T19481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1356.762204][T19481] bridge0: port 2(bridge_slave_1) entered disabled state [ 1356.770318][T19481] device bridge_slave_1 entered promiscuous mode [ 1356.798333][T19481] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1356.809644][T19481] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1356.836163][T19481] team0: Port device team_slave_0 added [ 1356.845938][T19481] team0: Port device team_slave_1 added [ 1356.865951][T19481] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1356.873809][T19481] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1356.899811][T19481] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1356.911998][T19481] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1356.919030][T19481] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1356.945663][T19481] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1356.976907][T19481] device hsr_slave_0 entered promiscuous mode [ 1356.984459][T19481] device hsr_slave_1 entered promiscuous mode [ 1357.063044][T19481] bridge0: port 2(bridge_slave_1) entered blocking state [ 1357.070124][T19481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1357.077497][T19481] bridge0: port 1(bridge_slave_0) entered blocking state [ 1357.084557][T19481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1357.135093][T19481] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1357.149695][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1357.159188][T19317] bridge0: port 1(bridge_slave_0) entered disabled state [ 1357.166721][T19317] bridge0: port 2(bridge_slave_1) entered disabled state [ 1357.174968][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1357.188656][T19481] 8021q: adding VLAN 0 to HW filter on device team0 [ 1357.201020][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1357.209487][T19317] bridge0: port 1(bridge_slave_0) entered blocking state [ 1357.216520][T19317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1357.229306][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1357.238897][ T6917] bridge0: port 2(bridge_slave_1) entered blocking state [ 1357.245947][ T6917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1357.270620][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1357.280499][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1357.294767][T19481] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1357.305238][T19481] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1357.320793][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1357.328862][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1357.338158][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1357.348230][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1357.366412][T19481] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1357.374941][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1357.383163][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1357.401650][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1357.425235][T19481] device veth0_vlan entered promiscuous mode [ 1357.433549][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1357.442460][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1357.451783][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1357.464518][T19481] device veth1_vlan entered promiscuous mode [ 1357.489062][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1357.497704][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1357.505852][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1357.518748][T19481] device veth0_macvtap entered promiscuous mode [ 1357.528195][T19481] device veth1_macvtap entered promiscuous mode [ 1357.547691][T19481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1357.559033][T19481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.569066][T19481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1357.580044][T19481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.590373][T19481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1357.600985][T19481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.611021][T19481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1357.621782][T19481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.631865][T19481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1357.642454][T19481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.657908][T19481] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1357.666050][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1357.681736][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1357.695320][T19481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1357.706359][T19481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.718282][T19481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1357.728877][T19481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.738868][T19481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1357.749565][T19481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.760029][T19481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1357.770724][T19481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.781046][T19481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1357.792073][T19481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1357.803362][T19481] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1357.813182][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1357.822184][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1358.063633][ T3706] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1358.083873][ T3706] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1358.236718][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1358.255942][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1358.265052][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1358.276829][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1358.322367][T19487] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:55:09 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x2700000000000000) 10:55:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000f5ffffff0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000007a0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:09 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x4000000) 10:55:09 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:09 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1358.627874][ T3698] Bluetooth: hci4: command 0x0409 tx timeout 10:55:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000feffffff0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000880a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1358.700607][T19495] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1358.723370][T19495] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:55:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000120000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000a80a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000010720000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000f00a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1359.664982][T19496] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1359.677124][T19496] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1360.615960][ T10] device hsr_slave_0 left promiscuous mode [ 1360.623427][ T10] device hsr_slave_1 left promiscuous mode [ 1360.630145][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1360.637758][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1360.646378][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1360.653926][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1360.664608][ T10] device bridge_slave_1 left promiscuous mode [ 1360.670916][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1360.679923][ T10] device bridge_slave_0 left promiscuous mode [ 1360.686063][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1360.699205][ T10] device veth1_macvtap left promiscuous mode [ 1360.705219][ T10] device veth0_macvtap left promiscuous mode [ 1360.711653][ T10] device veth1_vlan left promiscuous mode [ 1360.717569][ T10] device veth0_vlan left promiscuous mode [ 1360.898531][ T10] team0 (unregistering): Port device team_slave_1 removed [ 1360.914715][ T10] team0 (unregistering): Port device team_slave_0 removed [ 1360.926728][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1360.945964][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1361.016019][ T10] bond0 (unregistering): Released all slaves [ 1361.268384][ T1225] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.274655][ T1225] ieee802154 phy1 wpan1: encryption failed: -22 [ 1362.794193][ T3631] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1362.806612][ T3631] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1362.814431][ T3631] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1362.822264][ T3631] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1362.830179][ T3631] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1362.837646][ T3631] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1362.929729][T19514] chnl_net:caif_netlink_parms(): no params data found [ 1362.972330][T19514] bridge0: port 1(bridge_slave_0) entered blocking state [ 1362.979955][T19514] bridge0: port 1(bridge_slave_0) entered disabled state [ 1362.988994][T19514] device bridge_slave_0 entered promiscuous mode [ 1362.996842][T19514] bridge0: port 2(bridge_slave_1) entered blocking state [ 1363.004128][T19514] bridge0: port 2(bridge_slave_1) entered disabled state [ 1363.011961][T19514] device bridge_slave_1 entered promiscuous mode [ 1363.035900][T19514] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1363.047035][T19514] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1363.072220][T19514] team0: Port device team_slave_0 added [ 1363.081252][T19514] team0: Port device team_slave_1 added [ 1363.101917][T19514] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1363.109017][T19514] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1363.134935][T19514] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1363.149194][T19514] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1363.156148][T19514] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1363.182958][T19514] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1363.214602][T19514] device hsr_slave_0 entered promiscuous mode [ 1363.221393][T19514] device hsr_slave_1 entered promiscuous mode [ 1363.299935][T19514] bridge0: port 2(bridge_slave_1) entered blocking state [ 1363.307071][T19514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1363.314360][T19514] bridge0: port 1(bridge_slave_0) entered blocking state [ 1363.321471][T19514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1363.372231][T19514] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1363.385252][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1363.398715][ T3670] bridge0: port 1(bridge_slave_0) entered disabled state [ 1363.406218][ T3670] bridge0: port 2(bridge_slave_1) entered disabled state [ 1363.418928][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1363.435799][T19514] 8021q: adding VLAN 0 to HW filter on device team0 [ 1363.448432][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1363.456811][T19317] bridge0: port 1(bridge_slave_0) entered blocking state [ 1363.463918][T19317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1363.474826][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1363.483588][ T3698] bridge0: port 2(bridge_slave_1) entered blocking state [ 1363.490718][ T3698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1363.512425][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1363.521810][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1363.540381][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1363.549220][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1363.561683][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1363.573086][T19514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1363.595626][T19514] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1363.604263][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1363.611954][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1363.630823][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1363.650565][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1363.658884][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1363.666543][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1363.678471][T19514] device veth0_vlan entered promiscuous mode [ 1363.690181][T19514] device veth1_vlan entered promiscuous mode [ 1363.712667][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1363.721506][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1363.729899][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1363.741824][T19514] device veth0_macvtap entered promiscuous mode [ 1363.751466][T19514] device veth1_macvtap entered promiscuous mode [ 1363.771796][T19514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1363.782487][T19514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1363.792720][T19514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1363.803962][T19514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1363.814112][T19514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1363.824712][T19514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1363.834992][T19514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1363.845635][T19514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1363.855609][T19514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1363.866676][T19514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1363.880441][T19514] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1363.890227][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1363.900396][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1363.911666][T19514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1363.923659][T19514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1363.935609][T19514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1363.946144][T19514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1363.955960][T19514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1363.966487][T19514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1363.976547][T19514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1363.988483][T19514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1363.998582][T19514] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1364.010692][T19514] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1364.021988][T19514] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1364.041190][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1364.050071][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1364.294446][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1364.314918][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1364.463004][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1364.490027][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1364.498336][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1364.509879][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1364.555626][T19520] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:55:15 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x2800000000000000) 10:55:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000a0020000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000820000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:15 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x5000000) 10:55:15 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:15 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1364.867591][T19317] Bluetooth: hci4: command 0x0409 tx timeout [ 1364.917292][T19531] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:55:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000200000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000f0020000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1364.974487][T19529] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1365.010225][T19529] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1365.104118][T19536] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000100020000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:15 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1365.324217][T19540] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000110020000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000400000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1365.542605][T19544] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1365.918552][T19530] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1365.927553][T19530] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:55:16 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x6000000) 10:55:16 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x2900000000000000) 10:55:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000320000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:16 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:16 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1366.214238][T19551] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000020a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:16 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000600000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1366.288161][T19552] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1366.301690][T19556] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1366.317274][T19552] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:55:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000030a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1366.410241][T19560] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000040a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1366.616883][T19565] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:17 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x3f00000000000000) [ 1366.949240][ T3670] Bluetooth: hci4: command 0x041b tx timeout 10:55:17 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:17 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x7000000) 10:55:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000050a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000060a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:18 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1367.750347][T19555] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:55:18 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000900000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000070a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:18 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x8000000) 10:55:18 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x4800000000000000) [ 1368.144682][T19582] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:55:18 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000080a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000b00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000090a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000c00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000b0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1369.027088][ T3671] Bluetooth: hci4: command 0x040f tx timeout 10:55:19 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1369.117096][T19597] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:55:19 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000e00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000c0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:19 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x9000000) [ 1369.393901][T19610] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1370.539635][T19620] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1370.561752][T19620] __nla_validate_parse: 10 callbacks suppressed [ 1370.561771][T19620] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1371.286744][ T10] device hsr_slave_0 left promiscuous mode [ 1371.294154][ T10] device hsr_slave_1 left promiscuous mode [ 1371.300960][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1371.308510][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1371.317512][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1371.324958][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1371.333894][ T10] device bridge_slave_1 left promiscuous mode [ 1371.340515][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1371.349735][ T10] device bridge_slave_0 left promiscuous mode [ 1371.355897][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1371.370846][ T10] device veth1_macvtap left promiscuous mode [ 1371.377530][ T10] device veth0_macvtap left promiscuous mode [ 1371.383775][ T10] device veth1_vlan left promiscuous mode [ 1371.389761][ T10] device veth0_vlan left promiscuous mode [ 1371.572824][ T10] team0 (unregistering): Port device team_slave_1 removed [ 1371.591616][ T10] team0 (unregistering): Port device team_slave_0 removed [ 1371.606286][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1371.623705][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1371.695354][ T10] bond0 (unregistering): Released all slaves [ 1375.027265][ T3631] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1379.667155][ T3631] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1384.317230][ T3631] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1386.961305][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1386.969875][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1386.978115][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1386.985841][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1386.993750][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1387.001327][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1387.092578][T19630] chnl_net:caif_netlink_parms(): no params data found [ 1387.136745][T19630] bridge0: port 1(bridge_slave_0) entered blocking state [ 1387.145226][T19630] bridge0: port 1(bridge_slave_0) entered disabled state [ 1387.153373][T19630] device bridge_slave_0 entered promiscuous mode [ 1387.162906][T19630] bridge0: port 2(bridge_slave_1) entered blocking state [ 1387.170190][T19630] bridge0: port 2(bridge_slave_1) entered disabled state [ 1387.178908][T19630] device bridge_slave_1 entered promiscuous mode [ 1387.205105][T19630] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1387.216198][T19630] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1387.243199][T19630] team0: Port device team_slave_0 added [ 1387.251813][T19630] team0: Port device team_slave_1 added [ 1387.272660][T19630] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1387.279693][T19630] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1387.306215][T19630] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1387.319913][T19630] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1387.326837][T19630] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1387.356732][T19630] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1387.386050][T19630] device hsr_slave_0 entered promiscuous mode [ 1387.392758][T19630] device hsr_slave_1 entered promiscuous mode [ 1387.472359][T19630] bridge0: port 2(bridge_slave_1) entered blocking state [ 1387.479466][T19630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1387.486747][T19630] bridge0: port 1(bridge_slave_0) entered blocking state [ 1387.493861][T19630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1387.544510][T19630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1387.563268][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1387.576131][T15753] bridge0: port 1(bridge_slave_0) entered disabled state [ 1387.584102][T15753] bridge0: port 2(bridge_slave_1) entered disabled state [ 1387.599210][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1387.615715][T19630] 8021q: adding VLAN 0 to HW filter on device team0 [ 1387.626432][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1387.635321][ T3670] bridge0: port 1(bridge_slave_0) entered blocking state [ 1387.642402][ T3670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1387.670562][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1387.679189][ T3670] bridge0: port 2(bridge_slave_1) entered blocking state [ 1387.686250][ T3670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1387.695055][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1387.703755][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1387.719320][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1387.727368][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1387.740254][ T3670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1387.749635][T19630] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1387.771914][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1387.779427][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1387.796049][T19630] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1387.814898][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1387.835225][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1387.845476][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1387.853674][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1387.864441][T19630] device veth0_vlan entered promiscuous mode [ 1387.875852][T19630] device veth1_vlan entered promiscuous mode [ 1387.898865][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1387.906839][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1387.915983][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1387.926626][T19630] device veth0_macvtap entered promiscuous mode [ 1387.938903][T19630] device veth1_macvtap entered promiscuous mode [ 1387.955365][T19630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1387.966363][T19630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1387.976661][T19630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1387.987822][T19630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1387.998005][T19630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1388.008908][T19630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1388.019281][T19630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1388.031222][T19630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1388.041339][T19630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1388.051838][T19630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1388.063671][T19630] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1388.073675][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1388.084365][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1388.095715][T19630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1388.107112][T19630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1388.116914][T19630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1388.127679][T19630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1388.139678][T19630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1388.153163][T19630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1388.164138][T19630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1388.175744][T19630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1388.185914][T19630] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1388.196668][T19630] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1388.208645][T19630] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1388.218506][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1388.227591][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1388.462460][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1388.476600][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1388.643176][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1388.663714][ T5169] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1388.671999][ T5169] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1388.683437][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1388.725900][T19636] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:55:39 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x4c00000000000000) 10:55:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000f00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000e0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:39 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xa000000) 10:55:39 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c6530"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:39 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000018000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1389.027428][T15753] Bluetooth: hci4: command 0x0409 tx timeout [ 1389.064909][T19641] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000f0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001200000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1389.131883][T19646] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1389.158395][T19646] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:55:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000120a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1389.316735][T19652] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000140a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001400000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000160a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1389.554424][T19658] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1390.084585][T19644] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1390.104850][T19644] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1391.054059][ T10] device hsr_slave_0 left promiscuous mode [ 1391.061809][ T10] device hsr_slave_1 left promiscuous mode [ 1391.068740][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1391.076175][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1391.085569][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1391.093482][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1391.103130][ T10] device bridge_slave_1 left promiscuous mode [ 1391.109949][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1391.120368][ T10] device bridge_slave_0 left promiscuous mode [ 1391.126521][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1391.141696][ T10] device veth1_macvtap left promiscuous mode [ 1391.147825][ T10] device veth0_macvtap left promiscuous mode [ 1391.153857][ T10] device veth1_vlan left promiscuous mode [ 1391.159785][ T10] device veth0_vlan left promiscuous mode [ 1391.345289][ T10] team0 (unregistering): Port device team_slave_1 removed [ 1391.362651][ T10] team0 (unregistering): Port device team_slave_0 removed [ 1391.375420][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1391.394966][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1391.465882][ T10] bond0 (unregistering): Released all slaves [ 1393.280441][ T3631] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1393.291752][ T3631] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1393.299965][ T3631] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1393.307939][ T3631] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1393.316064][ T3631] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1393.324982][ T3631] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1393.414807][T19663] chnl_net:caif_netlink_parms(): no params data found [ 1393.462171][T19663] bridge0: port 1(bridge_slave_0) entered blocking state [ 1393.469439][T19663] bridge0: port 1(bridge_slave_0) entered disabled state [ 1393.477348][T19663] device bridge_slave_0 entered promiscuous mode [ 1393.485239][T19663] bridge0: port 2(bridge_slave_1) entered blocking state [ 1393.492989][T19663] bridge0: port 2(bridge_slave_1) entered disabled state [ 1393.500992][T19663] device bridge_slave_1 entered promiscuous mode [ 1393.526015][T19663] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1393.537097][T19663] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1393.564608][T19663] team0: Port device team_slave_0 added [ 1393.573029][T19663] team0: Port device team_slave_1 added [ 1393.591956][T19663] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1393.599856][T19663] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1393.625838][T19663] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1393.638041][T19663] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1393.644966][T19663] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1393.672450][T19663] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1393.702475][T19663] device hsr_slave_0 entered promiscuous mode [ 1393.709562][T19663] device hsr_slave_1 entered promiscuous mode [ 1393.784143][T19663] bridge0: port 2(bridge_slave_1) entered blocking state [ 1393.791229][T19663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1393.798539][T19663] bridge0: port 1(bridge_slave_0) entered blocking state [ 1393.805598][T19663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1393.863999][T19663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1393.880846][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1393.889476][ T6917] bridge0: port 1(bridge_slave_0) entered disabled state [ 1393.897918][ T6917] bridge0: port 2(bridge_slave_1) entered disabled state [ 1393.908887][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1393.923344][T19663] 8021q: adding VLAN 0 to HW filter on device team0 [ 1393.936733][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1393.945385][T15753] bridge0: port 1(bridge_slave_0) entered blocking state [ 1393.952515][T15753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1393.977655][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1393.986181][T15753] bridge0: port 2(bridge_slave_1) entered blocking state [ 1393.993281][T15753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1394.002564][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1394.013120][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1394.022327][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1394.039952][T19663] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1394.050417][T19663] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1394.064285][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1394.073563][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1394.082372][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1394.099567][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1394.107736][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1394.121631][T19663] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1394.136148][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1394.155991][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1394.164311][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1394.172514][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1394.183150][T19663] device veth0_vlan entered promiscuous mode [ 1394.196868][T19663] device veth1_vlan entered promiscuous mode [ 1394.221196][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1394.230937][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1394.239365][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1394.250402][T19663] device veth0_macvtap entered promiscuous mode [ 1394.261550][T19663] device veth1_macvtap entered promiscuous mode [ 1394.280158][T19663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.291938][T19663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.302484][T19663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.313790][T19663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.323695][T19663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.335064][T19663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.345091][T19663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.355614][T19663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.365486][T19663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1394.375988][T19663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.388935][T19663] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1394.399756][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1394.409019][ T3671] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1394.424414][T19663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.435138][T19663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.445614][T19663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.456233][T19663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.466135][T19663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.476785][T19663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.488380][T19663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.498915][T19663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.508762][T19663] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1394.519856][T19663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1394.531130][T19663] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1394.539834][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1394.548945][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1394.786718][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1394.801581][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1394.974284][ T6917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1394.995448][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1395.004152][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1395.015171][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1395.063969][T19669] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:55:45 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x5000000000000000) 10:55:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001600000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:45 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xe000000) 10:55:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000180a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:45 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c6530"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:45 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000018000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1395.348436][ T3671] Bluetooth: hci4: command 0x0409 tx timeout [ 1395.416635][T19675] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000190a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1395.468303][T19676] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1395.476105][T19681] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1395.501688][T19676] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:55:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000480a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1395.622494][T19685] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000001900000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000004c0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:46 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x6000000000000000) [ 1395.859504][T19689] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000600a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000004800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:46 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x10000000) 10:55:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000680a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1396.098034][T19697] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1396.639048][T19674] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1396.658258][T19674] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:55:47 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c6530"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000006c0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000004c00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:47 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000058010000018000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:47 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x11000000) 10:55:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000740a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1396.946048][T19709] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:47 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000006000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1397.003670][T19705] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1397.027384][T19705] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1397.134316][T19715] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1397.427445][ T6917] Bluetooth: hci4: command 0x041b tx timeout [ 1397.955133][T19711] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1397.964997][T19711] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1398.889018][ T5184] device hsr_slave_0 left promiscuous mode [ 1398.895294][ T5184] device hsr_slave_1 left promiscuous mode [ 1398.903646][ T5184] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1398.911635][ T5184] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1398.922031][ T5184] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1398.929910][ T5184] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1398.940020][ T5184] device bridge_slave_1 left promiscuous mode [ 1398.946175][ T5184] bridge0: port 2(bridge_slave_1) entered disabled state [ 1398.954550][ T5184] device bridge_slave_0 left promiscuous mode [ 1398.964807][ T5184] bridge0: port 1(bridge_slave_0) entered disabled state [ 1398.978060][ T5184] device veth1_macvtap left promiscuous mode [ 1398.984066][ T5184] device veth0_macvtap left promiscuous mode [ 1398.994363][ T5184] device veth1_vlan left promiscuous mode [ 1399.000382][ T5184] device veth0_vlan left promiscuous mode [ 1399.190170][ T5184] team0 (unregistering): Port device team_slave_1 removed [ 1399.208089][ T5184] team0 (unregistering): Port device team_slave_0 removed [ 1399.224245][ T5184] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1399.239646][ T5184] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1399.306147][ T5184] bond0 (unregistering): Released all slaves [ 1401.040408][ T3631] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1401.049361][ T3631] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1401.057254][ T3631] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1401.065421][ T3631] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1401.073629][ T3631] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1401.081044][ T3631] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1401.176241][T19719] chnl_net:caif_netlink_parms(): no params data found [ 1401.224312][T19719] bridge0: port 1(bridge_slave_0) entered blocking state [ 1401.231667][T19719] bridge0: port 1(bridge_slave_0) entered disabled state [ 1401.239885][T19719] device bridge_slave_0 entered promiscuous mode [ 1401.248452][T19719] bridge0: port 2(bridge_slave_1) entered blocking state [ 1401.255516][T19719] bridge0: port 2(bridge_slave_1) entered disabled state [ 1401.263510][T19719] device bridge_slave_1 entered promiscuous mode [ 1401.289503][T19719] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1401.301245][T19719] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1401.328833][T19719] team0: Port device team_slave_0 added [ 1401.336928][T19719] team0: Port device team_slave_1 added [ 1401.358686][T19719] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1401.365637][T19719] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1401.392263][T19719] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1401.404314][T19719] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1401.411341][T19719] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1401.439034][T19719] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1401.466601][T19719] device hsr_slave_0 entered promiscuous mode [ 1401.474055][T19719] device hsr_slave_1 entered promiscuous mode [ 1401.551973][T19719] bridge0: port 2(bridge_slave_1) entered blocking state [ 1401.559092][T19719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1401.566390][T19719] bridge0: port 1(bridge_slave_0) entered blocking state [ 1401.573521][T19719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1401.624981][T19719] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1401.637659][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1401.645622][ T3698] bridge0: port 1(bridge_slave_0) entered disabled state [ 1401.654579][ T3698] bridge0: port 2(bridge_slave_1) entered disabled state [ 1401.665180][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1401.679952][T19719] 8021q: adding VLAN 0 to HW filter on device team0 [ 1401.693507][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1401.702340][T19716] bridge0: port 1(bridge_slave_0) entered blocking state [ 1401.709467][T19716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1401.728311][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1401.736668][T19716] bridge0: port 2(bridge_slave_1) entered blocking state [ 1401.743773][T19716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1401.756871][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1401.766192][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1401.789082][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1401.797809][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1401.808579][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1401.820087][T19719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1401.835944][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1401.849032][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1401.863624][T19719] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1401.881272][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1401.905429][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1401.914149][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1401.922348][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1401.932886][T19719] device veth0_vlan entered promiscuous mode [ 1401.944821][T19719] device veth1_vlan entered promiscuous mode [ 1401.964524][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1401.973104][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1401.981855][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1401.994233][T19719] device veth0_macvtap entered promiscuous mode [ 1402.004549][T19719] device veth1_macvtap entered promiscuous mode [ 1402.021569][T19719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1402.032373][T19719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.042419][T19719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1402.053071][T19719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.063140][T19719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1402.077064][T19719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.086874][T19719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1402.099231][T19719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.111777][T19719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1402.122407][T19719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.135259][T19719] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1402.145091][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1402.155760][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1402.165294][T19719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1402.176242][T19719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.187228][T19719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1402.198923][T19719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.210119][T19719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1402.222823][T19719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.233617][T19719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1402.244099][T19719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.253944][T19719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1402.264613][T19719] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1402.277677][T19719] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1402.285546][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1402.534505][ T5184] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1402.568580][ T5184] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1402.715304][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1402.734965][ T5773] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1402.743235][ T5773] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1402.754329][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1402.799145][T19725] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:55:53 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x6800000000000000) 10:55:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000007a0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000006800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:53 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x1f000000) 10:55:53 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:53 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1403.107056][T19716] Bluetooth: hci4: command 0x0409 tx timeout [ 1403.163311][T19734] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000880a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1403.203879][T19731] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1403.212980][T19731] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:55:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000006c00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1403.349395][T19740] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000a80a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000007400000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1403.539910][T19745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000c20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000007a00000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1403.820956][T19750] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1404.191602][T19733] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1404.203562][T19733] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:55:54 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x6c00000000000000) 10:55:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000002520000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000008800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:54 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x20000000) 10:55:55 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:55:55 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1404.498847][T19756] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1404.515523][T19758] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:55:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000152620000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000a800000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1404.546647][T19758] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:55:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000004020000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1404.712274][T19766] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:55 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000f000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:55:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000006720000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1404.930977][T19772] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:55:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000000e920000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1405.187912][T19716] Bluetooth: hci4: command 0x041b tx timeout [ 1405.494966][T19762] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1406.496171][ T10] device hsr_slave_0 left promiscuous mode [ 1406.503769][ T10] device hsr_slave_1 left promiscuous mode [ 1406.510510][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1406.518005][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1406.526554][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1406.535025][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1406.543799][ T10] device bridge_slave_1 left promiscuous mode [ 1406.554955][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1406.563599][ T10] device bridge_slave_0 left promiscuous mode [ 1406.570278][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1406.582630][ T10] device veth1_macvtap left promiscuous mode [ 1406.588769][ T10] device veth0_macvtap left promiscuous mode [ 1406.595130][ T10] device veth1_vlan left promiscuous mode [ 1406.601917][ T10] device veth0_vlan left promiscuous mode [ 1406.779674][ T10] team0 (unregistering): Port device team_slave_1 removed [ 1406.797423][ T10] team0 (unregistering): Port device team_slave_0 removed [ 1406.812719][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1406.825989][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1406.894865][ T10] bond0 (unregistering): Released all slaves [ 1410.627330][ T3638] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1415.267217][ T3638] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1417.837328][ T3631] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1417.845917][ T3631] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1417.853940][ T3631] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1417.862028][ T3631] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1417.870236][ T3631] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1417.877793][ T3631] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1417.966738][T19779] chnl_net:caif_netlink_parms(): no params data found [ 1418.010490][T19779] bridge0: port 1(bridge_slave_0) entered blocking state [ 1418.017697][T19779] bridge0: port 1(bridge_slave_0) entered disabled state [ 1418.026065][T19779] device bridge_slave_0 entered promiscuous mode [ 1418.034187][T19779] bridge0: port 2(bridge_slave_1) entered blocking state [ 1418.041393][T19779] bridge0: port 2(bridge_slave_1) entered disabled state [ 1418.050262][T19779] device bridge_slave_1 entered promiscuous mode [ 1418.077385][T19779] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1418.088458][T19779] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1418.112900][T19779] team0: Port device team_slave_0 added [ 1418.121529][T19779] team0: Port device team_slave_1 added [ 1418.139375][T19779] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1418.146325][T19779] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1418.173206][T19779] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1418.188538][T19779] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1418.195509][T19779] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1418.221687][T19779] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1418.253263][T19779] device hsr_slave_0 entered promiscuous mode [ 1418.260475][T19779] device hsr_slave_1 entered promiscuous mode [ 1418.343369][T19779] bridge0: port 2(bridge_slave_1) entered blocking state [ 1418.350500][T19779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1418.358151][T19779] bridge0: port 1(bridge_slave_0) entered blocking state [ 1418.365276][T19779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1418.419468][T19779] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1418.433223][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1418.442125][T16142] bridge0: port 1(bridge_slave_0) entered disabled state [ 1418.451628][T16142] bridge0: port 2(bridge_slave_1) entered disabled state [ 1418.461210][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1418.474603][T19779] 8021q: adding VLAN 0 to HW filter on device team0 [ 1418.495338][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1418.503920][T16142] bridge0: port 1(bridge_slave_0) entered blocking state [ 1418.511026][T16142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1418.519653][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1418.528869][T16142] bridge0: port 2(bridge_slave_1) entered blocking state [ 1418.535926][T16142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1418.558166][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1418.575130][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1418.584337][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1418.593184][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1418.606450][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1418.615491][T19779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1418.638482][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1418.645903][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1418.656538][T19779] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1418.674197][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1418.695490][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1418.704249][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1418.713270][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1418.723586][T19779] device veth0_vlan entered promiscuous mode [ 1418.736586][T19779] device veth1_vlan entered promiscuous mode [ 1418.760808][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1418.769473][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1418.778208][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1418.795894][T19779] device veth0_macvtap entered promiscuous mode [ 1418.808903][T19779] device veth1_macvtap entered promiscuous mode [ 1418.825306][T19779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1418.836134][T19779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.846189][T19779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1418.856940][T19779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.867407][T19779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1418.878608][T19779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.890274][T19779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1418.901831][T19779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.911852][T19779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1418.922468][T19779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.934097][T19779] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1418.943052][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1418.953061][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1418.964669][T19779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.976794][T19779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1418.986703][T19779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1418.999389][T19779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1419.009298][T19779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1419.019836][T19779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1419.029918][T19779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1419.040503][T19779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1419.050356][T19779] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1419.060980][T19779] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1419.071963][T19779] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1419.081122][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1419.090089][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1419.326744][ T5772] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1419.347022][ T5772] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1419.504363][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1419.525889][ T5772] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1419.536134][ T5772] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1419.548072][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1419.592778][T19785] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:56:10 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x7400000000000000) 10:56:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000008201000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000320000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:10 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x30000000) 10:56:10 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:10 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="050000005801000001800000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1419.907857][T16142] Bluetooth: hci4: command 0x0409 tx timeout 10:56:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000820000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1419.991653][T19793] __nla_validate_parse: 1 callbacks suppressed [ 1419.991673][T19793] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1420.005981][T19795] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1420.040645][T19795] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:56:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000003000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000c20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1420.286314][T19801] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000005000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000002520000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1420.571094][T19808] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000006720000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1420.982621][T19794] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1421.002292][T19794] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:56:11 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x7a00000000000000) 10:56:11 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x38000000) 10:56:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000006000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000000e920000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:11 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:11 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a03000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1421.298595][T19817] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1421.334702][T19818] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:56:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000007000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1421.381733][T19818] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:56:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a09000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1421.464441][T19826] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a0a000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000009000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1421.732423][T19831] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a0f000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1421.998176][T19317] Bluetooth: hci4: command 0x041b tx timeout [ 1422.276650][T19822] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1422.284880][T19822] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:56:13 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x8000000000000000) 10:56:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000a000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a25000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:13 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x3f000000) 10:56:13 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:13 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2f000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1422.616924][T19842] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:56:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000b000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a60000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1422.721436][ T1225] ieee802154 phy0 wpan0: encryption failed: -22 [ 1422.729425][ T1225] ieee802154 phy1 wpan1: encryption failed: -22 10:56:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a67000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000aa8000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1423.587237][T19846] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1424.539552][ T5184] device hsr_slave_0 left promiscuous mode [ 1424.545911][ T5184] device hsr_slave_1 left promiscuous mode [ 1424.552778][ T5184] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1424.565526][ T5184] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1424.574553][ T5184] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1424.585949][ T5184] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1424.594680][ T5184] device bridge_slave_1 left promiscuous mode [ 1424.601212][ T5184] bridge0: port 2(bridge_slave_1) entered disabled state [ 1424.609659][ T5184] device bridge_slave_0 left promiscuous mode [ 1424.615968][ T5184] bridge0: port 1(bridge_slave_0) entered disabled state [ 1424.632631][ T5184] device veth1_macvtap left promiscuous mode [ 1424.639471][ T5184] device veth0_macvtap left promiscuous mode [ 1424.645966][ T5184] device veth1_vlan left promiscuous mode [ 1424.651882][ T5184] device veth0_vlan left promiscuous mode [ 1424.833876][ T5184] team0 (unregistering): Port device team_slave_1 removed [ 1424.847626][ T5184] team0 (unregistering): Port device team_slave_0 removed [ 1424.865071][ T5184] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1424.885196][ T5184] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1424.951153][ T5184] bond0 (unregistering): Released all slaves [ 1428.787292][ T3631] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1431.354688][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1431.365374][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1431.372977][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1431.383245][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1431.391061][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1431.398765][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1431.490108][T19863] chnl_net:caif_netlink_parms(): no params data found [ 1431.535362][T19863] bridge0: port 1(bridge_slave_0) entered blocking state [ 1431.542592][T19863] bridge0: port 1(bridge_slave_0) entered disabled state [ 1431.551362][T19863] device bridge_slave_0 entered promiscuous mode [ 1431.559678][T19863] bridge0: port 2(bridge_slave_1) entered blocking state [ 1431.566792][T19863] bridge0: port 2(bridge_slave_1) entered disabled state [ 1431.575354][T19863] device bridge_slave_1 entered promiscuous mode [ 1431.604720][T19863] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1431.615762][T19863] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1431.644033][T19863] team0: Port device team_slave_0 added [ 1431.654775][T19863] team0: Port device team_slave_1 added [ 1431.677777][T19863] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1431.684727][T19863] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1431.711455][T19863] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1431.724426][T19863] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1431.731475][T19863] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1431.758952][T19863] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1431.786707][T19863] device hsr_slave_0 entered promiscuous mode [ 1431.794007][T19863] device hsr_slave_1 entered promiscuous mode [ 1431.872161][T19863] bridge0: port 2(bridge_slave_1) entered blocking state [ 1431.879372][T19863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1431.886674][T19863] bridge0: port 1(bridge_slave_0) entered blocking state [ 1431.893810][T19863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1431.946750][T19863] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1431.961995][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1431.974492][ T3698] bridge0: port 1(bridge_slave_0) entered disabled state [ 1431.982571][ T3698] bridge0: port 2(bridge_slave_1) entered disabled state [ 1431.997107][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1432.013770][T19863] 8021q: adding VLAN 0 to HW filter on device team0 [ 1432.024224][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1432.035534][ T6979] bridge0: port 1(bridge_slave_0) entered blocking state [ 1432.042613][ T6979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1432.060204][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1432.069637][T19317] bridge0: port 2(bridge_slave_1) entered blocking state [ 1432.076721][T19317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1432.098350][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1432.112759][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1432.120982][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1432.140041][T19863] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1432.150619][T19863] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1432.167290][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1432.176032][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1432.184664][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1432.204229][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1432.211782][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1432.226137][T19863] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1432.247215][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1432.270328][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1432.279888][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1432.287873][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1432.304016][T19863] device veth0_vlan entered promiscuous mode [ 1432.321054][T19863] device veth1_vlan entered promiscuous mode [ 1432.341206][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1432.349402][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1432.358030][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1432.369417][T19863] device veth0_macvtap entered promiscuous mode [ 1432.379878][T19863] device veth1_macvtap entered promiscuous mode [ 1432.400081][T19863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.412355][T19863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.422623][T19863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.433285][T19863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.443208][T19863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.454563][T19863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.464505][T19863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.475825][T19863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.487187][T19863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1432.497890][T19863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.510750][T19863] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1432.520258][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1432.539665][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1432.551363][T19863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.564284][T19863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.577240][T19863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.587827][T19863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.597779][T19863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.608353][T19863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.619326][T19863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.630341][T19863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.640665][T19863] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1432.651225][T19863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1432.662467][T19863] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1432.673087][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1432.682115][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1432.931622][ T3706] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1432.945710][ T3706] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1433.119780][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1433.143238][ T5169] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1433.151404][ T5169] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1433.162459][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1433.204344][T19871] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1433.428902][ T20] Bluetooth: hci4: command 0x0409 tx timeout 10:56:24 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x9effffff00000000) 10:56:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000e000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20020000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:24 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x40000000) 10:56:24 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:24 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1433.561961][T19877] __nla_validate_parse: 10 callbacks suppressed [ 1433.561980][T19877] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20030000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000f000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1433.629271][T19880] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1433.647106][T19883] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1433.675231][T19880] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1433.780291][T19887] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20040000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000006c11000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20050000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:24 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xc000000000000000) [ 1434.010826][T19891] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000012000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20060000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1434.257654][T19897] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000014000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:24 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x7ffffff7) [ 1434.423540][T19901] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:25 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1434.682752][T19882] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1434.700673][T19882] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:56:25 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20070000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000016000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:25 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x80040000) [ 1434.967871][T19907] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1434.977173][T19907] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:56:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20080000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1435.054516][T19910] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:25 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x80040200) [ 1435.509049][ T20] Bluetooth: hci4: command 0x041b tx timeout 10:56:26 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xcd1d000000000000) 10:56:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000018000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20090000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:26 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x8dffffff) 10:56:26 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1435.754022][T19895] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1435.764047][T19918] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1435.779092][T19918] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:56:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200b0000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:26 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:26 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xac050000) 10:56:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000019000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200c0000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1436.141896][T19930] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1436.151976][T19934] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:56:26 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000001f000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200e0000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:27 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xb80b0000) 10:56:27 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xf0ffffff00000000) 10:56:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200f0000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000020000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20120000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000040000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1436.856861][T19942] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:56:27 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:27 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:27 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xc5000000) 10:56:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20140000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000048000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1437.259625][T19955] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:56:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000004c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20160000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1437.346452][T19962] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:56:28 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xfcfdffff00000000) 10:56:28 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xeffdffff) 10:56:28 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000060000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20180000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1437.597287][ T20] Bluetooth: hci4: command 0x040f tx timeout 10:56:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20190000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1438.284273][T19969] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:56:29 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x0, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:29 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xf5ffffff) 10:56:29 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000068000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20480000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:29 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a204c0000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1438.598801][T19991] __nla_validate_parse: 12 callbacks suppressed [ 1438.598820][T19991] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1438.604664][T19990] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1438.636338][T19990] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:56:29 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xf7ffff7f) [ 1440.234056][ T3706] device hsr_slave_0 left promiscuous mode [ 1440.242260][ T3706] device hsr_slave_1 left promiscuous mode [ 1440.249184][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1440.256624][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1440.265568][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1440.273049][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1440.281840][ T3706] device bridge_slave_1 left promiscuous mode [ 1440.290841][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1440.299597][ T3706] device bridge_slave_0 left promiscuous mode [ 1440.305731][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1440.322976][ T3706] device veth1_macvtap left promiscuous mode [ 1440.329139][ T3706] device veth0_macvtap left promiscuous mode [ 1440.335172][ T3706] device veth1_vlan left promiscuous mode [ 1440.342130][ T3706] device veth0_vlan left promiscuous mode [ 1440.525527][ T3706] team0 (unregistering): Port device team_slave_1 removed [ 1440.554347][ T3706] team0 (unregistering): Port device team_slave_0 removed [ 1440.572669][ T3706] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1440.587580][ T3706] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1440.653919][ T3706] bond0 (unregistering): Released all slaves [ 1442.475636][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1442.485494][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1442.494253][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1442.502440][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1442.510115][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1442.517435][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1442.609326][T20003] chnl_net:caif_netlink_parms(): no params data found [ 1442.656542][T20003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1442.663814][T20003] bridge0: port 1(bridge_slave_0) entered disabled state [ 1442.672485][T20003] device bridge_slave_0 entered promiscuous mode [ 1442.680499][T20003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.688270][T20003] bridge0: port 2(bridge_slave_1) entered disabled state [ 1442.696059][T20003] device bridge_slave_1 entered promiscuous mode [ 1442.723219][T20003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1442.734543][T20003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1442.761929][T20003] team0: Port device team_slave_0 added [ 1442.770038][T20003] team0: Port device team_slave_1 added [ 1442.788386][T20003] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1442.795332][T20003] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1442.822963][T20003] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1442.835256][T20003] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1442.842387][T20003] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1442.869131][T20003] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1442.897343][T20003] device hsr_slave_0 entered promiscuous mode [ 1442.904110][T20003] device hsr_slave_1 entered promiscuous mode [ 1442.986230][T20003] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.993330][T20003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1443.000720][T20003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1443.007992][T20003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1443.062508][T20003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1443.075840][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1443.084868][T19716] bridge0: port 1(bridge_slave_0) entered disabled state [ 1443.093027][T19716] bridge0: port 2(bridge_slave_1) entered disabled state [ 1443.102289][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1443.116510][T20003] 8021q: adding VLAN 0 to HW filter on device team0 [ 1443.129805][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1443.138451][T19317] bridge0: port 1(bridge_slave_0) entered blocking state [ 1443.145502][T19317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1443.167732][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1443.176127][T16142] bridge0: port 2(bridge_slave_1) entered blocking state [ 1443.183239][T16142] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1443.208767][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1443.219380][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1443.227826][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1443.236017][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1443.245432][T20003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1443.260452][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1443.280447][T20003] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1443.289331][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1443.296788][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1443.315831][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1443.337943][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1443.346480][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1443.355112][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1443.365509][T20003] device veth0_vlan entered promiscuous mode [ 1443.382434][T20003] device veth1_vlan entered promiscuous mode [ 1443.404276][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1443.412370][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1443.420900][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1443.435030][T20003] device veth0_macvtap entered promiscuous mode [ 1443.445299][T20003] device veth1_macvtap entered promiscuous mode [ 1443.462664][T20003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.474092][T20003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.484778][T20003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.495993][T20003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.505936][T20003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.517260][T20003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.527358][T20003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.538139][T20003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.552140][T20003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1443.562750][T20003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.575816][T20003] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1443.585495][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1443.596712][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1443.609212][T20003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.620701][T20003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.630649][T20003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.641189][T20003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.651145][T20003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.661627][T20003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.673161][T20003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.684251][T20003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.698647][T20003] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1443.709205][T20003] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1443.720700][T20003] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1443.730603][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1443.739428][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1444.008637][ T5169] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1444.017401][ T5169] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1444.191516][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1444.214564][ T5772] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1444.222899][ T5772] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1444.235065][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1444.282073][T20010] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:56:35 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xfcffffff00000000) 10:56:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000006c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20600000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:35 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xfc000000) 10:56:35 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x0, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:35 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1444.557672][T19716] Bluetooth: hci4: command 0x0409 tx timeout 10:56:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20680000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:35 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x0, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000116c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1444.653447][T20015] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1444.668159][T20018] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1444.681235][T20018] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:56:35 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xfe800000) [ 1444.802698][T20025] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a206c0000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:35 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000074000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1445.008890][T20034] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1446.439599][ T3706] device hsr_slave_0 left promiscuous mode [ 1446.445936][ T3706] device hsr_slave_1 left promiscuous mode [ 1446.452734][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1446.460432][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1446.470618][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1446.482036][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1446.491473][ T3706] device bridge_slave_1 left promiscuous mode [ 1446.497901][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1446.506186][ T3706] device bridge_slave_0 left promiscuous mode [ 1446.512751][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1446.528029][ T3706] device veth1_macvtap left promiscuous mode [ 1446.534086][ T3706] device veth0_macvtap left promiscuous mode [ 1446.544148][ T3706] device veth1_vlan left promiscuous mode [ 1446.550992][ T3706] device veth0_vlan left promiscuous mode [ 1446.733019][ T3706] team0 (unregistering): Port device team_slave_1 removed [ 1446.751151][ T3706] team0 (unregistering): Port device team_slave_0 removed [ 1446.768281][ T3706] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1446.784497][ T3706] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1446.852801][ T3706] bond0 (unregistering): Released all slaves [ 1450.627151][ T3638] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1453.278437][ T3627] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1453.286746][ T3627] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1453.295337][ T3627] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1453.303931][ T3627] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1453.312806][ T3627] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1453.320276][ T3627] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1453.405827][T20041] chnl_net:caif_netlink_parms(): no params data found [ 1453.455308][T20041] bridge0: port 1(bridge_slave_0) entered blocking state [ 1453.462505][T20041] bridge0: port 1(bridge_slave_0) entered disabled state [ 1453.471191][T20041] device bridge_slave_0 entered promiscuous mode [ 1453.480202][T20041] bridge0: port 2(bridge_slave_1) entered blocking state [ 1453.487731][T20041] bridge0: port 2(bridge_slave_1) entered disabled state [ 1453.495528][T20041] device bridge_slave_1 entered promiscuous mode [ 1453.521228][T20041] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1453.532334][T20041] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1453.560479][T20041] team0: Port device team_slave_0 added [ 1453.568630][T20041] team0: Port device team_slave_1 added [ 1453.590244][T20041] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1453.597331][T20041] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1453.624101][T20041] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1453.636287][T20041] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1453.646776][T20041] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1453.673275][T20041] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1453.704452][T20041] device hsr_slave_0 entered promiscuous mode [ 1453.711315][T20041] device hsr_slave_1 entered promiscuous mode [ 1453.793159][T20041] bridge0: port 2(bridge_slave_1) entered blocking state [ 1453.800249][T20041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1453.807672][T20041] bridge0: port 1(bridge_slave_0) entered blocking state [ 1453.814740][T20041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1453.865440][T20041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1453.880334][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1453.890101][T15753] bridge0: port 1(bridge_slave_0) entered disabled state [ 1453.898365][T15753] bridge0: port 2(bridge_slave_1) entered disabled state [ 1453.906460][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1453.924802][T20041] 8021q: adding VLAN 0 to HW filter on device team0 [ 1453.935460][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1453.944465][T15753] bridge0: port 1(bridge_slave_0) entered blocking state [ 1453.951557][T15753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1453.963011][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1453.971968][T19716] bridge0: port 2(bridge_slave_1) entered blocking state [ 1453.979218][T19716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1454.002638][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1454.012549][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1454.026645][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1454.043724][T20041] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1454.054383][T20041] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1454.070821][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1454.079879][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1454.095829][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1454.111461][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1454.119698][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1454.132900][T20041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1454.150701][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1454.171576][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1454.179932][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1454.188024][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1454.199441][T20041] device veth0_vlan entered promiscuous mode [ 1454.212841][T20041] device veth1_vlan entered promiscuous mode [ 1454.237537][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1454.245750][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1454.254511][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1454.266234][T20041] device veth0_macvtap entered promiscuous mode [ 1454.276331][T20041] device veth1_macvtap entered promiscuous mode [ 1454.291767][T20041] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1454.302826][T20041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1454.313632][T20041] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1454.325256][T20041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1454.335354][T20041] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1454.346148][T20041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1454.356090][T20041] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1454.366609][T20041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1454.377708][T20041] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1454.388511][T20041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1454.401993][T20041] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1454.412276][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1454.425394][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1454.435164][T20041] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1454.446423][T20041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1454.456595][T20041] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1454.467266][T20041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1454.477118][T20041] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1454.487597][T20041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1454.497503][T20041] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1454.508048][T20041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1454.517928][T20041] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1454.529853][T20041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1454.544531][T20041] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1454.553701][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1454.562567][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1454.804924][ T5169] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1454.813318][ T5169] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1454.980759][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1455.004513][ T5773] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1455.012776][ T5773] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1455.023843][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1455.075384][T20047] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:56:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20740000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:45 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xfec00000) 10:56:45 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xfeffffff00000000) 10:56:45 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:45 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:45 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000007a000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1455.347681][ T6979] Bluetooth: hci4: command 0x0409 tx timeout [ 1455.433803][T20054] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1455.465120][T20053] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:56:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a207a0000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:46 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xff000000) [ 1455.476260][T20053] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:56:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000182000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20880000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:46 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xffffa200) [ 1455.646682][T20066] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20a80000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:46 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xfffffdef) 10:56:46 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000088000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1455.882838][T20075] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1456.432196][T20055] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1456.444085][T20055] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1457.405538][ T10] device hsr_slave_0 left promiscuous mode [ 1457.416592][ T10] device hsr_slave_1 left promiscuous mode [ 1457.423544][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1457.431657][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1457.441098][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1457.450540][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1457.459993][ T10] device bridge_slave_1 left promiscuous mode [ 1457.466149][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1457.475378][ T10] device bridge_slave_0 left promiscuous mode [ 1457.485649][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1457.499601][ T10] device veth1_macvtap left promiscuous mode [ 1457.505724][ T10] device veth0_macvtap left promiscuous mode [ 1457.512283][ T10] device veth1_vlan left promiscuous mode [ 1457.521261][ T10] device veth0_vlan left promiscuous mode [ 1457.698725][ T10] team0 (unregistering): Port device team_slave_1 removed [ 1457.715764][ T10] team0 (unregistering): Port device team_slave_0 removed [ 1457.731715][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1457.748154][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1457.815198][ T10] bond0 (unregistering): Released all slaves [ 1459.518623][ T3627] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1459.527657][ T3627] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1459.535410][ T3627] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1459.545006][ T3627] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1459.553144][ T3627] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1459.560894][ T3627] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1459.650458][T20078] chnl_net:caif_netlink_parms(): no params data found [ 1459.695422][T20078] bridge0: port 1(bridge_slave_0) entered blocking state [ 1459.702645][T20078] bridge0: port 1(bridge_slave_0) entered disabled state [ 1459.710752][T20078] device bridge_slave_0 entered promiscuous mode [ 1459.719816][T20078] bridge0: port 2(bridge_slave_1) entered blocking state [ 1459.726935][T20078] bridge0: port 2(bridge_slave_1) entered disabled state [ 1459.734917][T20078] device bridge_slave_1 entered promiscuous mode [ 1459.761045][T20078] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1459.774594][T20078] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1459.802946][T20078] team0: Port device team_slave_0 added [ 1459.811267][T20078] team0: Port device team_slave_1 added [ 1459.830007][T20078] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1459.837093][T20078] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1459.863538][T20078] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1459.875557][T20078] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1459.883201][T20078] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1459.915573][T20078] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1459.944503][T20078] device hsr_slave_0 entered promiscuous mode [ 1459.952040][T20078] device hsr_slave_1 entered promiscuous mode [ 1460.032904][T20078] bridge0: port 2(bridge_slave_1) entered blocking state [ 1460.040021][T20078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1460.047341][T20078] bridge0: port 1(bridge_slave_0) entered blocking state [ 1460.054412][T20078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1460.106133][T20078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1460.123259][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1460.134022][ T3698] bridge0: port 1(bridge_slave_0) entered disabled state [ 1460.142362][ T3698] bridge0: port 2(bridge_slave_1) entered disabled state [ 1460.151376][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1460.166442][T20078] 8021q: adding VLAN 0 to HW filter on device team0 [ 1460.177652][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1460.186035][ T6979] bridge0: port 1(bridge_slave_0) entered blocking state [ 1460.193121][ T6979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1460.220120][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1460.229063][ T3698] bridge0: port 2(bridge_slave_1) entered blocking state [ 1460.236128][ T3698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1460.245976][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1460.255116][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1460.271520][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1460.279727][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1460.292860][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1460.304879][T20078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1460.322658][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1460.330966][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1460.342751][T20078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1460.364212][ T3698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1460.384953][T20078] device veth0_vlan entered promiscuous mode [ 1460.394737][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1460.403373][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1460.412448][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1460.425274][T20078] device veth1_vlan entered promiscuous mode [ 1460.449502][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1460.458226][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1460.468130][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1460.479366][T20078] device veth0_macvtap entered promiscuous mode [ 1460.493274][T20078] device veth1_macvtap entered promiscuous mode [ 1460.509912][T20078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1460.521061][T20078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1460.531149][T20078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1460.543477][T20078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1460.553454][T20078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1460.565172][T20078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1460.575063][T20078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1460.585764][T20078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1460.597526][T20078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1460.608168][T20078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1460.620019][T20078] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1460.632632][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1460.643062][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1460.654466][T20078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1460.665524][T20078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1460.676823][T20078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1460.687376][T20078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1460.697971][T20078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1460.709333][T20078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1460.719404][T20078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1460.730203][T20078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1460.740298][T20078] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1460.754657][T20078] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1460.767834][T20078] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1460.777148][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1460.785796][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1461.044308][ T3706] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1461.058212][ T3706] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1461.216452][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1461.241093][ T5169] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1461.249266][ T5169] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1461.260061][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1461.310707][T20084] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:56:52 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xff0f000000000000) 10:56:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20f00000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:52 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xffffff7f) 10:56:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000a8000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:52 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:52 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1461.587547][ T6979] Bluetooth: hci4: command 0x0409 tx timeout [ 1461.668873][T20091] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1461.685356][T20088] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:56:52 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xffffff8d) 10:56:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a202b0100000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1461.719581][T20088] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:56:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000f0000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:52 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xfffffff5) [ 1461.859831][T20102] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:56:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000300000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:52 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000c20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1462.652565][T20092] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1462.670818][T20092] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1463.640186][ T5184] device hsr_slave_0 left promiscuous mode [ 1463.646491][ T5184] device hsr_slave_1 left promiscuous mode [ 1463.654601][ T5184] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1463.662286][ T5184] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1463.671737][ T5184] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1463.680590][ T5184] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1463.690014][ T5184] device bridge_slave_1 left promiscuous mode [ 1463.696169][ T5184] bridge0: port 2(bridge_slave_1) entered disabled state [ 1463.705341][ T5184] device bridge_slave_0 left promiscuous mode [ 1463.711833][ T5184] bridge0: port 1(bridge_slave_0) entered disabled state [ 1463.729291][ T5184] device veth1_macvtap left promiscuous mode [ 1463.735310][ T5184] device veth0_macvtap left promiscuous mode [ 1463.742037][ T5184] device veth1_vlan left promiscuous mode [ 1463.748380][ T5184] device veth0_vlan left promiscuous mode [ 1463.931887][ T5184] team0 (unregistering): Port device team_slave_1 removed [ 1463.946094][ T5184] team0 (unregistering): Port device team_slave_0 removed [ 1463.962106][ T5184] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1463.975909][ T5184] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1464.044486][ T5184] bond0 (unregistering): Released all slaves [ 1465.838826][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1465.847376][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1465.854962][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1465.863223][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1465.871242][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1465.878623][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1465.970623][T20112] chnl_net:caif_netlink_parms(): no params data found [ 1466.018915][T20112] bridge0: port 1(bridge_slave_0) entered blocking state [ 1466.026704][T20112] bridge0: port 1(bridge_slave_0) entered disabled state [ 1466.035278][T20112] device bridge_slave_0 entered promiscuous mode [ 1466.043375][T20112] bridge0: port 2(bridge_slave_1) entered blocking state [ 1466.050647][T20112] bridge0: port 2(bridge_slave_1) entered disabled state [ 1466.061567][T20112] device bridge_slave_1 entered promiscuous mode [ 1466.085329][T20112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1466.098526][T20112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1466.125861][T20112] team0: Port device team_slave_0 added [ 1466.133305][T20112] team0: Port device team_slave_1 added [ 1466.155875][T20112] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1466.162861][T20112] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1466.188817][T20112] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1466.202562][T20112] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1466.209604][T20112] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1466.235684][T20112] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1466.266388][T20112] device hsr_slave_0 entered promiscuous mode [ 1466.273338][T20112] device hsr_slave_1 entered promiscuous mode [ 1466.350955][T20112] bridge0: port 2(bridge_slave_1) entered blocking state [ 1466.358047][T20112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1466.365324][T20112] bridge0: port 1(bridge_slave_0) entered blocking state [ 1466.372513][T20112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1466.428344][T20112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1466.443213][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1466.451921][T19317] bridge0: port 1(bridge_slave_0) entered disabled state [ 1466.460376][T19317] bridge0: port 2(bridge_slave_1) entered disabled state [ 1466.469433][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1466.484807][T20112] 8021q: adding VLAN 0 to HW filter on device team0 [ 1466.498463][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1466.508137][T19716] bridge0: port 1(bridge_slave_0) entered blocking state [ 1466.515208][T19716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1466.537967][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1466.546420][T19317] bridge0: port 2(bridge_slave_1) entered blocking state [ 1466.553501][T19317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1466.563348][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1466.572815][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1466.584393][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1466.600957][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1466.617827][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1466.629105][T20112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1466.645938][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1466.653649][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1466.668272][T20112] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1466.683178][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1466.704017][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1466.714008][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1466.722387][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1466.734835][T20112] device veth0_vlan entered promiscuous mode [ 1466.746238][T20112] device veth1_vlan entered promiscuous mode [ 1466.766878][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1466.775258][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1466.784264][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1466.795525][T20112] device veth0_macvtap entered promiscuous mode [ 1466.807336][T20112] device veth1_macvtap entered promiscuous mode [ 1466.828843][T20112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1466.840253][T20112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.850748][T20112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1466.861481][T20112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.871612][T20112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1466.883322][T20112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.893323][T20112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1466.903923][T20112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.914588][T20112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1466.925226][T20112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.938715][T20112] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1466.947147][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1466.958269][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1466.970483][T20112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1466.981769][T20112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1466.991961][T20112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1467.006034][T20112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1467.017588][T20112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1467.028547][T20112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1467.038724][T20112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1467.049472][T20112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1467.059724][T20112] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1467.070664][T20112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1467.082005][T20112] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1467.092043][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1467.100943][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1467.348270][ T5169] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1467.357326][ T5169] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1467.540291][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1467.563844][ T3706] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1467.572045][ T3706] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1467.583002][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1467.632882][T20118] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:56:58 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xffffffff00000000) 10:56:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000500000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:58 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x10000000000) 10:56:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000002520000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:58 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:58 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1467.917337][ T6979] Bluetooth: hci4: command 0x0409 tx timeout 10:56:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000004020000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1468.024129][T20127] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:56:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000600000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1468.065464][T20127] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:56:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000006720000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000700000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:58 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000169520000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000900000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1469.005509][T20121] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1469.022520][T20121] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:56:59 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0xfffffffffffff000) 10:56:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000023fa520000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000b00000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:56:59 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x4000000000000) 10:56:59 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:59 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:56:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000002000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1469.353857][T20149] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:56:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000c00000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1469.417587][T20149] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1469.536722][T20158] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20270d00000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:00 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x0) syz_80211_inject_frame(&(0x7f0000000000)=@broadcast, &(0x7f0000000040)=@ctrl_frame=@bar={{}, {0x20}, @device_a, @device_b, @compressed={{0x0, 0x0, 0x1, 0x0, 0x9}, {0x2, 0x40}}}, 0x14) 10:57:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000e00000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000003000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1469.849313][T20167] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000f00000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000004000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:00 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x10000000000000) [ 1469.987309][ T20] Bluetooth: hci4: command 0x041b tx timeout 10:57:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20001200000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1470.092077][T20173] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:01 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1470.605912][T20154] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1470.617630][T20154] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:57:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000005000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20001400000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:01 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x40030000000000) 10:57:01 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:01 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x0) (async) syz_80211_inject_frame(&(0x7f0000000000)=@broadcast, &(0x7f0000000040)=@ctrl_frame=@bar={{}, {0x20}, @device_a, @device_b, @compressed={{0x0, 0x0, 0x1, 0x0, 0x9}, {0x2, 0x40}}}, 0x14) [ 1470.887268][T20179] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1470.895640][T20179] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1470.975992][T20181] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20001600000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000006000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20001800000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20001900000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1471.251129][T20198] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000007000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20001f00000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:02 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:02 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000008000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20002000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:02 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0xa2ffff00000000) [ 1471.844219][T20192] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1472.070269][ T20] Bluetooth: hci4: command 0x040f tx timeout [ 1472.505378][T20214] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:57:03 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1473.331745][T20218] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1473.350587][T20218] __nla_validate_parse: 4 callbacks suppressed [ 1473.350648][T20218] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1474.034282][ T10] device hsr_slave_0 left promiscuous mode [ 1474.041008][ T10] device hsr_slave_1 left promiscuous mode [ 1474.047604][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1474.055039][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1474.064120][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1474.077123][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1474.086194][ T10] device bridge_slave_1 left promiscuous mode [ 1474.093158][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1474.104336][ T10] device bridge_slave_0 left promiscuous mode [ 1474.110904][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1474.127411][ T10] device veth1_macvtap left promiscuous mode [ 1474.133415][ T10] device veth0_macvtap left promiscuous mode [ 1474.139900][ T10] device veth1_vlan left promiscuous mode [ 1474.145736][ T10] device veth0_vlan left promiscuous mode [ 1474.329448][ T10] team0 (unregistering): Port device team_slave_1 removed [ 1474.344910][ T10] team0 (unregistering): Port device team_slave_0 removed [ 1474.358880][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1474.373366][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1474.444669][ T10] bond0 (unregistering): Released all slaves [ 1475.685650][ T3627] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1475.694486][ T3627] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1475.702767][ T3627] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1475.710595][ T3627] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1475.718992][ T3627] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1475.727831][ T3627] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1475.816156][T20221] chnl_net:caif_netlink_parms(): no params data found [ 1475.863832][T20221] bridge0: port 1(bridge_slave_0) entered blocking state [ 1475.874416][T20221] bridge0: port 1(bridge_slave_0) entered disabled state [ 1475.882825][T20221] device bridge_slave_0 entered promiscuous mode [ 1475.892998][T20221] bridge0: port 2(bridge_slave_1) entered blocking state [ 1475.900250][T20221] bridge0: port 2(bridge_slave_1) entered disabled state [ 1475.908592][T20221] device bridge_slave_1 entered promiscuous mode [ 1475.931803][T20221] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1475.942815][T20221] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1475.971789][T20221] team0: Port device team_slave_0 added [ 1475.980814][T20221] team0: Port device team_slave_1 added [ 1476.002746][T20221] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1476.010560][T20221] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1476.037780][T20221] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1476.051093][T20221] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1476.058263][T20221] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1476.084714][T20221] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1476.115265][T20221] device hsr_slave_0 entered promiscuous mode [ 1476.122545][T20221] device hsr_slave_1 entered promiscuous mode [ 1476.250277][T20221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1476.265649][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1476.273914][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1476.284141][T20221] 8021q: adding VLAN 0 to HW filter on device team0 [ 1476.295460][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1476.304729][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1476.314264][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 1476.321401][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1476.330751][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1476.345077][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1476.355117][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1476.363741][T19716] bridge0: port 2(bridge_slave_1) entered blocking state [ 1476.370828][T19716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1476.378885][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1476.400472][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1476.409196][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1476.419434][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1476.428972][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1476.438967][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1476.447495][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1476.456042][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1476.472303][T20221] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1476.483460][T20221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1476.492490][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1476.511851][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1476.519473][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1476.536670][T20221] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1476.555123][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1476.578461][T20221] device veth0_vlan entered promiscuous mode [ 1476.585191][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1476.593795][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1476.601817][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1476.614499][T20221] device veth1_vlan entered promiscuous mode [ 1476.635912][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1476.646248][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1476.654975][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1476.666222][T20221] device veth0_macvtap entered promiscuous mode [ 1476.677368][T20221] device veth1_macvtap entered promiscuous mode [ 1476.694968][T20221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1476.705547][T20221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1476.717425][T20221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1476.727907][T20221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1476.738013][T20221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1476.749402][T20221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1476.759229][T20221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1476.769999][T20221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1476.779879][T20221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1476.790387][T20221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1476.803426][T20221] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1476.814069][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1476.823463][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1476.834611][T20221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1476.845392][T20221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1476.856738][T20221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1476.868823][T20221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1476.878725][T20221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1476.889235][T20221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1476.899538][T20221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1476.910641][T20221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1476.925018][T20221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1476.935746][T20221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1476.950605][T20221] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1476.961642][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1477.208162][ T5169] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1477.216367][ T5169] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1477.393205][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1477.413701][ T5169] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1477.422412][ T5169] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1477.433023][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1477.484415][T20227] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1477.484840][T20228] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1477.747379][T19317] Bluetooth: hci4: command 0x0409 tx timeout 10:57:08 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x0) syz_80211_inject_frame(&(0x7f0000000000)=@broadcast, &(0x7f0000000040)=@ctrl_frame=@bar={{}, {0x20}, @device_a, @device_b, @compressed={{0x0, 0x0, 0x1, 0x0, 0x9}, {0x2, 0x40}}}, 0x14) syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x0) (async) syz_80211_inject_frame(&(0x7f0000000000)=@broadcast, &(0x7f0000000040)=@ctrl_frame=@bar={{}, {0x20}, @device_a, @device_b, @compressed={{0x0, 0x0, 0x1, 0x0, 0x9}, {0x2, 0x40}}}, 0x14) (async) 10:57:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200d2700000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000009000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:08 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x100000000000000) 10:57:08 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:08 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20012b00000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1477.871126][T20238] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1477.880283][T20236] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:57:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000a000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1477.923672][T20236] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:57:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20004000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1478.089163][T20249] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20004800000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000b000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1478.291008][T20251] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20004c00000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1478.856175][T20233] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1478.875054][T20233] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:57:09 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0)=@device_b, 0x0, 0xfffffffffffffce7) 10:57:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20006000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:09 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x103000000000000) 10:57:09 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:09 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1479.166614][T20257] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1479.173900][T20262] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:57:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20006800000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1479.233761][T20262] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:57:09 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000e000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20006c00000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1479.340757][T20270] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000000f000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:10 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0)=@device_b, 0x0, 0xfffffffffffffce7) syz_80211_inject_frame(&(0x7f00000000c0)=@device_b, 0x0, 0xfffffffffffffce7) (async) 10:57:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20007400000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1479.587558][T20275] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000012000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20007a00000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:10 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x200000000000000) [ 1479.756472][T20281] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000014000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1479.827473][T15753] Bluetooth: hci4: command 0x041b tx timeout [ 1479.927344][T20287] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1480.408971][T20267] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1480.425000][T20267] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:57:11 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20008800000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:11 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0)=@device_b, 0x0, 0xfffffffffffffce7) 10:57:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000016000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:11 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x300000000000000) 10:57:11 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1480.689649][T20291] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1480.728070][T20294] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:57:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2000a800000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1480.756739][T20294] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:57:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000018000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a2000f000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000019000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:11 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x0) syz_80211_inject_frame(&(0x7f0000000000), &(0x7f0000000080)=ANY=[@ANYBLOB="0000f70000000000000000"], 0xa) 10:57:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20ffffe0000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1481.695464][T20299] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:57:12 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000048000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20fffff0000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:12 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x400000000000000) 10:57:12 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1481.907612][T15753] Bluetooth: hci4: command 0x040f tx timeout [ 1481.929324][T20310] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 10:57:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000004c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1482.022542][T20321] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:57:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000010a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000060000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000020a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:12 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x0) syz_80211_inject_frame(&(0x7f0000000000), &(0x7f0000000080)=ANY=[@ANYBLOB="0000f70000000000000000"], 0xa) syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x0) (async) syz_80211_inject_frame(&(0x7f0000000000), &(0x7f0000000080)=ANY=[@ANYBLOB="0000f70000000000000000"], 0xa) (async) 10:57:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000030a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:12 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000068000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1482.988679][T20322] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:57:13 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000040a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000006c000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:13 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x500000000000000) 10:57:13 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000050a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1483.334530][T20347] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:57:13 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000074000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000060a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000070a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1483.987050][T15753] Bluetooth: hci4: command 0x0419 tx timeout [ 1484.159372][ T1225] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.165680][ T1225] ieee802154 phy1 wpan1: encryption failed: -22 [ 1484.322332][T20349] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1484.350186][T20349] __nla_validate_parse: 19 callbacks suppressed [ 1484.350207][T20349] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1485.436078][ T5169] device hsr_slave_0 left promiscuous mode [ 1485.442909][ T5169] device hsr_slave_1 left promiscuous mode [ 1485.451712][ T5169] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1485.459332][ T5169] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1485.470214][ T5169] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1485.477684][ T5169] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1485.486232][ T5169] device bridge_slave_1 left promiscuous mode [ 1485.492509][ T5169] bridge0: port 2(bridge_slave_1) entered disabled state [ 1485.501899][ T5169] device bridge_slave_0 left promiscuous mode [ 1485.510165][ T5169] bridge0: port 1(bridge_slave_0) entered disabled state [ 1485.524355][ T5169] device veth1_macvtap left promiscuous mode [ 1485.530555][ T5169] device veth0_macvtap left promiscuous mode [ 1485.536622][ T5169] device veth1_vlan left promiscuous mode [ 1485.542661][ T5169] device veth0_vlan left promiscuous mode [ 1485.730931][ T5169] team0 (unregistering): Port device team_slave_1 removed [ 1485.747511][ T5169] team0 (unregistering): Port device team_slave_0 removed [ 1485.765600][ T5169] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1485.781331][ T5169] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1485.852580][ T5169] bond0 (unregistering): Released all slaves [ 1487.275144][ T3627] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1487.285331][ T3627] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1487.294111][ T3627] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1487.301730][ T3627] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1487.309348][ T3627] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1487.316477][ T3627] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1487.410416][T20360] chnl_net:caif_netlink_parms(): no params data found [ 1487.454087][T20360] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.461506][T20360] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.469658][T20360] device bridge_slave_0 entered promiscuous mode [ 1487.478997][T20360] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.486067][T20360] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.494146][T20360] device bridge_slave_1 entered promiscuous mode [ 1487.522222][T20360] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1487.533615][T20360] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1487.560070][T20360] team0: Port device team_slave_0 added [ 1487.569022][T20360] team0: Port device team_slave_1 added [ 1487.590202][T20360] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1487.598080][T20360] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1487.624079][T20360] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1487.637216][T20360] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1487.644262][T20360] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1487.670570][T20360] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1487.703182][T20360] device hsr_slave_0 entered promiscuous mode [ 1487.709924][T20360] device hsr_slave_1 entered promiscuous mode [ 1487.793317][T20360] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.800414][T20360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1487.807733][T20360] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.814789][T20360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1487.871118][T20360] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1487.885804][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1487.894702][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.903179][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.913153][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1487.927292][T20360] 8021q: adding VLAN 0 to HW filter on device team0 [ 1487.938603][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1487.947211][T19317] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.954846][T19317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1487.971553][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1487.980119][T19317] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.987201][T19317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1488.009032][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1488.018861][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1488.031956][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1488.043910][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1488.056570][T20360] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1488.071628][T20360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1488.081044][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1488.098891][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1488.106313][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1488.121493][T20360] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1488.141189][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1488.162812][T20360] device veth0_vlan entered promiscuous mode [ 1488.171121][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1488.179847][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1488.188807][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1488.203633][T20360] device veth1_vlan entered promiscuous mode [ 1488.226653][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1488.235995][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1488.244878][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1488.255407][T20360] device veth0_macvtap entered promiscuous mode [ 1488.265716][T20360] device veth1_macvtap entered promiscuous mode [ 1488.283570][T20360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1488.294156][T20360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1488.304396][T20360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1488.316847][T20360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1488.327217][T20360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1488.337698][T20360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1488.347641][T20360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1488.358905][T20360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1488.369261][T20360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1488.379915][T20360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1488.393207][T20360] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1488.403624][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1488.413289][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1488.424613][T20360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1488.439535][T20360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1488.449627][T20360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1488.460166][T20360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1488.470117][T20360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1488.481355][T20360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1488.491281][T20360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1488.501717][T20360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1488.511799][T20360] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1488.523166][T20360] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1488.534953][T20360] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1488.543308][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1488.552841][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1488.814230][ T3706] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1488.831935][ T3706] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1489.008841][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1489.033617][ T5773] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1489.043350][ T5773] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1489.053273][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1489.096903][T20366] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1489.117512][T20366] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1489.138750][T20366] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1489.347437][ T20] Bluetooth: hci4: command 0x0409 tx timeout 10:57:19 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x0) (async) syz_80211_inject_frame(&(0x7f0000000000), &(0x7f0000000080)=ANY=[@ANYBLOB="0000f70000000000000000"], 0xa) 10:57:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000100001000000000000000000007a000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000080a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:19 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x600000000000000) 10:57:19 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:19 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 1489.492186][T20374] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1489.501853][T20376] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1489.563345][T20375] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 1489.568386][T20379] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1489.601669][T20375] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.2'. 10:57:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000088000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000090a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1489.754609][T20382] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1489.790412][T20384] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 10:57:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000000b0a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000a8000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1490.068704][T20387] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1490.078805][T20388] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 10:57:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000000c0a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000f0000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1490.273346][T20390] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1490.302423][T20392] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1490.675295][T20377] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1490.683758][T20377] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.5'. 10:57:21 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x0) syz_80211_inject_frame(&(0x7f0000000040)=@device_b, &(0x7f0000000080)=ANY=[@ANYBLOB="f4ffe6000802a4cb00000a020d00ff00"], 0x10) syz_80211_inject_frame(&(0x7f0000000000), &(0x7f0000000100)=@mgmt_frame=@reassoc_resp={@wo_ht={{}, {0xff}, @device_b, @device_a, @from_mac, {0x2, 0xdd0}}, 0x0, 0x3c, @random=0x9, @void, @val={0x2d, 0x1a, {0x80, 0x2, 0x6, 0x0, {0x9, 0x0, 0x0, 0x11e, 0x0, 0x1, 0x0, 0x1}, 0x8, 0xffffffff}}, [{0xdd, 0x20, "e58528dd65c6b30047e6d1766fd02af8fdd258efa321db7d02987eca92d46554"}, {0xdd, 0x99, "b362e1f8f6ac818084767cdc45c1ad57a8f730dd63e8f2f90c81ad3adf35ff937c6b843293b0fc8d731a9980c3fb7de5802e392085c6bff9972774b652aa790820f1ac9cff0ef990549605b9c22f39811d3e98164b7d78dd64fa448c292b87ea26534306cf9aa39b1d043e84d0c7a422778fe3f4926771834290796904b829460236d12dd80f9fa53767c668a311a5eea63838d105ea29e263"}, {0xdd, 0x19, "dec00918359400ad7682b11d368b6e80bc9b05826528d1938e"}, {0xdd, 0xc8, "04ccc5152f754af16e6c7cc660c2b2113df4c4a354332079126f282b40ab1107defa0bab33f60e9dd632733b79d8c432698fdd7f7332d011d2e0a85a758d669a8af2d58cd91f4c86a5710cb3f0964d4de5251efbad7cb9b1fbe76e7b2027c3dc93099f13c011ae92ceaad0c4d15920188ef840496f644d96da38bb3c2ac0f1fefa6c6bb0741e3e105e4a9a87229e2bceb173c32fbc9af3736c05bf8cef8fc8637ce08ea5727ae950a6aacde6dee8b92c2cafc3c0eb115579848bac072dbfac7753fc2dc128a3c53d"}, {0xdd, 0x7c, "4099ec9226582afb33c42710badd54ad9148655a1f9e61b5af2cec81ade576c1bcab546d80898e4c248b075a4726009bfed07dd570df939f5a39826a7c8ca97d330f71b2e6a0c64ad2283a954c0b5df7b05c60a7beee811894d2e58fb93326062b1fb3ecdc6821a7970302786c1e9990071ca319cf140127605c1522"}, {0xdd, 0xcd, "fa1153e8db6ebfd7bd1d891c987d1a4510d96cf84214794373b51dac3025dbaf91485da4b4e0b674cd1fbe2219b56d03e53dcbea0fa918f0707d2ff48c2bfca1ebbc841191686dca9764ae46772eb38026178abb1df56086d918908666a6d64dfdb53871104cdaf8bcd36620d29247d68731ced1e2c6addaeaa2f6eba5d1e408be40b8294d1f92ed7df0bca588456b4782710759e5294dcde14ddd3d2f31ab8af1aca041f6afb5a41b77de656d9fec7e8c0c392432d17ace1b754f13f1819a6a076a987318f2741e186f21dea4"}]}, 0x329) 10:57:21 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x700000000000000) 10:57:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000082010a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000000e0a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:21 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:21 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000030a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000000f0a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1491.061736][T20402] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1491.084094][T20400] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:57:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000050a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000120a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000060a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000140a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1491.427408][ T20] Bluetooth: hci4: command 0x041b tx timeout [ 1491.998096][T20405] netlink: 'syz-executor.5': attribute type 11 has an invalid length. 10:57:22 executing program 4: syz_80211_inject_frame(&(0x7f00000000c0), 0x0, 0x0) (async, rerun: 64) syz_80211_inject_frame(&(0x7f0000000040)=@device_b, &(0x7f0000000080)=ANY=[@ANYBLOB="f4ffe6000802a4cb00000a020d00ff00"], 0x10) (async, rerun: 64) syz_80211_inject_frame(&(0x7f0000000000), &(0x7f0000000100)=@mgmt_frame=@reassoc_resp={@wo_ht={{}, {0xff}, @device_b, @device_a, @from_mac, {0x2, 0xdd0}}, 0x0, 0x3c, @random=0x9, @void, @val={0x2d, 0x1a, {0x80, 0x2, 0x6, 0x0, {0x9, 0x0, 0x0, 0x11e, 0x0, 0x1, 0x0, 0x1}, 0x8, 0xffffffff}}, [{0xdd, 0x20, "e58528dd65c6b30047e6d1766fd02af8fdd258efa321db7d02987eca92d46554"}, {0xdd, 0x99, "b362e1f8f6ac818084767cdc45c1ad57a8f730dd63e8f2f90c81ad3adf35ff937c6b843293b0fc8d731a9980c3fb7de5802e392085c6bff9972774b652aa790820f1ac9cff0ef990549605b9c22f39811d3e98164b7d78dd64fa448c292b87ea26534306cf9aa39b1d043e84d0c7a422778fe3f4926771834290796904b829460236d12dd80f9fa53767c668a311a5eea63838d105ea29e263"}, {0xdd, 0x19, "dec00918359400ad7682b11d368b6e80bc9b05826528d1938e"}, {0xdd, 0xc8, "04ccc5152f754af16e6c7cc660c2b2113df4c4a354332079126f282b40ab1107defa0bab33f60e9dd632733b79d8c432698fdd7f7332d011d2e0a85a758d669a8af2d58cd91f4c86a5710cb3f0964d4de5251efbad7cb9b1fbe76e7b2027c3dc93099f13c011ae92ceaad0c4d15920188ef840496f644d96da38bb3c2ac0f1fefa6c6bb0741e3e105e4a9a87229e2bceb173c32fbc9af3736c05bf8cef8fc8637ce08ea5727ae950a6aacde6dee8b92c2cafc3c0eb115579848bac072dbfac7753fc2dc128a3c53d"}, {0xdd, 0x7c, "4099ec9226582afb33c42710badd54ad9148655a1f9e61b5af2cec81ade576c1bcab546d80898e4c248b075a4726009bfed07dd570df939f5a39826a7c8ca97d330f71b2e6a0c64ad2283a954c0b5df7b05c60a7beee811894d2e58fb93326062b1fb3ecdc6821a7970302786c1e9990071ca319cf140127605c1522"}, {0xdd, 0xcd, "fa1153e8db6ebfd7bd1d891c987d1a4510d96cf84214794373b51dac3025dbaf91485da4b4e0b674cd1fbe2219b56d03e53dcbea0fa918f0707d2ff48c2bfca1ebbc841191686dca9764ae46772eb38026178abb1df56086d918908666a6d64dfdb53871104cdaf8bcd36620d29247d68731ced1e2c6addaeaa2f6eba5d1e408be40b8294d1f92ed7df0bca588456b4782710759e5294dcde14ddd3d2f31ab8af1aca041f6afb5a41b77de656d9fec7e8c0c392432d17ace1b754f13f1819a6a076a987318f2741e186f21dea4"}]}, 0x329) 10:57:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000070a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000160a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:22 executing program 3: ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0xc0880, 0x10c, 0x1b}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x10}, 0x10) bind$can_raw(r1, &(0x7f00000002c0), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/dev\x00') read$FUSE(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffbfffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmmsg(r3, &(0x7f0000006d00)=[{{0x0, 0x1002002, 0x0}}], 0xc6, 0x800000000000000) 10:57:22 executing program 2: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c653000"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:22 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000200)=""/148, 0x94) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000340), 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xcb, &(0x7f0000000000), 0x3) sendmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="05000000a200"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000a29176039bb3a7fcd3eaaddc"], 0x48}}, 0x0) r2 = dup(r0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r2) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) dup2(r4, 0xffffffffffffffff) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/207, 0xcf) dup3(r3, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2e, 0x8, 0x1, 0x6, 0x0, 0x4, 0x8050, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f, 0x0, @perf_config_ext={0x3f, 0x7}, 0x10, 0x7, 0xbb2e, 0x0, 0x100000000, 0x8, 0x0, 0x0, 0x3ff, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x1) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0x10, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000000580100000180000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="030000e001000000000000202d020000135a99965fa774cd9bcf8dbfe9ffd4a060d7164c41f0ef815263ca86c0bd9fff402fbd1f60c3440146e7c42da0930bf168c590ab69"], 0x80}, 0x1, 0x0, 0x0, 0x240008d0}, 0x40) r5 = socket$kcm(0x10, 0x2, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="000020002efd2f696c"]) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 10:57:22 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000090a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000180a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1492.335665][T20427] netlink: 'syz-executor.2': attribute type 11 has an invalid length. 10:57:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000190a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000a0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1400000010000100000000000000000000000b0a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) 10:57:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a200000001f0a03000000000000000000010000000900010073797a300000000040000000160a01000000000000000000010000000900010073797a30000000000900020073797a3200000000140003800800024000000000080001400000000034000000180a05000000000000000000010000000900020073797a32000000000900010073797a30"], 0xbc}}, 0x0) [ 1493.313601][T20432] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 1493.507191][ T20] Bluetooth: hci4: command 0x040f tx timeout [ 1494.320724][ T5773] device hsr_slave_0 left promiscuous mode [ 1494.337946][ T5773] device hsr_slave_1 left promiscuous mode [ 1494.350078][ T5773] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1494.368980][ T5773] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1494.391002][ T5773] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1494.407918][ T5773] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1494.419581][ T5773] device bridge_slave_1 left promiscuous mode [ 1494.431307][ T5773] bridge0: port 2(bridge_slave_1) entered disabled state [ 1494.449491][ T5773] device bridge_slave_0 left promiscuous mode [ 1494.460776][ T5773] bridge0: port 1(bridge_slave_0) entered disabled state [ 1494.474912][ T5773] device veth1_macvtap left promiscuous mode [ 1494.481427][ T5773] device veth0_macvtap left promiscuous mode [ 1494.489253][ T5773] device veth1_vlan left promiscuous mode [ 1494.495036][ T5773] device veth0_vlan left promiscuous mode [ 1494.675108][ T5773] team0 (unregistering): Port device team_slave_1 removed [ 1494.692869][ T5773] team0 (unregistering): Port device team_slave_0 removed [ 1494.704817][ T5773] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1494.719525][ T5773] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1494.788197][ T5773] bond0 (unregistering): Released all slaves [ 1498.787146][ T3627] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1503.507394][ T3627] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1508.147163][ T3627] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1510.804110][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1510.812955][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1510.820828][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1510.828791][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1510.836213][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1510.844677][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1510.938771][T20456] chnl_net:caif_netlink_parms(): no params data found [ 1510.980697][T20456] bridge0: port 1(bridge_slave_0) entered blocking state [ 1510.989456][T20456] bridge0: port 1(bridge_slave_0) entered disabled state [ 1510.997570][T20456] device bridge_slave_0 entered promiscuous mode [ 1511.005389][T20456] bridge0: port 2(bridge_slave_1) entered blocking state [ 1511.012974][T20456] bridge0: port 2(bridge_slave_1) entered disabled state [ 1511.022898][T20456] device bridge_slave_1 entered promiscuous mode [ 1511.052370][T20456] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1511.063423][T20456] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1511.088310][T20456] team0: Port device team_slave_0 added [ 1511.095677][T20456] team0: Port device team_slave_1 added [ 1511.115678][T20456] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1511.122778][T20456] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1511.150962][T20456] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1511.165190][T20456] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1511.172452][T20456] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1511.198708][T20456] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1511.227785][T20456] device hsr_slave_0 entered promiscuous mode [ 1511.234499][T20456] device hsr_slave_1 entered promiscuous mode [ 1511.314976][T20456] bridge0: port 2(bridge_slave_1) entered blocking state [ 1511.322068][T20456] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1511.329476][T20456] bridge0: port 1(bridge_slave_0) entered blocking state [ 1511.336545][T20456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1511.388177][T20456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1511.400954][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1511.410222][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1511.418886][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1511.427039][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1511.441997][T20456] 8021q: adding VLAN 0 to HW filter on device team0 [ 1511.453049][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1511.466065][T15753] bridge0: port 1(bridge_slave_0) entered blocking state [ 1511.473143][T15753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1511.498620][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1511.507424][ T6979] bridge0: port 2(bridge_slave_1) entered blocking state [ 1511.514494][ T6979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1511.523318][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1511.534697][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1511.543432][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1511.561923][T20456] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1511.572829][T20456] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1511.586050][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1511.595360][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1511.603999][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1511.622909][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1511.630387][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1511.643113][T20456] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1511.661144][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1511.683939][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1511.693039][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1511.701214][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1511.713070][T20456] device veth0_vlan entered promiscuous mode [ 1511.726112][T20456] device veth1_vlan entered promiscuous mode [ 1511.746468][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1511.754934][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1511.763407][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1511.775429][T20456] device veth0_macvtap entered promiscuous mode [ 1511.789930][T20456] device veth1_macvtap entered promiscuous mode [ 1511.807731][T20456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1511.820277][T20456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1511.830427][T20456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1511.840993][T20456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1511.850872][T20456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1511.861919][T20456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1511.872704][T20456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1511.883351][T20456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1511.893363][T20456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1511.904058][T20456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1511.923956][T20456] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1511.935231][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1511.945307][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1511.956739][T20456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1511.967791][T20456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1511.979123][T20456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1511.989908][T20456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1511.999812][T20456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1512.010399][T20456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1512.020257][T20456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1512.030909][T20456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1512.042067][T20456] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1512.055975][T20456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1512.068927][T20456] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1512.079442][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1512.088951][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1512.339471][ T5184] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1512.354644][ T5184] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1512.534371][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1512.560977][ T5773] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1512.571113][ T5773] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1512.582065][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1512.637519][T20463] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.644940][T20462] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.672876][T20462] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.678791][T20463] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.701002][T20462] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.706733][T20463] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.730091][T20463] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.734205][T20462] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.748264][T20463] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.764292][T20462] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.767404][T20463] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1512.874771][T15753] Bluetooth: hci4: command 0x0409 tx timeout [ 1513.525504][ T5169] device hsr_slave_0 left promiscuous mode [ 1513.532604][ T5169] device hsr_slave_1 left promiscuous mode [ 1513.539548][ T5169] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1513.547087][ T5169] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1513.555833][ T5169] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1513.563580][ T5169] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1513.573407][ T5169] device bridge_slave_1 left promiscuous mode [ 1513.581467][ T5169] bridge0: port 2(bridge_slave_1) entered disabled state [ 1513.591347][ T5169] device bridge_slave_0 left promiscuous mode [ 1513.598230][ T5169] bridge0: port 1(bridge_slave_0) entered disabled state [ 1513.615038][ T5169] device veth1_macvtap left promiscuous mode [ 1513.621100][ T5169] device veth0_macvtap left promiscuous mode [ 1513.627323][ T5169] device veth1_vlan left promiscuous mode [ 1513.633095][ T5169] device veth0_vlan left promiscuous mode [ 1513.814379][ T5169] team0 (unregistering): Port device team_slave_1 removed [ 1513.830067][ T5169] team0 (unregistering): Port device team_slave_0 removed [ 1513.842971][ T5169] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1513.859443][ T5169] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1513.932507][ T5169] bond0 (unregistering): Released all slaves [ 1517.747253][ T3627] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1520.395407][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1520.407887][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1520.415507][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1520.423731][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1520.431787][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1520.439236][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1520.525327][T20468] chnl_net:caif_netlink_parms(): no params data found [ 1520.568805][T20468] bridge0: port 1(bridge_slave_0) entered blocking state [ 1520.576332][T20468] bridge0: port 1(bridge_slave_0) entered disabled state [ 1520.584530][T20468] device bridge_slave_0 entered promiscuous mode [ 1520.594041][T20468] bridge0: port 2(bridge_slave_1) entered blocking state [ 1520.601334][T20468] bridge0: port 2(bridge_slave_1) entered disabled state [ 1520.610197][T20468] device bridge_slave_1 entered promiscuous mode [ 1520.638031][T20468] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1520.649891][T20468] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1520.677963][T20468] team0: Port device team_slave_0 added [ 1520.685432][T20468] team0: Port device team_slave_1 added [ 1520.704763][T20468] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1520.711854][T20468] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1520.741292][T20468] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1520.753410][T20468] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1520.760914][T20468] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1520.788885][T20468] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1520.816205][T20468] device hsr_slave_0 entered promiscuous mode [ 1520.823347][T20468] device hsr_slave_1 entered promiscuous mode [ 1520.905383][T20468] bridge0: port 2(bridge_slave_1) entered blocking state [ 1520.912517][T20468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1520.919839][T20468] bridge0: port 1(bridge_slave_0) entered blocking state [ 1520.926882][T20468] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1520.982517][T20468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1520.995567][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1521.004655][T16142] bridge0: port 1(bridge_slave_0) entered disabled state [ 1521.012766][T16142] bridge0: port 2(bridge_slave_1) entered disabled state [ 1521.021621][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1521.035234][T20468] 8021q: adding VLAN 0 to HW filter on device team0 [ 1521.046531][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1521.055139][T16142] bridge0: port 1(bridge_slave_0) entered blocking state [ 1521.062257][T16142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1521.078112][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1521.087450][T19317] bridge0: port 2(bridge_slave_1) entered blocking state [ 1521.094601][T19317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1521.112103][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1521.120695][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1521.134061][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1521.149804][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1521.165921][T20468] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1521.179138][T20468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1521.188523][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1521.208495][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1521.215894][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1521.229580][T20468] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1521.244354][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1521.265606][T20468] device veth0_vlan entered promiscuous mode [ 1521.281971][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1521.291974][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1521.301000][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1521.318425][T20468] device veth1_vlan entered promiscuous mode [ 1521.340601][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1521.349554][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1521.358376][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1521.369345][T20468] device veth0_macvtap entered promiscuous mode [ 1521.379504][T20468] device veth1_macvtap entered promiscuous mode [ 1521.398885][T20468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1521.409856][T20468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1521.420463][T20468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1521.435150][T20468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1521.445213][T20468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1521.456081][T20468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1521.466105][T20468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1521.476890][T20468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1521.487067][T20468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1521.497954][T20468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1521.510393][T20468] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1521.522472][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1521.534159][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1521.545061][T20468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1521.555727][T20468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1521.566746][T20468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1521.578022][T20468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1521.588103][T20468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1521.600632][T20468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1521.610510][T20468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1521.622606][T20468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1521.632655][T20468] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1521.643153][T20468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1521.654646][T20468] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1521.663204][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1521.672830][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1521.925570][ T3706] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1521.936136][ T3706] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1522.114322][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1522.135429][ T5773] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1522.144782][ T5773] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1522.156315][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1522.199882][T20474] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1522.208311][T20475] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1522.216563][T20476] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1522.232660][T20475] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1522.252271][T20475] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1522.252986][T20474] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1522.270343][T20475] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1522.290725][T20475] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1522.294241][T20474] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1522.308760][T20475] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1523.065994][ T3706] device hsr_slave_0 left promiscuous mode [ 1523.072836][ T3706] device hsr_slave_1 left promiscuous mode [ 1523.079987][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1523.087748][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1523.096388][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1523.104665][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1523.114042][ T3706] device bridge_slave_1 left promiscuous mode [ 1523.120423][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1523.129655][ T3706] device bridge_slave_0 left promiscuous mode [ 1523.136489][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1523.151616][ T3706] device veth1_macvtap left promiscuous mode [ 1523.159963][ T3706] device veth0_macvtap left promiscuous mode [ 1523.166029][ T3706] device veth1_vlan left promiscuous mode [ 1523.173531][ T3706] device veth0_vlan left promiscuous mode [ 1523.357443][ T3706] team0 (unregistering): Port device team_slave_1 removed [ 1523.372972][ T3706] team0 (unregistering): Port device team_slave_0 removed [ 1523.391147][ T3706] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1523.405674][ T3706] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1523.476484][ T3706] bond0 (unregistering): Released all slaves [ 1527.347105][ T3627] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1529.921628][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1529.931234][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1529.939198][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1529.946736][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1529.954591][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1529.961888][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1530.055152][T20480] chnl_net:caif_netlink_parms(): no params data found [ 1530.099875][T20480] bridge0: port 1(bridge_slave_0) entered blocking state [ 1530.107144][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 1530.115116][T20480] device bridge_slave_0 entered promiscuous mode [ 1530.124007][T20480] bridge0: port 2(bridge_slave_1) entered blocking state [ 1530.131273][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 1530.143222][T20480] device bridge_slave_1 entered promiscuous mode [ 1530.168507][T20480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1530.179688][T20480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1530.207523][T20480] team0: Port device team_slave_0 added [ 1530.214997][T20480] team0: Port device team_slave_1 added [ 1530.239937][T20480] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1530.246878][T20480] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1530.273115][T20480] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1530.285287][T20480] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1530.292465][T20480] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1530.320092][T20480] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1530.351386][T20480] device hsr_slave_0 entered promiscuous mode [ 1530.358544][T20480] device hsr_slave_1 entered promiscuous mode [ 1530.439174][T20480] bridge0: port 2(bridge_slave_1) entered blocking state [ 1530.446250][T20480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1530.453652][T20480] bridge0: port 1(bridge_slave_0) entered blocking state [ 1530.460897][T20480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1530.515400][T20480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1530.529388][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1530.539416][T19317] bridge0: port 1(bridge_slave_0) entered disabled state [ 1530.547092][T19317] bridge0: port 2(bridge_slave_1) entered disabled state [ 1530.555927][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1530.571477][T20480] 8021q: adding VLAN 0 to HW filter on device team0 [ 1530.583733][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1530.596257][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 1530.603375][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1530.619075][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1530.628263][T19716] bridge0: port 2(bridge_slave_1) entered blocking state [ 1530.635323][T19716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1530.661066][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1530.670076][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1530.689594][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1530.701871][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1530.711400][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1530.726239][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1530.745418][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1530.753090][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1530.766019][T20480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1530.785012][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1530.809898][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1530.818971][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1530.826646][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1530.838631][T20480] device veth0_vlan entered promiscuous mode [ 1530.849807][T20480] device veth1_vlan entered promiscuous mode [ 1530.870073][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1530.878715][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1530.886855][T19317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1530.898121][T20480] device veth0_macvtap entered promiscuous mode [ 1530.906847][T20480] device veth1_macvtap entered promiscuous mode [ 1530.926750][T20480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1530.938803][T20480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1530.949138][T20480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1530.959610][T20480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1530.969516][T20480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1530.980032][T20480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1530.989973][T20480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1531.004644][T20480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1531.014551][T20480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1531.027117][T20480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1531.041967][T20480] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1531.055751][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1531.066077][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1531.078900][T20480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1531.089682][T20480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1531.100240][T20480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1531.110806][T20480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1531.122820][T20480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1531.133732][T20480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1531.143740][T20480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1531.154363][T20480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1531.165761][T20480] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1531.176670][T20480] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1531.188495][T20480] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1531.197481][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1531.206147][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1531.456715][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1531.473666][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1531.648967][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1531.670561][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1531.680242][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1531.690612][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1531.743585][T20486] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.758381][T20487] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.781989][T20487] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.783009][T20486] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.799263][T20487] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.816248][T20486] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.821410][T20487] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.855394][T20486] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.860018][T20487] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.872669][T20486] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.889379][T20487] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.892476][T20486] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.913528][T20487] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.918368][T20486] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.942851][T20487] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1531.995295][ T6979] Bluetooth: hci4: command 0x0409 tx timeout [ 1532.662718][ T10] device hsr_slave_0 left promiscuous mode [ 1532.669204][ T10] device hsr_slave_1 left promiscuous mode [ 1532.675730][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1532.683306][ T10] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1532.695910][ T10] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1532.703433][ T10] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1532.721113][ T10] device bridge_slave_1 left promiscuous mode [ 1532.728601][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1532.736851][ T10] device bridge_slave_0 left promiscuous mode [ 1532.743758][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1532.761720][ T10] device veth1_macvtap left promiscuous mode [ 1532.767829][ T10] device veth0_macvtap left promiscuous mode [ 1532.773870][ T10] device veth1_vlan left promiscuous mode [ 1532.781616][ T10] device veth0_vlan left promiscuous mode [ 1532.955940][ T10] team0 (unregistering): Port device team_slave_1 removed [ 1532.972878][ T10] team0 (unregistering): Port device team_slave_0 removed [ 1532.984902][ T10] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1533.003155][ T10] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1533.073425][ T10] bond0 (unregistering): Released all slaves [ 1536.947282][ T3638] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 1539.595734][ T3627] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1539.605031][ T3627] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1539.612863][ T3627] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1539.622048][ T3627] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1539.629764][ T3627] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1539.637441][ T3627] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1539.729652][T20492] chnl_net:caif_netlink_parms(): no params data found [ 1539.772585][T20492] bridge0: port 1(bridge_slave_0) entered blocking state [ 1539.779841][T20492] bridge0: port 1(bridge_slave_0) entered disabled state [ 1539.788090][T20492] device bridge_slave_0 entered promiscuous mode [ 1539.797256][T20492] bridge0: port 2(bridge_slave_1) entered blocking state [ 1539.804374][T20492] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.812543][T20492] device bridge_slave_1 entered promiscuous mode [ 1539.840642][T20492] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1539.851707][T20492] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1539.878856][T20492] team0: Port device team_slave_0 added [ 1539.886352][T20492] team0: Port device team_slave_1 added [ 1539.907582][T20492] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1539.914527][T20492] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1539.942605][T20492] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1539.955230][T20492] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1539.962530][T20492] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1539.989417][T20492] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1540.021757][T20492] device hsr_slave_0 entered promiscuous mode [ 1540.028965][T20492] device hsr_slave_1 entered promiscuous mode [ 1540.104989][T20492] bridge0: port 2(bridge_slave_1) entered blocking state [ 1540.112109][T20492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1540.119441][T20492] bridge0: port 1(bridge_slave_0) entered blocking state [ 1540.126477][T20492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1540.179929][T20492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1540.194644][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1540.203230][T15753] bridge0: port 1(bridge_slave_0) entered disabled state [ 1540.211326][T15753] bridge0: port 2(bridge_slave_1) entered disabled state [ 1540.220127][T15753] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1540.236076][T20492] 8021q: adding VLAN 0 to HW filter on device team0 [ 1540.250570][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1540.259635][ T6979] bridge0: port 1(bridge_slave_0) entered blocking state [ 1540.266695][ T6979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1540.291268][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1540.299939][ T6979] bridge0: port 2(bridge_slave_1) entered blocking state [ 1540.307077][ T6979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1540.315700][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1540.327025][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1540.335892][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1540.350623][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1540.364156][T20492] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1540.375796][T20492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1540.385403][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1540.406275][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1540.414018][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1540.426159][T20492] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1540.445296][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1540.472857][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1540.482521][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1540.490763][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1540.499009][T20492] device veth0_vlan entered promiscuous mode [ 1540.511247][T20492] device veth1_vlan entered promiscuous mode [ 1540.534885][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1540.544603][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1540.553887][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1540.565942][T20492] device veth0_macvtap entered promiscuous mode [ 1540.575912][T20492] device veth1_macvtap entered promiscuous mode [ 1540.594332][T20492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1540.604905][T20492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1540.617152][T20492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1540.628042][T20492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1540.641918][T20492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1540.652645][T20492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1540.662983][T20492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1540.673497][T20492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1540.683809][T20492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1540.694277][T20492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1540.705939][T20492] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1540.715293][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1540.725041][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1540.734998][T20492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1540.747895][T20492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1540.757912][T20492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1540.772996][T20492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1540.782890][T20492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1540.794725][T20492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1540.804591][T20492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1540.815197][T20492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1540.825084][T20492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1540.835842][T20492] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1540.848567][T20492] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1540.860382][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1540.869368][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1541.133903][ T10] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1541.149940][ T10] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1541.325193][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1541.350073][ T10] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1541.359935][ T10] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1541.374933][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1541.430252][T20498] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1541.438489][T20499] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1541.447934][T20498] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1542.185912][ T3706] device hsr_slave_0 left promiscuous mode [ 1542.192514][ T3706] device hsr_slave_1 left promiscuous mode [ 1542.200084][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1542.208346][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1542.216872][ T3706] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1542.228274][ T3706] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1542.236775][ T3706] device bridge_slave_1 left promiscuous mode [ 1542.243838][ T3706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1542.253056][ T3706] device bridge_slave_0 left promiscuous mode [ 1542.259535][ T3706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1542.274375][ T3706] device veth1_macvtap left promiscuous mode [ 1542.281146][ T3706] device veth0_macvtap left promiscuous mode [ 1542.287472][ T3706] device veth1_vlan left promiscuous mode [ 1542.293249][ T3706] device veth0_vlan left promiscuous mode [ 1542.476983][ T3706] team0 (unregistering): Port device team_slave_1 removed [ 1542.494935][ T3706] team0 (unregistering): Port device team_slave_0 removed [ 1542.506602][ T3706] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1542.523281][ T3706] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1542.591985][ T3706] bond0 (unregistering): Released all slaves [ 1544.479398][ T3638] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1544.488542][ T3638] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1544.496110][ T3638] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1544.504401][ T3638] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1544.512771][ T3638] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1544.520604][ T3638] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1544.604944][T20503] chnl_net:caif_netlink_parms(): no params data found [ 1544.650047][T20503] bridge0: port 1(bridge_slave_0) entered blocking state [ 1544.657317][T20503] bridge0: port 1(bridge_slave_0) entered disabled state [ 1544.665367][T20503] device bridge_slave_0 entered promiscuous mode [ 1544.674642][T20503] bridge0: port 2(bridge_slave_1) entered blocking state [ 1544.681888][T20503] bridge0: port 2(bridge_slave_1) entered disabled state [ 1544.694115][T20503] device bridge_slave_1 entered promiscuous mode [ 1544.714040][T20503] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1544.725944][T20503] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1544.754320][T20503] team0: Port device team_slave_0 added [ 1544.762368][T20503] team0: Port device team_slave_1 added [ 1544.783137][T20503] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1544.790390][T20503] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1544.816883][T20503] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1544.829059][T20503] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1544.835984][T20503] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1544.862485][T20503] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1544.898427][T20503] device hsr_slave_0 entered promiscuous mode [ 1544.905149][T20503] device hsr_slave_1 entered promiscuous mode [ 1544.985332][T20503] bridge0: port 2(bridge_slave_1) entered blocking state [ 1544.992424][T20503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1544.999742][T20503] bridge0: port 1(bridge_slave_0) entered blocking state [ 1545.006871][T20503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1545.054235][T20503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1545.069393][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1545.078143][ T6979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1545.085693][ T6979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1545.096542][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1545.111686][T20503] 8021q: adding VLAN 0 to HW filter on device team0 [ 1545.125554][ T141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1545.134195][ T141] bridge0: port 1(bridge_slave_0) entered blocking state [ 1545.141271][ T141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1545.155130][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1545.164919][ T6979] bridge0: port 2(bridge_slave_1) entered blocking state [ 1545.172030][ T6979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1545.198158][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1545.206729][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1545.226822][T20503] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1545.238705][T20503] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1545.252892][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1545.262088][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1545.270726][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1545.280270][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1545.300465][T20503] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1545.312201][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1545.320253][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1545.341285][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1545.356661][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1545.365608][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1545.373528][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1545.382932][T20503] device veth0_vlan entered promiscuous mode [ 1545.397599][T20503] device veth1_vlan entered promiscuous mode [ 1545.421164][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1545.435050][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1545.444118][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1545.460482][T20503] device veth0_macvtap entered promiscuous mode [ 1545.469606][T20503] device veth1_macvtap entered promiscuous mode [ 1545.487452][T20503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1545.498840][T20503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1545.509040][T20503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1545.520355][T20503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1545.531252][T20503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1545.546024][T20503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1545.557546][T20503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1545.568129][T20503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1545.578019][T20503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1545.590131][T20503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1545.590157][ T1225] ieee802154 phy0 wpan0: encryption failed: -22 [ 1545.602226][T20503] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1545.606336][ T1225] ieee802154 phy1 wpan1: encryption failed: -22 [ 1545.618656][T20503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1545.631458][T20503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1545.644174][T20503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1545.655017][T20503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1545.665971][T20503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1545.676684][T20503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1545.686817][T20503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1545.697679][T20503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1545.707754][T20503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1545.718626][T20503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1545.730745][T20503] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1545.741931][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1545.752081][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1545.763247][ T6979] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1546.011779][ T5169] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1546.020023][ T5169] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1546.032972][T19716] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1546.239006][ T5169] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1546.248837][ T5169] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1546.261024][T16142] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1546.311429][T20510] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1546.314923][T20509] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1546.326602][T20511] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1546.351730][T20510] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1546.356062][T20509] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 2022/02/03 10:58:17 executor 4 failed 11 times: executor 4: exit status 67 SYZFAIL: netlink_send_ext: bad netlink ack type type=41 (errno 22: Invalid argument) SYZFAIL: child failed (errno 0: Success) loop exited with status 67 [ 1547.565814][ T5184] device hsr_slave_0 left promiscuous mode [ 1547.575263][ T5184] device hsr_slave_1 left promiscuous mode [ 1547.593586][ T5184] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1547.612903][ T5184] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1547.623950][ T5184] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1547.639394][ T5184] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1547.654169][ T5184] device bridge_slave_1 left promiscuous mode [ 1547.663119][ T5184] bridge0: port 2(bridge_slave_1) entered disabled state [ 1547.683059][ T5184] device bridge_slave_0 left promiscuous mode [ 1547.692042][ T5184] bridge0: port 1(bridge_slave_0) entered disabled state [ 1547.722783][ T5184] device veth1_macvtap left promiscuous mode [ 1547.733041][ T5184] device veth0_macvtap left promiscuous mode [ 1547.743349][ T5184] device veth1_vlan left promiscuous mode [ 1547.753325][ T5184] device veth0_vlan left promiscuous mode [ 1548.062472][ T5184] team0 (unregistering): Port device team_slave_1 removed [ 1548.081366][ T5184] team0 (unregistering): Port device team_slave_0 removed [ 1548.096041][ T5184] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1548.115533][ T5184] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1548.245235][ T5184] bond0 (unregistering): Released all slaves