0, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x404000, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x1, 0x80, 0x81, 0x0, 0xdc, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x418, 0x10001, 0x0, 0x4, 0x4867, 0x5, 0x1000}, 0x0, 0x4, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) [ 258.375912][T10974] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 258.398478][T10968] romfs: Mounting image 'rom 5f663c08' through the block layer [ 258.438572][T10974] romfs: Mounting image 'rom 5f663c08' through the block layer 23:10:43 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x404000, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x1, 0x80, 0x81, 0x0, 0xdc, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x418, 0x10001, 0x0, 0x4, 0x4867, 0x5, 0x1000}, 0x0, 0x4, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:10:43 executing program 0: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x400}], 0x0, &(0x7f0000010700)) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 23:10:43 executing program 2: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x400}], 0x0, &(0x7f0000010700)) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) [ 258.957570][T10997] loop0: detected capacity change from 2 to 0 [ 258.999455][T10997] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 259.022079][T10999] loop2: detected capacity change from 2 to 0 [ 259.033592][T10997] romfs: Mounting image 'rom 5f663c08' through the block layer 23:10:44 executing program 1: openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x42080, 0x0) openat$nvram(0xffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x0, 0x0) [ 259.061465][T10999] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 259.074815][T10999] romfs: Mounting image 'rom 5f663c08' through the block layer 23:10:44 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x404000, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x1, 0x80, 0x81, 0x0, 0xdc, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x418, 0x10001, 0x0, 0x4, 0x4867, 0x5, 0x1000}, 0x0, 0x4, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:10:44 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x404000, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x1, 0x80, 0x81, 0x0, 0xdc, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x418, 0x10001, 0x0, 0x4, 0x4867, 0x5, 0x1000}, 0x0, 0x4, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:10:44 executing program 2: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2d726f6d3166732d00002980bae40061726f6d20356636363363303800000000000000490000002000000000d1ffff972e000000000000000000000000000000000000600000002000000000d1d1ff802e2e000000000000000000000000000000000559000000800000000069968dc266696c65300000000000000000000000000004ca000000000000041a69968ab766696c6530000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c6572", 0x400}], 0x0, &(0x7f0000010700)) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 23:10:44 executing program 0: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x400}], 0x0, &(0x7f0000010700)) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 23:10:44 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x404000, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x1, 0x80, 0x81, 0x0, 0xdc, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x418, 0x10001, 0x0, 0x4, 0x4867, 0x5, 0x1000}, 0x0, 0x4, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:10:44 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) [ 259.483066][T11020] loop2: detected capacity change from 2 to 0 [ 259.514307][T11020] MTD: Attempt to mount non-MTD device "/dev/loop2" 23:10:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="28000000100001080000000000005c5400000000", @ANYRES32=0x0, @ANYBLOB="000000a0ebfaf00008001b"], 0x28}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x14}, 0x10000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000340)='./file0\x00', &(0x7f0000000080)='./file0\x00') writev(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x8102, 0x0) write$P9_RLERROR(r2, 0x0, 0xe) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x20008041) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000700)='./file1\x00') setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffffef2, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 259.551305][T11023] loop0: detected capacity change from 2 to 0 [ 259.559937][T11020] romfs: Mounting image 'rom 5f663c08' through the block layer [ 259.617644][T11023] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 259.682173][T11023] romfs: Mounting image 'rom 5f663c08' through the block layer 23:10:45 executing program 2: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 23:10:45 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGETMODE(r0, 0x4bfa, &(0x7f00000011c0)) 23:10:45 executing program 3: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc03012f3, &(0x7f0000000200)={0x100007}) 23:10:45 executing program 0: r0 = gettid() r1 = gettid() r2 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000200)={r3}) 23:10:45 executing program 5: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x800412f9, &(0x7f0000000200)={0x100007}) 23:10:45 executing program 2: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 23:10:45 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$notify(r0, 0x5, 0x0) 23:10:45 executing program 3: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) 23:10:45 executing program 0: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc03012f3, &(0x7f0000000200)={0x100007}) 23:10:45 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:10:46 executing program 4: r0 = syz_io_uring_setup(0x5290, &(0x7f00000001c0), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000280)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x13, r0, 0x10000000) [ 264.842391][T11037] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.850844][T11037] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.319509][T11037] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 269.771336][T11037] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 273.833802][T11037] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.843718][T11037] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.853894][T11037] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.867130][T11037] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 274.988395][T11041] device bridge_slave_0 left promiscuous mode [ 274.999228][T11041] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.026835][T11041] device bridge_slave_1 left promiscuous mode [ 275.047152][T11041] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.068267][T11041] bond0: (slave bond_slave_0): Releasing backup interface [ 275.078936][T11041] bond0: (slave bond_slave_1): Releasing backup interface 23:11:00 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:11:00 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f0000001180)) 23:11:00 executing program 2: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 23:11:00 executing program 3: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)=@phonet={0x23, 0xfc, 0x1, 0x1f}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0) clone(0x20003004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0xa4001080, &(0x7f00000003c0), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) r3 = dup(r2) sendfile(r3, r0, 0x0, 0x80000a) 23:11:00 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:11:00 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) [ 275.093142][T11041] team0: Port device team_slave_0 removed [ 275.100072][T11041] team0: Port device team_slave_1 removed [ 275.106709][T11041] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 275.116216][T11041] batman_adv: batadv0: Removing interface: batadv_slave_1 23:11:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), 0x4) [ 275.260157][ T36] kauditd_printk_skb: 29 callbacks suppressed [ 275.260172][ T36] audit: type=1804 audit(1610493060.522:41): pid=11113 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir847453414/syzkaller.MZaauZ/54/bus" dev="sda1" ino=15985 res=1 errno=0 23:11:00 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x407012ef, &(0x7f0000000200)={0x100007}) [ 275.567379][ T36] audit: type=1804 audit(1610493060.542:42): pid=11115 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/66/bus" dev="sda1" ino=15988 res=1 errno=0 [ 275.568620][ T36] audit: type=1804 audit(1610493060.542:43): pid=11113 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir847453414/syzkaller.MZaauZ/54/bus" dev="sda1" ino=15985 res=1 errno=0 23:11:00 executing program 3: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGETMODE(r0, 0x5423, &(0x7f00000011c0)) 23:11:00 executing program 2: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(0xffffffffffffffff, 0x80189439, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 275.574123][ T36] audit: type=1804 audit(1610493060.572:44): pid=11115 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/66/bus" dev="sda1" ino=15988 res=1 errno=0 23:11:01 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) [ 275.715262][ T36] audit: type=1804 audit(1610493060.812:45): pid=11113 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir847453414/syzkaller.MZaauZ/54/bus" dev="sda1" ino=15985 res=1 errno=0 23:11:01 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:11:01 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) [ 275.886246][ T36] audit: type=1804 audit(1610493060.862:46): pid=11109 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/66/bus" dev="sda1" ino=15988 res=1 errno=0 23:11:01 executing program 0: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 23:11:01 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) pipe(&(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) select(0x40, &(0x7f0000000000)={0x1f}, 0x0, 0x0, 0x0) 23:11:01 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x404000, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x1, 0x80, 0x81, 0x0, 0xdc, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x418, 0x10001, 0x0, 0x4, 0x4867, 0x5, 0x1000}, 0x0, 0x4, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x5, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) [ 276.162731][ T36] audit: type=1804 audit(1610493061.432:47): pid=11141 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/67/bus" dev="sda1" ino=15983 res=1 errno=0 [ 276.393400][ T36] audit: type=1804 audit(1610493061.462:48): pid=11141 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/67/bus" dev="sda1" ino=15983 res=1 errno=0 23:11:01 executing program 3: r0 = syz_io_uring_setup(0x7737, &(0x7f00000001c0)={0x0, 0x0, 0x2}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000240)) io_uring_enter(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 23:11:01 executing program 0: ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x400812fa, &(0x7f0000000200)={0x100007}) [ 276.594554][ T36] audit: type=1804 audit(1610493061.472:49): pid=11147 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir847453414/syzkaller.MZaauZ/55/bus" dev="sda1" ino=15984 res=1 errno=0 23:11:02 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:11:02 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) [ 276.779677][ T36] audit: type=1804 audit(1610493061.512:50): pid=11147 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir847453414/syzkaller.MZaauZ/55/bus" dev="sda1" ino=15984 res=1 errno=0 23:11:02 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:11:02 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x404000, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x1, 0x80, 0x81, 0x0, 0xdc, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x418, 0x10001, 0x0, 0x4, 0x4867, 0x5, 0x1000}, 0x0, 0x4, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x5, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:11:02 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGETMODE(r0, 0x5603, &(0x7f00000011c0)) 23:11:02 executing program 3: syz_emit_ethernet(0x26, &(0x7f0000000040)={@broadcast, @local, @val, {@ipv4}}, 0x0) 23:11:02 executing program 0: syz_emit_ethernet(0x62, &(0x7f0000000080)={@broadcast, @local, @val, {@ipv4}}, 0x0) 23:11:02 executing program 3: symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000100)='./file0/file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00') 23:11:03 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000040)=0x7) 23:11:03 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x404000, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x1, 0x80, 0x81, 0x0, 0xdc, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x418, 0x10001, 0x0, 0x4, 0x4867, 0x5, 0x1000}, 0x0, 0x4, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x5, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:11:03 executing program 4: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x6) 23:11:03 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000000)="347a2cf65de226d5eaf4f02a214fe11e0b3e3cabb5484e9b8e42c7e1591196f7a5c1f11ec6b89c188f3d3200b128ad658336032817eb888c192f8d00bf31417a878ee93a04067b03d1f2424b109bebe806c5d4fa89c33d21890556b4695d46e116afac4d9b15842cc24528d516f3ec56fba01a83ab24493b61a6b5145f00a1055185dc87bf0f2f265e3120c7b1069347f4997a165dfc1d5bb6a1c7ee1e01732903b67230f1d522ed75deaa8a3b4da0e6813a27fc060fd674ecbc99abe3257cd33ad8ec94a9c6eea1def65b15bd2de838fbbd964fd54e8c1c6d3b561e4b35cd8682", 0xe1) 23:11:03 executing program 0: madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) [ 277.757408][ T52] device hsr_slave_0 left promiscuous mode [ 277.820815][ T52] device hsr_slave_1 left promiscuous mode [ 278.592413][ T52] bond0 (unregistering): Released all slaves [ 283.879151][T11269] IPVS: ftp: loaded support on port[0] = 21 [ 284.009645][T11269] chnl_net:caif_netlink_parms(): no params data found [ 284.145872][T11269] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.164003][T11269] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.174346][T11269] device bridge_slave_0 entered promiscuous mode [ 284.185526][T11269] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.193949][T11269] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.202674][T11269] device bridge_slave_1 entered promiscuous mode [ 284.226175][T11269] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 284.238456][T11269] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 284.267674][T11269] team0: Port device team_slave_0 added [ 284.275433][T11269] team0: Port device team_slave_1 added [ 284.296799][T11269] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 284.303846][T11269] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 284.330722][T11269] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 284.344838][T11269] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 284.351871][T11269] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 284.378845][T11269] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 284.412394][T11269] device hsr_slave_0 entered promiscuous mode [ 284.419264][T11269] device hsr_slave_1 entered promiscuous mode [ 284.425967][T11269] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 284.433766][T11269] Cannot create hsr debugfs directory [ 284.532567][T11269] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.539632][T11269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.547903][T11269] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.555150][T11269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.613753][T11269] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.629984][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.654870][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.663479][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.672899][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 284.691844][T11269] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.705476][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.714702][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.721838][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.742299][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.751333][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.758385][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.783905][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.793558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.802255][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.811004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 284.827935][T11269] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 284.839412][T11269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 284.854450][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.879671][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 284.887755][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 284.905294][T11269] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 284.976183][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.002475][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.012487][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.023483][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.031704][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.044378][T11269] device veth0_vlan entered promiscuous mode [ 285.057650][T11269] device veth1_vlan entered promiscuous mode [ 285.084901][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 285.092950][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 285.102026][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.111543][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.123741][T11269] device veth0_macvtap entered promiscuous mode [ 285.134788][T11269] device veth1_macvtap entered promiscuous mode [ 285.156267][T11269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.167915][T11269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.178519][T11269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.189523][T11269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.199858][T11269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.212996][T11269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.223286][T11269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.233813][T11269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.243712][T11269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 285.254184][T11269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.267006][T11269] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 285.275548][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 285.285138][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 285.293401][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 285.302187][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.314809][T11269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.327099][T11269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.337698][T11269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.348956][T11269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.359680][T11269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.371139][T11269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.381320][T11269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.392085][T11269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.402253][T11269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 285.412993][T11269] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 285.425345][T11269] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 285.438041][ T3208] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 285.448091][ T3208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.546700][ T250] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 285.570885][ T250] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 285.599481][ T25] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 285.621942][ T25] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 285.632757][ T4919] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 285.643507][ T4919] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 285.788553][ T36] kauditd_printk_skb: 20 callbacks suppressed [ 285.788569][ T36] audit: type=1804 audit(1610493071.052:71): pid=11500 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir553000135/syzkaller.4yY7QN/0/bus" dev="sda1" ino=16009 res=1 errno=0 [ 285.829834][ T36] audit: type=1804 audit(1610493071.072:72): pid=11500 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir553000135/syzkaller.4yY7QN/0/bus" dev="sda1" ino=16009 res=1 errno=0 [ 285.911413][ T20] Bluetooth: hci1: command 0x0409 tx timeout [ 285.914626][ T36] audit: type=1804 audit(1610493071.182:73): pid=11500 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir553000135/syzkaller.4yY7QN/0/bus" dev="sda1" ino=16009 res=1 errno=0 23:11:11 executing program 3: nanosleep(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) 23:11:11 executing program 4: mlock(&(0x7f0000ff8000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ff9000/0x3000)=nil, 0x3000) 23:11:11 executing program 0: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 23:11:11 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000140)={@broadcast, @local, @val, {@ipv6}}, 0x0) 23:11:11 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap$perf(&(0x7f0000359000/0x4000)=nil, 0x4000, 0x2000000, 0x80010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000000)={0x14}, 0x14) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x822, 0x0, 0xfffffffc, 0x0, 0x404000, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x1, 0x80, 0x81, 0x0, 0xdc, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x418, 0x10001, 0x0, 0x4, 0x4867, 0x5, 0x1000}, 0x0, 0x4, r4, 0x8) write$P9_RREMOVE(r5, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r5]) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x5, 0x3, &(0x7f0000000340)={[0x7c20]}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x100007, r5, 0x9, 0xffffffe4, 0x0, 0x60000000f100000}) 23:11:11 executing program 0: syz_emit_ethernet(0x106a, &(0x7f0000000000)=ANY=[], 0x0) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 23:11:11 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) 23:11:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000700)='+', 0x1}, {&(0x7f0000001700)='\\', 0x1}], 0x2}}], 0x1, 0x0) 23:11:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003680)={&(0x7f0000003500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}]}}, &(0x7f00000035c0)=""/189, 0x36, 0xbd, 0x1}, 0x20) 23:11:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 286.273413][ T36] audit: type=1804 audit(1610493071.542:74): pid=11514 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir855498080/syzkaller.xVFO6o/72/bus" dev="sda1" ino=16021 res=1 errno=0 [ 286.413336][ T36] audit: type=1804 audit(1610493071.662:75): pid=11513 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir855498080/syzkaller.xVFO6o/72/bus" dev="sda1" ino=16021 res=1 errno=0 23:11:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) 23:11:11 executing program 0: syz_mount_image$fuse(&(0x7f00000000c0)='fuse\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x209624, &(0x7f0000000500)=ANY=[]) 23:11:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000280)={0x2, {0x2, 0x0, 0x0, 0x0, 0x400}}) 23:11:11 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000c00)={{}, {0x0, 0x3938700}}, &(0x7f0000000c40)) 23:11:11 executing program 4: sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x45874027edd403e0) [ 286.645050][ T36] audit: type=1804 audit(1610493071.912:76): pid=11514 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir855498080/syzkaller.xVFO6o/72/bus" dev="sda1" ino=16021 res=1 errno=0 [ 286.753711][T11513] syz-executor.2 (11513) used greatest stack depth: 22576 bytes left 23:11:12 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r1, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000c73d, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe85}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) 23:11:12 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001500)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$IOCTL_GET_NUM_DEVICES(r1, 0x40046104, &(0x7f0000000040)) 23:11:12 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x81, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000300)=ANY=[], 0x116) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 23:11:12 executing program 0: syz_mount_image$tmpfs(&(0x7f0000002340)='tmpfs\x00', &(0x7f0000002380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002880)={[{@size={'size', 0x3d, [0x30, 0x39]}}]}) 23:11:12 executing program 5: syz_mount_image$fuse(&(0x7f000000b500)='fuse\x00', &(0x7f000000b540)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000000b640)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id'}}) 23:11:12 executing program 2: syz_mount_image$fuse(&(0x7f0000000880)='fuse\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10040, &(0x7f0000000900)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id'}}) [ 287.072740][T11554] tmpfs: Bad value for 'size' [ 287.087665][T11553] fuse: Bad value for 'fd' [ 287.098732][T11554] tmpfs: Bad value for 'size' [ 287.128900][T11553] fuse: Bad value for 'fd' [ 287.166156][T11560] fuse: Bad value for 'fd' 23:11:12 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r1, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000c73d, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe85}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) 23:11:12 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001500)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$IOCTL_GET_NUM_DEVICES(r1, 0x40046104, &(0x7f0000000040)) [ 287.192152][T11560] fuse: Bad value for 'fd' 23:11:12 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="b4", 0x1}], 0x1, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 23:11:12 executing program 5: syz_emit_ethernet(0x125, 0x0, 0x0) 23:11:12 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000000080), 0x1, 0x0, 0x15}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') preadv(r0, &(0x7f00000017c0), 0x2d6, 0x0, 0x0) [ 287.472624][T11573] ptrace attach of "/root/syz-executor.0"[11570] was attempted by "/root/syz-executor.0"[11573] 23:11:12 executing program 0: rt_sigaction(0x1a, &(0x7f0000000180)={&(0x7f0000000200)="64f00fc7890010000246c1a97c5000001af3450fa7d0f245a70f0f1aa0460814793e0f7f6100c40379048ddb00000024b675c4217929a108000000", 0x0, 0x0}, 0x0, 0x8, &(0x7f00000001c0)) 23:11:12 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001500)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40046104, 0x0) 23:11:12 executing program 1: openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) 23:11:12 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001500)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$IOCTL_GET_NUM_DEVICES(r1, 0x40046104, &(0x7f0000000040)) 23:11:12 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000000080), 0x1, 0x0, 0x15}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') preadv(r0, &(0x7f00000017c0), 0x2d6, 0x0, 0x0) 23:11:13 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r1, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000c73d, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe85}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) 23:11:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) 23:11:13 executing program 5: symlink(&(0x7f00000000c0)='..', &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000400)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 23:11:13 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='huge=alwaqs,func=POLICY_CHECK,\x00']) chdir(&(0x7f0000000300)='./file3\x00') mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x2) getdents(0xffffffffffffffff, 0x0, 0x0) 23:11:13 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000000080), 0x1, 0x0, 0x15}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') preadv(r0, &(0x7f00000017c0), 0x2d6, 0x0, 0x0) 23:11:13 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001500)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$IOCTL_GET_NUM_DEVICES(r1, 0x40046104, &(0x7f0000000040)) [ 287.991774][ T3208] Bluetooth: hci1: command 0x041b tx timeout 23:11:13 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r1, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000c73d, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe85}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) 23:11:13 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[@ANYRESDEC], 0x100000530) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 288.168771][T11602] overlayfs: failed to resolve './file0': -2 23:11:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) 23:11:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) 23:11:13 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000000080), 0x1, 0x0, 0x15}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') preadv(r0, &(0x7f00000017c0), 0x2d6, 0x0, 0x0) 23:11:13 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='huge=alwaqs,func=POLICY_CHECK,\x00']) chdir(&(0x7f0000000300)='./file3\x00') mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x2) getdents(0xffffffffffffffff, 0x0, 0x0) 23:11:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) 23:11:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='uid_map\x00') r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/udmabuf\x00', 0x2) sendfile(r1, r0, &(0x7f0000000000)=0x8005, 0x6) 23:11:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) 23:11:14 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='huge=alwaqs,func=POLICY_CHECK,\x00']) chdir(&(0x7f0000000300)='./file3\x00') mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x2) getdents(0xffffffffffffffff, 0x0, 0x0) 23:11:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) 23:11:14 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001500)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40096100, 0x0) 23:11:14 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[@ANYRESDEC], 0x100000530) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 23:11:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) 23:11:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) [ 289.617803][T11661] QAT: failed to copy from user cfg_data. 23:11:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) 23:11:15 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB='huge=alwaqs,func=POLICY_CHECK,\x00']) chdir(&(0x7f0000000300)='./file3\x00') mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x2) getdents(0xffffffffffffffff, 0x0, 0x0) 23:11:15 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[@ANYRESDEC], 0x100000530) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 290.070734][ T3208] Bluetooth: hci1: command 0x040f tx timeout 23:11:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x25d) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f000099e000)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r1, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r1, &(0x7f0000000480)=""/110, 0xfffffe32, 0x734, 0x0, 0xffffffffffffff39) dup2(r1, r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffd84, 0x4010, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) 23:11:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000680)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@index_on='index=on'}]}) [ 290.321541][T11687] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:11:15 executing program 4: symlink(&(0x7f00000000c0)='..', &(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000400)='devpts\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 23:11:15 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[@ANYRESDEC], 0x100000530) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 23:11:16 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5423, &(0x7f0000000000)={0x3, {0x3}}) 23:11:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5423, &(0x7f0000000000)={0x3, {0x3}}) 23:11:16 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/hwrng\x00', 0x20100, 0x0) 23:11:16 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[@ANYRESDEC], 0x100000530) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 23:11:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000500)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000010500)="ff030400fc030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1000, 0x2000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x410481, 0x0) pwritev(r0, &(0x7f00000014c0)=[{&(0x7f0000000080)="d69f3271", 0x8800000}], 0x1, 0xa, 0x900300) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 23:11:16 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 23:11:16 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e6661740002800100024000f004f801", 0x17}, {0x0, 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'ascii'}}]}) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000540)={r1, r2+60000000}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x9) r3 = open(0x0, 0x1031fe, 0x0) renameat(r3, &(0x7f00000005c0)='./file1\x00', 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) 23:11:16 executing program 0: timer_create(0x0, &(0x7f0000003040)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000003080)) [ 291.254608][T11717] loop1: detected capacity change from 545 to 0 [ 291.298266][T11717] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 23:11:16 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000280)) 23:11:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002b80)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000002bc0)) [ 291.539739][T11727] loop3: detected capacity change from 270 to 0 23:11:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000500)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000010500)="ff030400fc030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1000, 0x2000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x410481, 0x0) pwritev(r0, &(0x7f00000014c0)=[{&(0x7f0000000080)="d69f3271", 0x8800000}], 0x1, 0xa, 0x900300) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 23:11:17 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[@ANYRESDEC], 0x100000530) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 23:11:17 executing program 4: syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000001540)='/dev/input/event#\x00', 0x412a, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000300)=""/229) 23:11:17 executing program 0: prctl$PR_SET_DUMPABLE(0x2f, 0x2) [ 291.855896][T11743] loop1: detected capacity change from 545 to 0 23:11:17 executing program 0: prctl$PR_SET_DUMPABLE(0x2f, 0x2) [ 292.012853][T11743] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 23:11:17 executing program 2: signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz0\x00', 0x1ff) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$getflags(r0, 0xb) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f0000000380)={0x2, 0x200000000004e23, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x20}}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0) write$binfmt_elf64(r2, &(0x7f0000000300)=ANY=[@ANYRESDEC], 0x100000530) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) 23:11:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e6661740002800100024000f004f801", 0x17}, {0x0, 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'ascii'}}]}) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000540)={r1, r2+60000000}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x9) r3 = open(0x0, 0x1031fe, 0x0) renameat(r3, &(0x7f00000005c0)='./file1\x00', 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) 23:11:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000500)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000010500)="ff030400fc030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1000, 0x2000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x410481, 0x0) pwritev(r0, &(0x7f00000014c0)=[{&(0x7f0000000080)="d69f3271", 0x8800000}], 0x1, 0xa, 0x900300) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) [ 292.150613][ T9792] Bluetooth: hci1: command 0x0419 tx timeout 23:11:17 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000002980)=0x0) r2 = eventfd(0x0) io_submit(r1, 0x1, &(0x7f0000004dc0)=[&(0x7f00000039c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) 23:11:17 executing program 0: prctl$PR_SET_DUMPABLE(0x2f, 0x2) [ 292.346335][T11765] loop3: detected capacity change from 270 to 0 [ 292.402304][T11774] loop1: detected capacity change from 545 to 0 23:11:17 executing program 0: prctl$PR_SET_DUMPABLE(0x2f, 0x2) [ 292.448022][T11774] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 23:11:17 executing program 4: lstat(&(0x7f00000021c0)='./file0\x00', 0x0) getgroups(0x0, 0x0) getgroups(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000020c0)={0x30}, 0x30) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/fuse\x00', 0x2, 0x0) getuid() syz_mount_image$tmpfs(&(0x7f0000002340)='tmpfs\x00', &(0x7f0000002380)='./file0\x00', 0x4, 0x4, &(0x7f00000027c0)=[{&(0x7f00000023c0)="319dc6fe21f57c03bf3b3eaa2c1860126db63419f36f5466a366d24c83648e9bbf46dbc9bc55c2df029e0de95c8b7daf0284b33a7903cb49438e5a692b59fabb670ebac409ccdff7801d3b7c428a12b0336b9908ea94e9c44cd2e0205e3aeb023e8d045cc9426897b33b288312b46e9d3846970e7b5e689f49bafed2bbda34d8888d136b977dc1b5d4a0a479cb", 0x8d, 0x1}, {&(0x7f0000002480)="127385f271db35fc3db60b1b0f8fffe9a8fbe7cc318b1298b1ab2be8bf99c96b27ac9f676c9320d97368b48a012490cbdc84de8891019357b64b6ff93a6b4f552e6ea7018c945e72eed69a3275847d4236d17e5c002326c7b5acd8db9b9e469e39e32fb9ea9dd2c950585923775cf3440b4afac94b70d879794694935fad927bb7df0622022c1fd982ca056e73be273f48576c4c339354b50374c40f0f2cc49c95884f1d1627085196c2b9f9515b5f64c081124ac7db6e47e681e998cd78", 0xbe, 0xfdc}, {&(0x7f0000002540)="76b53ca2958de10ded837d56e5fbe56db6a725b33ca6939ac7fd87112527bd0acaf4544c", 0x24, 0x5d619ca1}, {0x0}], 0x0, &(0x7f0000002880)={[{@mpol={'mpol', 0x3d, {'bind', '=static', @void}}}, {@size={'size', 0x3d, [0x30, 0x39, 0x25, 0x31, 0x39, 0x0]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x0, 0x32, 0x78, 0x36]}}, {@huge_within_size='huge=within_size'}], [{@subj_type={'subj_type', 0x3d, '/dev/fuse\x00'}}]}) 23:11:17 executing program 0: pipe2$9p(0x0, 0x88800) [ 292.699158][T11787] loop4: detected capacity change from 264192 to 0 [ 292.721452][T11787] tmpfs: Bad value for 'mpol' [ 292.831186][T11795] loop4: detected capacity change from 264192 to 0 [ 292.838802][T11795] tmpfs: Bad value for 'mpol' 23:11:18 executing program 0: prctl$PR_SET_DUMPABLE(0x22, 0x0) 23:11:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000500)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000010500)="ff030400fc030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1000, 0x2000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x410481, 0x0) pwritev(r0, &(0x7f00000014c0)=[{&(0x7f0000000080)="d69f3271", 0x8800000}], 0x1, 0xa, 0x900300) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 23:11:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e6661740002800100024000f004f801", 0x17}, {0x0, 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'ascii'}}]}) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000540)={r1, r2+60000000}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x9) r3 = open(0x0, 0x1031fe, 0x0) renameat(r3, &(0x7f00000005c0)='./file1\x00', 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) 23:11:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/mm/transparent_hugepage/khugepaged/scan_sleep_millisecs\x00', 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xff81}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}]}, 0x78) [ 293.061520][T11805] loop1: detected capacity change from 545 to 0 23:11:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000002ec0)={0x0, 0x0, &(0x7f0000002e80)={&(0x7f0000002e40)={0x1c}, 0x1c}}, 0x0) 23:11:18 executing program 4: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) 23:11:18 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x11000000, 0x0, 0x0, 0x0, 0x0) [ 293.129436][T11806] loop3: detected capacity change from 270 to 0 23:11:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000540000004f801", 0x17}, {0x0}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'ascii'}}]}) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000500)) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x9) open(0x0, 0x1031fe, 0x0) [ 293.242167][T11805] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 23:11:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007540)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="0f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000001c0)="551db9f0879c8d59acde80613537e99d6a159ec5d23c6f140b52097586a650a8cb52a3d0d7684853235ae524af", 0x2d}, {&(0x7f0000000480)="f2", 0x1}, {&(0x7f0000000540)="b8", 0x1}], 0x3, &(0x7f00000006c0)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x18}}], 0x2, 0x0) 23:11:18 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) syz_open_dev$char_raw(&(0x7f0000000040)='/dev/raw/raw#\x00', 0x0, 0x50000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000300)=ANY=[], 0x116) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 23:11:18 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000002300)='IPVS\x00') io_setup(0x0, 0x0) 23:11:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e6661740002800100024000f004f801", 0x17}, {0x0, 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'ascii'}}]}) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000540)={r1, r2+60000000}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x9) r3 = open(0x0, 0x1031fe, 0x0) renameat(r3, &(0x7f00000005c0)='./file1\x00', 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) 23:11:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x1e5, 0x0, 0x0) 23:11:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007540)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="0f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000001c0)="551db9f0879c8d59acde80613537e99d6a159ec5d23c6f140b52097586a650a8cb52a3d0d7684853235ae524af", 0x2d}, {&(0x7f0000000480)="f2", 0x1}, {&(0x7f0000000540)="b8", 0x1}], 0x3, &(0x7f00000006c0)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x18}}], 0x2, 0x0) [ 293.596349][T11828] loop5: detected capacity change from 270 to 0 23:11:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007540)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="0f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000001c0)="551db9f0879c8d59acde80613537e99d6a159ec5d23c6f140b52097586a650a8cb52a3d0d7684853235ae524af", 0x2d}, {&(0x7f0000000480)="f2", 0x1}, {&(0x7f0000000540)="b8", 0x1}], 0x3, &(0x7f00000006c0)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x18}}], 0x2, 0x0) 23:11:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000540000004f801", 0x17}, {0x0}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'ascii'}}]}) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000500)) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x9) open(0x0, 0x1031fe, 0x0) 23:11:19 executing program 4: timer_create(0x2, &(0x7f00000003c0)={0x0, 0x24, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000400)) 23:11:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmmsg$sock(r1, &(0x7f0000007540)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="0f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000001c0)="551db9f0879c8d59acde80613537e99d6a159ec5d23c6f140b52097586a650a8cb52a3d0d7684853235ae524af", 0x2d}, {&(0x7f0000000480)="f2", 0x1}, {&(0x7f0000000540)="b8", 0x1}], 0x3, &(0x7f00000006c0)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x18}}], 0x2, 0x0) [ 293.942668][T11850] loop3: detected capacity change from 270 to 0 23:11:19 executing program 0: perf_event_open(0x0, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xeb7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000992c6d72a74c5d973c6a44b0d83d89a91331ad2aa0c7fe5cbd5ed44000000000000000ddc6c11cab244f0e0327a59f87a8cd352ab348c6071026c85c97cc2ddbacbaae54ff9343f995f51f5e842a11116725dacb73ba460dce8a7e161e9e873e4c590fde3dc3d48c763e2577d5a93476dfbd8d80eaae972788cd3fac1d10866d83440c7797f08b85cf72eff7cc6d9f38a593217521e268a210b3e28aab4487459ccde54c07a93b00"], 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000880) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) syz_open_dev$char_raw(&(0x7f0000000300)='/dev/raw/raw#\x00', 0x0, 0x40000) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20020000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r1, 0x1, 0x25, &(0x7f0000000140)=0x7fff, 0x4) sendto$inet(r1, &(0x7f0000000180)="9e", 0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x4, 0x3, 0x39, 0x0, 0x400, 0x0, 0xe, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0xe}, 0x40020, 0x8, 0x5, 0x5, 0x40, 0x6, 0x8000}, 0x0, 0xe, 0xffffffffffffffff, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) msgget$private(0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000008, 0x11, r0, 0x57173000) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 23:11:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000000c0)=0x4) 23:11:19 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/hwrng\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r1) 23:11:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x1e5, 0x0, 0x0) [ 294.205178][T11871] loop5: detected capacity change from 270 to 0 23:11:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/udmabuf\x00', 0x2) sendfile(r1, r0, &(0x7f0000000000)=0x8001, 0x9) 23:11:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 23:11:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x1e5, 0x0, 0x0) 23:11:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000540000004f801", 0x17}, {0x0}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'ascii'}}]}) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000500)) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x9) open(0x0, 0x1031fe, 0x0) 23:11:20 executing program 3: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x14}, 0x10) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x44, 0x0, 0x200, 0x70bd25, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x30}}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}]}]}, 0x44}}, 0x8880) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000001bc0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4044001) r0 = socket$nl_generic(0x10, 0x3, 0x10) timer_getoverrun(0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, 0x0, 0x4001) socketpair(0x21, 0x0, 0x0, &(0x7f0000002440)) timer_gettime(0x0, &(0x7f00000030c0)) 23:11:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000001140)=[{&(0x7f00000003c0)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x1e5, 0x0, 0x0) 23:11:20 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab3647b4b3c5d05692e664ebf68e6faa53367f05f4ad4142134b62f11e931e7d6aead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7a203a2cff784e", 0xab}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 23:11:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000006940000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d0700000000", 0x4d, 0x10000}, {0x0}, {0x0}, {0x0, 0x0, 0x500000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) 23:11:20 executing program 3: syz_mount_image$tmpfs(&(0x7f0000002340)='tmpfs\x00', &(0x7f0000002380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002880)={[{@size={'size'}}]}) 23:11:20 executing program 4: modify_ldt$write(0x1, &(0x7f0000000000)={0x7ff}, 0x10) [ 295.082782][T11902] loop5: detected capacity change from 270 to 0 23:11:20 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2000050, 0x0) r1 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r1, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) unshare(0x40600) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000300)='Y', 0x1}], 0x1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 295.318361][T11915] tmpfs: Bad value for 'size' [ 295.325216][T11915] tmpfs: Bad value for 'size' 23:11:20 executing program 3: syz_mount_image$tmpfs(&(0x7f0000002340)='tmpfs\x00', 0x0, 0x0, 0x1, &(0x7f00000027c0)=[{&(0x7f00000023c0)='1', 0x1}], 0x0, &(0x7f0000002880)) 23:11:20 executing program 0: ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) 23:11:20 executing program 4: select(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xea60}) 23:11:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000540000004f801", 0x17}, {0x0}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'ascii'}}]}) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000500)) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x9) open(0x0, 0x1031fe, 0x0) [ 295.427422][T11919] loop1: detected capacity change from 20480 to 0 [ 295.545830][T11919] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 0 transid 7 /dev/loop1 scanned by syz-executor.1 (11919) [ 295.568085][T11925] loop0: detected capacity change from 256 to 0 [ 295.717171][T11938] loop5: detected capacity change from 270 to 0 23:11:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000500)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000010500)="ff030400fc030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1000, 0x2000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x410481, 0x0) pwritev(r0, &(0x7f00000014c0)=[{&(0x7f0000000080)="d69f3271", 0x8800000}], 0x1, 0xa, 0x900300) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 295.790255][T11919] loop1: detected capacity change from 20480 to 0 23:11:21 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES16, @ANYBLOB]) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) r0 = gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0xe265}], 0x1, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) semtimedop(r1, &(0x7f0000000180)=[{0x0, 0x38, 0x1000}, {0x1, 0x3}, {0x0, 0x8, 0x1800}, {0x0, 0x3, 0x1800}, {0x4, 0x2bd, 0x1000}, {0x1, 0x7ff, 0x1000}], 0x6, &(0x7f00000001c0)={0x0, 0x3938700}) chdir(&(0x7f0000000000)='./file0\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 23:11:21 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab3647b4b3c5d05692e664ebf68e6faa53367f05f4ad4142134b62f11e931e7d6aead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7a203a2cff78", 0xaa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 296.022658][T11952] loop4: detected capacity change from 545 to 0 23:11:21 executing program 1: prctl$PR_SET_DUMPABLE(0x21, 0x0) [ 296.062777][T11952] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 23:11:21 executing program 0: socket$alg(0x26, 0x5, 0x0) select(0x40, &(0x7f0000000280), &(0x7f0000000340)={0x9}, 0x0, 0x0) [ 296.122363][T11962] ptrace attach of "/root/syz-executor.0"[11961] was attempted by "/root/syz-executor.0"[11962] 23:11:21 executing program 5: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) io_uring_enter(r1, 0x7f54, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) [ 296.196484][T11960] IPVS: ftp: loaded support on port[0] = 21 [ 296.235152][T11965] IPVS: ftp: loaded support on port[0] = 21 23:11:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc5, 0xc5, 0x5, [@func, @datasec={0x0, 0x6, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}], "c9"}, @restrict, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xe5}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 23:11:21 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f8e4", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000240)={[{@uni_xlateno='uni_xlate=0'}]}) 23:11:21 executing program 0: mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000240)='./file1\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,index=on']) chdir(&(0x7f0000000140)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000280)=0x8) 23:11:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f801", 0x17, 0x4c}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000240)) 23:11:21 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000400)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) [ 296.607989][T12024] ptrace attach of "/root/syz-executor.4"[12019] was attempted by "/root/syz-executor.4"[12024] [ 296.719545][T12023] loop2: detected capacity change from 6 to 0 [ 296.767997][T12022] overlayfs: failed to resolve './bus': -2 [ 296.827298][T12026] overlayfs: './file0' not a directory [ 296.860139][T12029] loop1: detected capacity change from 6 to 0 [ 296.985084][T12023] FAT-fs (loop2): Directory bread(block 457) failed [ 296.994383][T12023] FAT-fs (loop2): Directory bread(block 458) failed [ 297.004659][T12023] FAT-fs (loop2): Directory bread(block 459) failed [ 297.015410][T12023] FAT-fs (loop2): Directory bread(block 460) failed [ 297.024449][T12023] FAT-fs (loop2): Directory bread(block 461) failed [ 297.043492][T12023] FAT-fs (loop2): Directory bread(block 462) failed [ 297.056202][T12023] FAT-fs (loop2): Directory bread(block 463) failed 23:11:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 297.139198][T12023] FAT-fs (loop2): Directory bread(block 464) failed 23:11:22 executing program 4: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x81, 0x10000, 0x0, 0x0, 0x0) [ 297.201742][T12023] FAT-fs (loop2): Directory bread(block 465) failed [ 297.252184][T12023] FAT-fs (loop2): Directory bread(block 466) failed [ 297.260448][T12029] FAT-fs (loop1): bogus number of reserved sectors [ 297.267205][T12029] FAT-fs (loop1): Can't find a valid FAT filesystem 23:11:27 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES16, @ANYBLOB]) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) r0 = gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0xe265}], 0x1, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) semtimedop(r1, &(0x7f0000000180)=[{0x0, 0x38, 0x1000}, {0x1, 0x3}, {0x0, 0x8, 0x1800}, {0x0, 0x3, 0x1800}, {0x4, 0x2bd, 0x1000}, {0x1, 0x7ff, 0x1000}], 0x6, &(0x7f00000001c0)={0x0, 0x3938700}) chdir(&(0x7f0000000000)='./file0\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 23:11:27 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f801", 0x17, 0x4c}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000240)) 23:11:27 executing program 4: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x2000000) 23:11:27 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 23:11:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f8e4", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000240)={[{@uni_xlateno='uni_xlate=0'}]}) 23:11:27 executing program 5: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) io_uring_enter(r1, 0x7f54, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) 23:11:27 executing program 5: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) io_uring_enter(r1, 0x7f54, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) [ 301.905996][T12089] loop2: detected capacity change from 6 to 0 [ 301.956399][T12102] ptrace attach of "/root/syz-executor.3"[12099] was attempted by "/root/syz-executor.3"[12102] [ 302.019794][T12093] loop1: detected capacity change from 6 to 0 23:11:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000580)=ANY=[], 0x23) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x84042, 0x0) sendfile(r1, r2, 0x0, 0x200004) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) writev(r3, 0x0, 0x0) 23:11:27 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000100)='D') [ 302.239601][T12099] IPVS: ftp: loaded support on port[0] = 21 [ 302.248134][T12089] FAT-fs (loop2): Directory bread(block 457) failed [ 302.317987][T12089] FAT-fs (loop2): Directory bread(block 458) failed 23:11:27 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='svcrdma_send_failed\x00'}, 0x10) 23:11:27 executing program 5: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) io_uring_enter(r1, 0x7f54, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) [ 302.419967][T12089] FAT-fs (loop2): Directory bread(block 459) failed [ 302.448438][T12093] FAT-fs (loop1): bogus number of reserved sectors [ 302.458802][T12093] FAT-fs (loop1): Can't find a valid FAT filesystem [ 302.478455][T12089] FAT-fs (loop2): Directory bread(block 460) failed [ 302.482572][T12089] FAT-fs (loop2): Directory bread(block 461) failed [ 302.484200][T12089] FAT-fs (loop2): Directory bread(block 462) failed [ 302.486001][T12089] FAT-fs (loop2): Directory bread(block 463) failed 23:11:28 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES16, @ANYBLOB]) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) r0 = gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0xe265}], 0x1, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) semtimedop(r1, &(0x7f0000000180)=[{0x0, 0x38, 0x1000}, {0x1, 0x3}, {0x0, 0x8, 0x1800}, {0x0, 0x3, 0x1800}, {0x4, 0x2bd, 0x1000}, {0x1, 0x7ff, 0x1000}], 0x6, &(0x7f00000001c0)={0x0, 0x3938700}) chdir(&(0x7f0000000000)='./file0\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) [ 302.681003][T12089] FAT-fs (loop2): Directory bread(block 464) failed [ 302.709550][ T36] audit: type=1800 audit(1610493087.973:77): pid=12121 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16106 res=0 errno=0 23:11:28 executing program 4: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x583040) r0 = bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000300)}, 0xfffffff1) socket$packet(0x11, 0x2, 0x300) syz_read_part_table(0x0, 0x8, &(0x7f0000000980)=[{0x0}, {&(0x7f0000000440)}, {0x0}, {&(0x7f0000000700)="1e3ecdef234dbcb85fe94c13ef841417e1ebd02e0173933de77835e73d3a29ae73171c705d0cf91ce636c65ef10f7abb34777353077158856e86475c1247f975095883268234298ce61174f6cbfa9ef670913bb30c6e37a49a25d8b29c5ed8e8e2e70552bc743b185f4393fbf121337048130d70d38401262fb0c003a60fc90eb61878a27ca42c613f34a75b713f13fead703b8cf19011584bfae48c1190b5b6c3446ec206c491ee95cd31ab2ff861ddf9bb6361ab33c4baf3cbcba44c1d6ca77e541c69bc727484", 0xc8, 0x71d}, {&(0x7f0000000040)="f67d13d19d6851b5ad0e93f2c0501d38205a53f40057b322c4148e", 0x1b}, {&(0x7f0000001080)="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", 0xff8, 0x8}, {&(0x7f0000000800)="dde3a77fbcb9414cf2bdefe446a2cf1521d93ba48f4ef9c260056c91738b919f679a3c105920d43e3f70df5bf02ddf65a643f4ae23bded1010a3fc6e3b3c1113366f44315a15d3ad66e95e8b6a22931200282c33380b9d54a3052bfc9c405d702d6d4c8eff16386739ba2e929f7b033b8f943845a3a5a38026484372f340f602d25e7e857c46ecff21824c4ef37783ff8e4efe7edb805033c0519390318b54f1ca753e8c9e6ba8dc1146ddddeaad84a27dbb0253da6e9b69840a043fca9551", 0xbf, 0x80000001}, {&(0x7f00000008c0)="cb1456084a8e930e1a1694216e2ecf3a13d77a4c232fc4d57739634e7cf0ff9c314ef8b9564c5de90e073b6b70a8fde236faf2322d62958fac11e2ea0dd9ad41f994ba03fe4033454d9410e85aee75eec559fa296eb4d50359f08ec659d09ac67d7b0dc630070ed0b08c368a2d6b2a5a8ff61ebad651a2f558ad71cf48ce66d8006e59f1170a61728665befe164633578c45e9014a", 0x95, 0xfc}]) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)}, 0x0) pipe(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={0x0, 0x101, 0x18}, 0xc) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) [ 302.743168][T12089] FAT-fs (loop2): Directory bread(block 465) failed [ 302.749920][T12089] FAT-fs (loop2): Directory bread(block 466) failed 23:11:28 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f801", 0x17, 0x4c}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000240)) [ 302.845621][ T36] audit: type=1800 audit(1610493088.113:78): pid=12121 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=16106 res=0 errno=0 23:11:28 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={[0x800]}, 0x8}) 23:11:28 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x2, 0x8}) [ 303.053898][T12156] loop1: detected capacity change from 6 to 0 [ 303.133131][T12155] loop4: detected capacity change from 264192 to 0 [ 303.205963][T12156] FAT-fs (loop1): bogus number of reserved sectors [ 303.227295][T12156] FAT-fs (loop1): Can't find a valid FAT filesystem [ 303.300648][T12169] loop4: detected capacity change from 264192 to 0 23:11:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f8e4", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000240)={[{@uni_xlateno='uni_xlate=0'}]}) 23:11:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x7}, 0x40) 23:11:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300506, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00200000000086dd60b4090000000000fe80000000a800faffe00000cf000201002200100ad0469600000f20018830907800c2"], 0x0) [ 303.579406][T12154] IPVS: ftp: loaded support on port[0] = 21 23:11:28 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f801", 0x17, 0x4c}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000240)) 23:11:29 executing program 0: clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x5, [@func, @restrict, @ptr, @func_proto, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x85}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:11:29 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000200)={0x2}) [ 303.917529][T12186] loop1: detected capacity change from 6 to 0 [ 303.972742][T12193] ptrace attach of "/root/syz-executor.0"[12188] was attempted by "/root/syz-executor.0"[12193] 23:11:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x1, &(0x7f00000003c0)=@raw=[@ldst={0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc}], &(0x7f0000000400)='syzkaller\x00', 0x7, 0xee, &(0x7f0000000440)=""/238, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 304.300076][T12186] FAT-fs (loop1): bogus number of reserved sectors 23:11:29 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES16, @ANYBLOB]) mkdirat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x0) r0 = gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0xe265}], 0x1, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) clone(0x6cbaa500, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(0x0, 0x0, 0x0, 0x0) semtimedop(r1, &(0x7f0000000180)=[{0x0, 0x38, 0x1000}, {0x1, 0x3}, {0x0, 0x8, 0x1800}, {0x0, 0x3, 0x1800}, {0x4, 0x2bd, 0x1000}, {0x1, 0x7ff, 0x1000}], 0x6, &(0x7f00000001c0)={0x0, 0x3938700}) chdir(&(0x7f0000000000)='./file0\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 23:11:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0x5, [@func, @restrict, @ptr, @func_proto, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x79}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 304.303107][T12186] FAT-fs (loop1): Can't find a valid FAT filesystem 23:11:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 23:11:29 executing program 5: mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000240)='./file1\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,index=on']) chdir(&(0x7f0000000140)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) 23:11:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xc}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xe8, &(0x7f00000000c0)=""/232, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 304.470853][T12230] ptrace attach of "/root/syz-executor.5"[12229] was attempted by "/root/syz-executor.5"[12230] [ 304.507224][T12222] loop2: detected capacity change from 6 to 0 [ 305.083900][T12245] overlayfs: failed to resolve './bus': -2 [ 305.114144][T12222] FAT-fs (loop2): Directory bread(block 457) failed [ 305.132041][T12222] FAT-fs (loop2): Directory bread(block 458) failed [ 305.152195][T12222] FAT-fs (loop2): Directory bread(block 459) failed [ 305.168340][T12246] overlayfs: './file0' not a directory [ 305.187720][T12222] FAT-fs (loop2): Directory bread(block 460) failed [ 305.213567][T12222] FAT-fs (loop2): Directory bread(block 461) failed [ 305.237474][T12222] FAT-fs (loop2): Directory bread(block 462) failed [ 305.272782][T12222] FAT-fs (loop2): Directory bread(block 463) failed [ 305.298513][T12222] FAT-fs (loop2): Directory bread(block 464) failed [ 305.312220][T12238] IPVS: ftp: loaded support on port[0] = 21 [ 305.362798][T12222] FAT-fs (loop2): Directory bread(block 465) failed [ 305.374216][T12222] FAT-fs (loop2): Directory bread(block 466) failed 23:11:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000280010002407e0004f8e4", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000240)={[{@uni_xlateno='uni_xlate=0'}]}) 23:11:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x7, 0x0, 0x0, 0x0, 0xfd366b30040cf408}, 0x40) 23:11:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{}, [], {0x95, 0x2}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xe8, &(0x7f00000000c0)=""/232, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:11:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x5, [@func, @restrict, @ptr, @func_proto, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x8d}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 23:11:31 executing program 5: mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000240)='./file1\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,index=on']) chdir(&(0x7f0000000140)='./file1\x00') r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) 23:11:31 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0xf0, 0x4, [@struct={0x0, 0x9, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @func, @restrict, @ptr, @func_proto, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x10c}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 305.854650][T12282] ptrace attach of "/root/syz-executor.3"[12278] was attempted by "/root/syz-executor.3"[12282] [ 305.855020][T12283] ptrace attach of "/root/syz-executor.4"[12277] was attempted by "/root/syz-executor.4"[12283] 23:11:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1a00) 23:11:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{}, [], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xe8, &(0x7f00000000c0)=""/232, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:11:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0x14, 0x0, &(0x7f0000000040)) 23:11:31 executing program 1: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x10000, 0x0, &(0x7f0000000040), 0x0) 23:11:31 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0xb, 0x0, &(0x7f0000000040)) 23:11:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 306.195765][T12297] loop2: detected capacity change from 6 to 0 [ 306.535634][T12297] FAT-fs (loop2): Directory bread(block 457) failed [ 306.544014][T12297] FAT-fs (loop2): Directory bread(block 458) failed [ 306.557126][T12297] FAT-fs (loop2): Directory bread(block 459) failed [ 306.594376][T12297] FAT-fs (loop2): Directory bread(block 460) failed [ 306.613395][T12297] FAT-fs (loop2): Directory bread(block 461) failed [ 306.626624][T12297] FAT-fs (loop2): Directory bread(block 462) failed [ 306.637298][T12297] FAT-fs (loop2): Directory bread(block 463) failed [ 306.648463][T12297] FAT-fs (loop2): Directory bread(block 464) failed [ 306.657088][T12297] FAT-fs (loop2): Directory bread(block 465) failed [ 306.676889][T12297] FAT-fs (loop2): Directory bread(block 466) failed [ 306.702754][T12308] IPVS: ftp: loaded support on port[0] = 21 [ 307.018704][T12308] IPVS: ftp: loaded support on port[0] = 21 23:11:32 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0xc, 0x0, &(0x7f0000000040)) 23:11:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 23:11:32 executing program 1: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x10000, 0x0, &(0x7f0000000040), 0x0) 23:11:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f0000000180)=@framed={{}, [@call]}, &(0x7f00000001c0)='GPL\x00', 0x7, 0xd2, &(0x7f0000000200)=""/210, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:11:32 executing program 2: fsopen(&(0x7f0000000e00)='autofs\x00', 0x0) 23:11:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:11:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{}, [], {0x95, 0x0, 0x0, 0x1800}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xe8, &(0x7f00000000c0)=""/232, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:11:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/config\x00') read$FUSE(r0, &(0x7f00000028c0)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 23:11:32 executing program 0: mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x1000004, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x14) 23:11:32 executing program 1: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x10000, 0x0, &(0x7f0000000040), 0x0) 23:11:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000000)=@framed={{}, [@func, @jmp, @jmp, @exit]}, &(0x7f0000000080)='GPL\x00', 0x7, 0xe8, &(0x7f00000000c0)=""/232, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:11:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private1}}) 23:11:32 executing program 4: r0 = fsopen(&(0x7f0000000e00)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000e40)='cgroup.threads\x00', &(0x7f0000000e80)='\x00', 0x0) 23:11:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbd, 0xbd, 0x5, [@func, @datasec={0x0, 0x6, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}], "c9"}, @restrict, @ptr, @func_proto, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xdd}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 23:11:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x19}, 0x40) 23:11:33 executing program 1: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x10000, 0x0, &(0x7f0000000040), 0x0) 23:11:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x7], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:11:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x12, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:11:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300506, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00200000000086dd60b4090000000000fe80000000a800faffe00000cf000201002200100ad0469600000f20018830907800c2040030"], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 23:11:33 executing program 5: syz_io_uring_complete(0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 307.964808][T12394] ptrace attach of "/root/syz-executor.5"[12393] was attempted by "/root/syz-executor.5"[12394] 23:11:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xff00}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xe8, &(0x7f00000000c0)=""/232, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:11:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 23:11:33 executing program 4: semop(0x0, &(0x7f0000000080)=[{}, {0x0, 0xffff}], 0x2) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = fcntl$dupfd(r0, 0x0, r1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x23, &(0x7f0000000000)=0x1c00, 0xfe6a) 23:11:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000001480)) 23:11:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x87a40780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x5, [@func, @restrict, @ptr, @func_proto, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x85}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 23:11:33 executing program 3: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x10000000) [ 308.294229][T12411] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:11:33 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2, 0x6a840) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) [ 308.338145][T12411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 308.387767][T12411] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 23:11:33 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x20) 23:11:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[], 0x14}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000180)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}) clone(0x2008c100, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 23:11:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) [ 308.485908][T12427] ptrace attach of "/root/syz-executor.5"[12426] was attempted by "/root/syz-executor.5"[12427] 23:11:33 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) sendmsg(r0, &(0x7f0000000680)={0x0, 0x13000011, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0xffffff1f}], 0x8, 0x0, 0x0, 0xf00}, 0x7ffff) 23:11:33 executing program 3: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x10000000) 23:11:33 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)="240000002e0007031dff12956fa283007e66658327a28c56000085680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 308.657838][T12436] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:11:34 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) [ 308.947225][T12449] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 308.993426][T12449] team0: Device ipvlan0 failed to register rx_handler 23:11:34 executing program 2: r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 23:11:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet6(r0, &(0x7f0000001180)={&(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c, &(0x7f0000001140)=[{&(0x7f0000000080)='t', 0x1}], 0x1}, 0x40) 23:11:34 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x2bb98205) splice(r0, 0x0, r2, 0x0, 0x4ff9c, 0x0) 23:11:34 executing program 3: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x10000000) 23:11:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x8c401, 0x0) 23:11:34 executing program 2: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/vm/compact_memory\x00', 0x1, 0x0) write$sysctl(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 23:11:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000100)={0x8}, 0x10) write(r2, &(0x7f0000000080)="240000004a005f0014f9f407000904000a00000000000000000000000400020000000000", 0x24) [ 309.525512][T12449] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 309.541455][T12461] syz-executor.0 (12461) used greatest stack depth: 22288 bytes left 23:11:34 executing program 3: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x10000000) 23:11:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x8c401, 0x0) [ 309.581972][T12449] team0: Device ipvlan0 failed to register rx_handler 23:11:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1003, 0x2, 0x0, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000002c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) 23:11:35 executing program 3: clone3(&(0x7f0000002180)={0x88000, 0x0, 0x0, 0x0, {}, &(0x7f0000000100)=""/4096, 0x1000, 0x0, 0x0}, 0x58) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 23:11:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x68000000, &(0x7f0000000400)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef410000000e3bd6efb290009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 23:11:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0xa01, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) 23:11:35 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 310.412009][T12490] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 310.450332][T12490] team0: Cannot enslave team device to itself 23:11:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) open$dir(&(0x7f0000000040)='./file2\x00', 0x0, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0) 23:11:35 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x20048170) 23:11:36 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000000), 0x4) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfe, 0x80000}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f00000003c0)=0x6, 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001240)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 310.733703][T12503] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 310.789463][T12503] team0: Device ipvlan0 failed to register rx_handler 23:11:36 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r0, &(0x7f0000003e80)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}}, 0x24) 23:11:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000002880)=""/4106, &(0x7f0000000040)=0x100a) 23:11:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000100)=0xfd) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000440)="e9", 0x1, r3) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r5, r5}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) 23:11:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) 23:11:36 executing program 0: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff4000/0x3000)=nil) 23:11:36 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000003c0)=0x31) [ 311.572708][T12527] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 311.617439][T12527] team0: Cannot enslave team device to itself 23:11:37 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000940)=""/4087, 0xff7}], 0x1) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x353e9682, 0x0, "00000000000000000000e6ffffffffffffff00"}) read(r1, &(0x7f00000001c0)=""/29, 0x1d) 23:11:37 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 23:11:37 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/seq\x00', 0xa6000) 23:11:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000001240)=[{&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001140)=[{&(0x7f0000000080)="87", 0x1}], 0x1, &(0x7f0000001180)=[@init={0x18, 0x84, 0x0, {0x2}}], 0x18}], 0x1, 0x0) 23:11:37 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000900)={0x2020}, 0x2020) 23:11:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000940)=""/4087, 0xff7}], 0x1) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x353e9682, 0x0, "00000000000000000000e6ffffffffffffff00"}) read(r1, &(0x7f00000001c0)=""/29, 0x1d) [ 312.337281][T12553] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 23:11:37 executing program 3: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x9}}) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 312.413586][T12553] team0: Device ipvlan0 failed to register rx_handler 23:11:37 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) llistxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 23:11:37 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8a040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x2) 23:11:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000940)=""/4087, 0xff7}], 0x1) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x353e9682, 0x0, "00000000000000000000e6ffffffffffffff00"}) read(r1, &(0x7f00000001c0)=""/29, 0x1d) 23:11:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x50, 0x2, 0x6, 0x5, 0x0, 0x9000000, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x20}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x50}}, 0x0) [ 312.737802][ T36] audit: type=1326 audit(1610493098.003:79): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12564 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0xffff0000 23:11:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:38 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000100)=0x9) 23:11:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f0000000940)=""/4087, 0xff7}], 0x1) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x353e9682, 0x0, "00000000000000000000e6ffffffffffffff00"}) read(r1, &(0x7f00000001c0)=""/29, 0x1d) 23:11:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x50, 0x2, 0x6, 0x5, 0x0, 0x9000000, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x20}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x50}}, 0x0) 23:11:38 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r0, &(0x7f00000003c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60, 0x0, 0x0, {{0x0, 0x3}}}, 0x60) syz_open_procfs(r2, 0x0) 23:11:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x50, 0x2, 0x6, 0x5, 0x0, 0x9000000, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x20}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x50}}, 0x0) 23:11:38 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 23:11:38 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141242, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x17e, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x1003) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 313.629798][T12591] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 313.652813][T12591] team0: Device ipvlan0 failed to register rx_handler 23:11:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) 23:11:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) utime(&(0x7f0000000100)='./file0\x00', 0x0) 23:11:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x50, 0x2, 0x6, 0x5, 0x0, 0x9000000, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x20}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x50}}, 0x0) 23:11:39 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000080)={0x283}) [ 313.906517][ T36] audit: type=1326 audit(1610493099.173:80): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12601 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0xffff0000 [ 314.046058][ T36] audit: type=1326 audit(1610493099.253:81): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12603 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0xffff0000 23:11:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') 23:11:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) 23:11:39 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_slab\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x80000001) [ 314.524400][ T36] audit: type=1326 audit(1610493099.793:82): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12616 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0xffff0000 23:11:39 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r0, &(0x7f0000000080)="03093cc07d0225f93eb8166b7fcdbf", 0xfffffffffffffeb2, 0x4040, 0x0, 0x3e) 23:11:39 executing program 4: mremap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ff4000/0x3000)=nil) [ 314.706793][ T36] audit: type=1326 audit(1610493099.793:83): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12617 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0xffff0000 23:11:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xfffffffc}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) llistxattr(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 23:11:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000000)) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000002200)) 23:11:40 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x20000000) 23:11:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@gettclass={0x24, 0x2a, 0x309}, 0x24}}, 0x0) 23:11:40 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000140)={0x0, 0x0, 0x0, [], [0x0, 0x7]}) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r3 = openat(r2, &(0x7f0000000bc0)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xf, 0x10012, r4, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000140)=ANY=[]) 23:11:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) [ 315.315529][ T36] audit: type=1326 audit(1610493100.583:84): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=12632 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x46107a code=0xffff0000 23:11:40 executing program 0: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x60070, 0xffffffffffffffff, 0x0) 23:11:40 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r1, &(0x7f0000000080)="03093cc07d0225f93eb8166b7fcdbf", 0xffffffdb, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f00000000c0)=""/4096, 0xffffffffffffffbc, 0x0, 0x0, 0x0) 23:11:40 executing program 1: mremap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) mbind(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, &(0x7f0000000000)=0xe91d, 0x7ff, 0x0) 23:11:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:40 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x13, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:11:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x5, 0x70, 0x0, 0x40, 0xff, 0x7f, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000280), 0xe}, 0x40, 0x0, 0x5a3b, 0x6, 0x0, 0x1ff, 0xadf}) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x4000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) close(r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 23:11:41 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={0x0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x6, 0x0, 0x31, 0x1, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf812}, 0x2, 0x9, 0x9, 0x0, 0x91}, 0xffffffffffffffff, 0x0, r4, 0x6) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x0, 0x8e, 0x0, 0x4, 0x0, 0x1, 0x800, 0xc1d99c585266486d, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0x187e}, 0x1000, 0x4, 0x3, 0x7, 0xc70f, 0xa7a9, 0x5c}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@isdn={0x22, 0x89, 0x0, 0x5}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/715], 0x1a0}, 0x44004) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000ac0)='\'%}p,!!$\x00') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r2, 0x0, 0xa8, 0xb7, &(0x7f0000000240)="2b36d34c2888b1b33dfad744788303dec3e5b6f2314bf488aa1101e2ff5bdb25469552bec274fa7514f9433967c9f301fe416d6d471107fcda402697104458bf69693f4d47e45e951bcbc52fcd844a1e0f8d54c59fce005a16fc115a12d2fcf2fc6377ebd82ece785bdf926e7cd46ca2185288485735ab33f4778c64299f9162d2e5b3f6a02731619b71860903bb633310eed28bffa04b15d2069499ce50749b1df4aee0d85a3a6f", &(0x7f0000000380)=""/183, 0x6, 0x0, 0x62, 0x9a, &(0x7f0000000440)="b4faf44ab2513d29856fc60c2370990ee6663c472c3c4d78e94d2b0dc2a03579353888733063514bd1057597edac8444b8e00a3903fe0565fd66afb3677a2eb9ac88a6e67c6fcb1d6f903403a861707d6e1121023e058c84ea3e9efbbc708c8246dc", &(0x7f0000000740)="3c77738b94951a631be42b5b42acc32ed4edac80314e725d1d55269cab6d4daa529693e359de95cadb3ff264d24c09f75dda085b637881783c74ce0add74535e46a2d6a70b615e08f421cf792f87f68f59e1073fa374312d4b10d38dba233243cf1777e8f0f677bf825a700b3a07a99e827db3189efdd5b2f83b4c35161b77d4cfe972cf439909f7da4d13d8f2d7caaba064ab5d1753b4f614cb", 0x0, 0x1ff}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 23:11:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440), 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8090) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 23:11:41 executing program 5: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001340)='./cgroup/syz0\x00', 0x200002, 0x0) close(r0) 23:11:41 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffd0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10, 0xfffffffffffffe8d, &(0x7f0000000500)="b9ff0300600d698cb89e14f043051fffffff00004000632f77fb0514140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x200, 0x60000000, 0xb20c, 0xfffffffffffffe09, &(0x7f0000000040)="3f58266c799726865bf7830e3773dce9aa7e76becc18910b7b50b80dbed5f757c2a04467671d72f716595ff422e71a25d906dcc8c7000000000000000000"}, 0x28) 23:11:41 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000480)={&(0x7f0000000080)=@id, 0x10, 0x0, 0x0, 0x0, 0x101d0}, 0x0) [ 316.715885][T12672] device wlan1 entered promiscuous mode [ 316.777606][T12680] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 316.821887][T12680] team0: Device ipvlan0 failed to register rx_handler 23:11:42 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x8e, 0x0, 0x4, 0x0, 0x1, 0x800, 0xc1d99c585266486d, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0x187e}, 0x1000, 0x4, 0x3, 0x7, 0xc70f, 0xa7a9, 0x5c}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/715], 0x1a0}, 0x44004) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000ac0)='\'%}p,!!$\x00') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x12\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 23:11:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="b702000001000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4782837f8c8903a431ca711fcd0cdf2146ec56175037958e271f60d25b7ff01000005005af06c83923dd29c034055b67dafe6c8dc215d787a74a009dc56fdf382fbbb7db6061ff110026e67e26d2efe31ab7ea0c34f17e3ad6ea406622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21436619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6083be89358b2050021797eea09c346df9e85f80d45a479131700000000000000334d83ace8be6e80e71113610e10d858e8327af01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fb40000000000005fddeea0c6e95767d42b4e54861d0227dbfd246d7f715a7f3deadd02000000000000003767d2e24f296ea0182babc18cae2ed4b4390af8a9ceafd07ed00b00009727808700146000000000000000fa0089eafd9a546bfa8e2bdff190adc5f9d555ca2c46e10811a4e78e80a63f27539b4e3968bf931462bcbc5a6f33078e7eb5950000000001000000cb8bea4b40559169ebb5f3667895050000000000000038344e12d50ea59c5eef219d29999ba9b6017e0506e8e6dbd7e8b1e2dd0d3cbd3cf060d5efb6cf8664c37f74753b2c0fac823e4c83d78bfebb64dbeb16b29f924571923d3bffa80a423cceafa24386110897e147b7b878df1ba7d887d02e48abd049a2dcd6d421a97c3b5a00cc014b0171e535699e9be07d6246de8de2c57bc1da71942df987ae3eec9e1f4bd5c873343e443405abf4c12e95830afc42555cb19fcd9046099c2c24603ece05cfd0070045d9c69bfb4f7913063f3c253426982d78f010b8f80bb3c83d091bc1bec638d8300479f9df307f38859110bd05842eae3bced49a24644c237dce13485352e7f7c301000000000000392d8b8b95fbfbec94ccf3fd7f85c1ab560185cbe9e34bd1a3049449d2d393d23d201ee73f3d6bd0a2f3225d684e345da168fb4685dfd2c89bf912e01be64375b4003c689ebc5403a4e87510c060d16c404b931b198fa3f97d66e545dc746b1df5fcef6735fc6fa0fb0968d279be956163dc371d177e944ce01a7731319adabcb27781ca0b3693ddb6b2e4037a9e74dea8b430911e24e58fe79996fd47d772fdc959f610dc3fc2642796bf2bacd38770f79ce533ca9f28a8dc1ba12d0000000000000000000000f7416352a66c11e95f36acb54b3cb2ab849170f72c70f82301a1ac39fc0a64e7dd1d5cf2bdcea9f4be23c9d8472a5c50671ff0bb57ce865c6b63e6dfa6ad24d0f5de0137a5cef12a7123f834213777aaa72050cb04bea3d70000000000000000000000004728f8835d54b25a46ebb7f1b679776494b12979132c4fbdeee72edb5ac5a50780fc75052500000000000000000000000000d652d6c3d85582883a8e1385596f232873da205a8fd4817e441ed767f032615e0b866a4d72a4b9e8cb0c45adceddbf8b4f7be7f005f94c0c67c4a4c47408fd25c2acab97588e023b4dab6ec5f3b777b3ce25e1a24cf0ac443ef8427ad9e22ea5d888f07002ef6d944708cdab8897952e5e5ecc10c7e8b7b3e0b684701c7f38e2f2192a5bf58c43127cf144e4f6ee5ffccd2ab4e38003008d4e79d6f34a6d736785e3b2018322bddc395943613fdc07e9597c8bbbc645850c20f65bc7af5a14ff30885d1b07ab520c199fac3bbf03837a1dc957f10ff0d0aaf83fbb9612ab2bdcf378c3bad66fcbff440ce20805e476b7c5f9bfec770ecdb7cae6cf302679bd4c2ebe72e35c1543ad3ca19c1c03d8ca26cb7471a0224d68fa4557ce13a68ff182639bdf19339d8aa036008e807220971fd738535fb6f1fe044badbe8bd3bf02beac85f2000000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffd0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10, 0xfffffffffffffe8d, &(0x7f0000000500)="b9ff0300600d698cb89e14f043051fffffff00004000632f77fb0514140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x200, 0x60000000, 0xb20c, 0xfffffffffffffe09, &(0x7f0000000040)="3f58266c799726865bf7830e3773dce9aa7e76becc18910b7b50b80dbed5f757c2a04467671d72f716595ff422e71a25d906dcc8c7000000000000000000"}, 0x28) 23:11:42 executing program 2: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0}, 0x10) 23:11:42 executing program 5: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x5}]}) [ 317.548843][T12676] device syzkaller1 entered promiscuous mode 23:11:42 executing program 4: socketpair(0x2, 0xa, 0x9, &(0x7f0000000000)) [ 317.822315][T12670] device wlan1 left promiscuous mode [ 318.222558][T12695] device wlan1 entered promiscuous mode 23:11:43 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={0x0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x6, 0x0, 0x31, 0x1, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf812}, 0x2, 0x9, 0x9, 0x0, 0x91}, 0xffffffffffffffff, 0x0, r4, 0x6) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x0, 0x8e, 0x0, 0x4, 0x0, 0x1, 0x800, 0xc1d99c585266486d, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0x187e}, 0x1000, 0x4, 0x3, 0x7, 0xc70f, 0xa7a9, 0x5c}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@isdn={0x22, 0x89, 0x0, 0x5}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/715], 0x1a0}, 0x44004) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000ac0)='\'%}p,!!$\x00') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r2, 0x0, 0xa8, 0xb7, &(0x7f0000000240)="2b36d34c2888b1b33dfad744788303dec3e5b6f2314bf488aa1101e2ff5bdb25469552bec274fa7514f9433967c9f301fe416d6d471107fcda402697104458bf69693f4d47e45e951bcbc52fcd844a1e0f8d54c59fce005a16fc115a12d2fcf2fc6377ebd82ece785bdf926e7cd46ca2185288485735ab33f4778c64299f9162d2e5b3f6a02731619b71860903bb633310eed28bffa04b15d2069499ce50749b1df4aee0d85a3a6f", &(0x7f0000000380)=""/183, 0x6, 0x0, 0x62, 0x9a, &(0x7f0000000440)="b4faf44ab2513d29856fc60c2370990ee6663c472c3c4d78e94d2b0dc2a03579353888733063514bd1057597edac8444b8e00a3903fe0565fd66afb3677a2eb9ac88a6e67c6fcb1d6f903403a861707d6e1121023e058c84ea3e9efbbc708c8246dc", &(0x7f0000000740)="3c77738b94951a631be42b5b42acc32ed4edac80314e725d1d55269cab6d4daa529693e359de95cadb3ff264d24c09f75dda085b637881783c74ce0add74535e46a2d6a70b615e08f421cf792f87f68f59e1073fa374312d4b10d38dba233243cf1777e8f0f677bf825a700b3a07a99e827db3189efdd5b2f83b4c35161b77d4cfe972cf439909f7da4d13d8f2d7caaba064ab5d1753b4f614cb", 0x0, 0x1ff}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 319.291110][T12711] device wlan1 entered promiscuous mode [ 319.297653][T12717] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 319.328444][T12717] team0: Device ipvlan0 failed to register rx_handler [ 320.169423][T12722] device wlan1 left promiscuous mode [ 320.445882][T12727] device wlan1 left promiscuous mode 23:11:46 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={0x0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x6, 0x0, 0x31, 0x1, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf812}, 0x2, 0x9, 0x9, 0x0, 0x91}, 0xffffffffffffffff, 0x0, r4, 0x6) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x0, 0x8e, 0x0, 0x4, 0x0, 0x1, 0x800, 0xc1d99c585266486d, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0x187e}, 0x1000, 0x4, 0x3, 0x7, 0xc70f, 0xa7a9, 0x5c}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@isdn={0x22, 0x89, 0x0, 0x5}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/715], 0x1a0}, 0x44004) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000ac0)='\'%}p,!!$\x00') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r2, 0x0, 0xa8, 0xb7, &(0x7f0000000240)="2b36d34c2888b1b33dfad744788303dec3e5b6f2314bf488aa1101e2ff5bdb25469552bec274fa7514f9433967c9f301fe416d6d471107fcda402697104458bf69693f4d47e45e951bcbc52fcd844a1e0f8d54c59fce005a16fc115a12d2fcf2fc6377ebd82ece785bdf926e7cd46ca2185288485735ab33f4778c64299f9162d2e5b3f6a02731619b71860903bb633310eed28bffa04b15d2069499ce50749b1df4aee0d85a3a6f", &(0x7f0000000380)=""/183, 0x6, 0x0, 0x62, 0x9a, &(0x7f0000000440)="b4faf44ab2513d29856fc60c2370990ee6663c472c3c4d78e94d2b0dc2a03579353888733063514bd1057597edac8444b8e00a3903fe0565fd66afb3677a2eb9ac88a6e67c6fcb1d6f903403a861707d6e1121023e058c84ea3e9efbbc708c8246dc", &(0x7f0000000740)="3c77738b94951a631be42b5b42acc32ed4edac80314e725d1d55269cab6d4daa529693e359de95cadb3ff264d24c09f75dda085b637881783c74ce0add74535e46a2d6a70b615e08f421cf792f87f68f59e1073fa374312d4b10d38dba233243cf1777e8f0f677bf825a700b3a07a99e827db3189efdd5b2f83b4c35161b77d4cfe972cf439909f7da4d13d8f2d7caaba064ab5d1753b4f614cb", 0x0, 0x1ff}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 23:11:46 executing program 4: socketpair(0x2, 0xa, 0x9, &(0x7f0000000000)) 23:11:46 executing program 5: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:46 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={0x0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x248800) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000900)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\x8a\xcc\xba\\\xceYF2C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84]\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8o\aArYZ\xe1\xc9\x86\xfe\x8f(\xa1\vhb\x18\xf3\xe3\xa1\xd2\x93*h\xd7\xa2F\x88\xd57\xb2\xc8\x8cS\xe8:H}\x91\x91\xcc\xa7Y\xcbkK\xf0\xfe\x9e\xd5\xa1\x1e\x99~\x9d3\xd2?\b\xbfU\xe8\x8b\x93\xea`\x00\x80\x00\x00V\xbf!\xb7\xe9\x11\r\xbd\xa3\xc6-t\x9c;\x9as\x86\xe7\xbd\xb0\xd5\";\xecuP\"\xebrV\x88\xca\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x98\xe8\xc6\xc3\nE\x91\xff\xd8E$\xc4As\x80\xdbt\x0e\xe21_v1\xd8,\xa4\x7fD\x94\xe8?\xf8\xcd[1\xb2U,\xc8w0|E\x00\x88IoQpH\xa0\xe8\xf0\x7f\xbd\xbcs;\xc9\xd2\x19oS\xac\xc6\x9b`:6\xc9DS\x13\xfb\xddw\nK\x19\xfa\x99\xc6~\x044\xa3+)\xef@Lr\xed\x85\xf3\xe8#\xa4\x84\xe9W8\xd6\x80\x95\xba.?+O\xbe[&\x87\xe1\xc5\xd7C\xa1\xde\xa4\b*w\xdc]\x92\xce\xe6BNFj;\xd7 \xfb\f\xeb\xb1\xb8\x86x\x19\xa0\xc4\xd3^W\xb7\x10\x18\xba\xcc\xabJ\xdfYB\"\x96\rny3\xe9\xec\xdf\xc4\xae\xfaM\xa2k\xd8X\xe6hQ\t\x93\xc1\xfd\xb7\xa4\x04W\xa0n\xff') r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x6, 0x0, 0x31, 0x1, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf812}, 0x2, 0x9, 0x9, 0x0, 0x91}, 0xffffffffffffffff, 0x0, r4, 0x6) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x0, 0x8e, 0x0, 0x4, 0x0, 0x1, 0x800, 0xc1d99c585266486d, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0x187e}, 0x1000, 0x4, 0x3, 0x7, 0xc70f, 0xa7a9, 0x5c}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@isdn={0x22, 0x89, 0x0, 0x5}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="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"/715], 0x1a0}, 0x44004) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000ac0)='\'%}p,!!$\x00') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000600)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r2, 0x0, 0xa8, 0xb7, &(0x7f0000000240)="2b36d34c2888b1b33dfad744788303dec3e5b6f2314bf488aa1101e2ff5bdb25469552bec274fa7514f9433967c9f301fe416d6d471107fcda402697104458bf69693f4d47e45e951bcbc52fcd844a1e0f8d54c59fce005a16fc115a12d2fcf2fc6377ebd82ece785bdf926e7cd46ca2185288485735ab33f4778c64299f9162d2e5b3f6a02731619b71860903bb633310eed28bffa04b15d2069499ce50749b1df4aee0d85a3a6f", &(0x7f0000000380)=""/183, 0x6, 0x0, 0x62, 0x9a, &(0x7f0000000440)="b4faf44ab2513d29856fc60c2370990ee6663c472c3c4d78e94d2b0dc2a03579353888733063514bd1057597edac8444b8e00a3903fe0565fd66afb3677a2eb9ac88a6e67c6fcb1d6f903403a861707d6e1121023e058c84ea3e9efbbc708c8246dc", &(0x7f0000000740)="3c77738b94951a631be42b5b42acc32ed4edac80314e725d1d55269cab6d4daa529693e359de95cadb3ff264d24c09f75dda085b637881783c74ce0add74535e46a2d6a70b615e08f421cf792f87f68f59e1073fa374312d4b10d38dba233243cf1777e8f0f677bf825a700b3a07a99e827db3189efdd5b2f83b4c35161b77d4cfe972cf439909f7da4d13d8f2d7caaba064ab5d1753b4f614cb", 0x0, 0x1ff}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee\x16\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') [ 320.791939][T12728] device wlan1 entered promiscuous mode [ 320.919194][T12749] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 23:11:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000240), 0x12) 23:11:46 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001340)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000013c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'io'}, {0x2e, 'io'}]}, 0x8) [ 320.995326][T12749] team0: Device ipvlan0 failed to register rx_handler 23:11:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x2fde00) perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4, 0x9, 0x800000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000000) 23:11:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x5, 0x70, 0x0, 0x40, 0x0, 0x7f, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x5a3b, 0x0, 0x8001, 0x1ff}) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x4a, 0x0, 0x0, 0x86110, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3aaffffe, 0x0, @perf_config_ext={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) close(r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 321.686055][ T36] audit: type=1800 audit(1610493106.953:85): pid=12769 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="memory.events" dev="sda1" ino=16241 res=0 errno=0 23:11:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) perf_event_open(&(0x7f0000000d00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x4a, 0x0, 0x0, 0x86110, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3aaffffe, 0x0, @perf_config_ext={0x20, 0xa}, 0x2814, 0x9, 0x0, 0x0, 0x0, 0x8, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) close(r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 322.078100][T12748] device wlan1 entered promiscuous mode [ 322.574551][T12754] device wlan1 entered promiscuous mode 23:11:48 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x2}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000080)="676025b5e7aa498c6ed2564bf633a3e13d0deb9b209337bb5004f4", 0x1b}, {&(0x7f0000000380)="a6c869a01e3bb88d90748eab5df3b107cc9a5cac517e1efae6e54caa3f09d3591652149669cf1508a7600a59fd6a9320c14490f5cccdd9f7bd2336f92b4bf8418581f144df9de9a58717aaabea0da306b08776dcb7cde1", 0x57}, {&(0x7f00000004c0)="5f8a94947a3b041e958fb59c7adda788e469c16e6d647a9a5d38799084437c241c0a045bccb3c62c64955c261d1056bebc90bc2ff5dd133206adeb9d33f026c732a89fb5c763ed5f5d4e395c5ec43a7038de39d6aef20ea7fda889f9c4b1fe95b54654d67827bd", 0x67}, {&(0x7f0000000100)="76e2f648a6492dd436282be39b25ced8e8ba801da342c61d7ba685dcc65ac81e4b9e4101", 0x24}, {&(0x7f0000000540)="477db6d71e4fb04a54a6acdd25aa958216a9bb1d2859b048d546496578830d889073980139c9952dc2afb9aee7522b4c1fa7bbc61c9b60eae05cf0554382483821b0a72484fc7aac427636140aceac506a3ce0c311300dfe6190d554", 0x5c}], 0x5}, 0x20000000) 23:11:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x5, 0x70, 0x0, 0x40, 0x0, 0x7f, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x5a3b, 0x0, 0x8001, 0x1ff}) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x4a, 0x0, 0x0, 0x86110, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3aaffffe, 0x0, @perf_config_ext={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) close(r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 23:11:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 23:11:48 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) perf_event_open(&(0x7f0000000d00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x4a, 0x0, 0x0, 0x86110, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3aaffffe, 0x0, @perf_config_ext={0x20, 0xa}, 0x2814, 0x9, 0x0, 0x0, 0x0, 0x8, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) close(r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 23:11:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffd0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10, 0xfffffffffffffe8d, &(0x7f0000000500)="b9ff0300600d698cb89e14f043051fffffff00004000632f77fb0514140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x200, 0x60000000, 0xb20c, 0xfffffffffffffe09, &(0x7f0000000040)="3f58266c799726865bf7830e3773dce9aa7e76becc18910b7b50b80dbed5f757c2a04467671d72f716595ff422e71a25d906dcc8c7000000000000000000"}, 0x28) [ 322.842666][T12785] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 322.927913][T12785] team0: Device ipvlan0 failed to register rx_handler 23:11:48 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81}, [@generic={0x9, 0x1, 0xe, 0x7, 0x3}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}]}, &(0x7f0000000100)='GPL\x00', 0x8, 0xa7, &(0x7f0000000280)=""/167, 0x41000, 0x18, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x3, 0x1d, 0x6}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid\x00') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x2, 0xa, 0x2) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004cc0), 0x8) sendmsg$kcm(r4, &(0x7f0000005fc0)={&(0x7f0000004d00)=@ethernet={0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004e00)}], 0x1, &(0x7f0000004e80)=[{0xb0, 0x10f, 0xffffffff, "8c625a50cbcfd14cb2a4152345eb9de604ca478957898fff195514aaa5d9a4824573b75b73946ffc67346b209f9802358e3f354c98087199fdd740a389447f4e8b5d1dee55540d11de0318f733bcb1d58c3bb273c53d41ab25a150f03b9ebbecb5aea710858c526247ef3864cbf8b9cf3a94214cb58be40fe1a063371dde62f41438d656f2a9e40d09063f0b2ff5914b12a354d1662d3da31bf055b3af"}, {0x10, 0x0, 0x2}, {0x18, 0x118, 0x6fa, "e704"}, {0xf10, 0x6, 0x10000, "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"}], 0xfe8}, 0x8090) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) 23:11:48 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001340)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000013c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001400)={[{0x2b, 'rdma'}]}, 0x6) 23:11:48 executing program 1: socketpair(0x2b, 0x1, 0x0, &(0x7f0000000580)) 23:11:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x5, 0x70, 0x0, 0x40, 0xff, 0x7f, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000280), 0xe}, 0x40, 0x0, 0x5a3b, 0x6, 0x8001, 0x1ff, 0xadf}) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x4000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x4a, 0x0, 0x0, 0x86110, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3aaffffe, 0x0, @perf_config_ext={0x20, 0xa}, 0x2814, 0x9, 0x0, 0x0, 0x0, 0x8, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 23:11:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x5, 0x70, 0x0, 0x40, 0x0, 0x7f, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x5a3b, 0x0, 0x8001, 0x1ff}) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x4a, 0x0, 0x0, 0x86110, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3aaffffe, 0x0, @perf_config_ext={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x0) close(r1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 23:11:48 executing program 1: r0 = syz_open_dev$hidraw(&(0x7f00000002c0)='/dev/hidraw#\x00', 0x0, 0x2) write$hidraw(r0, 0x0, 0xf0ffffff7f0000) 23:11:48 executing program 2: ioctl$HIDIOCGRDESCSIZE(0xffffffffffffffff, 0x80044801, &(0x7f0000000040)) r0 = syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x101201) write$hidraw(r0, &(0x7f0000000140)="dc1fb5c27e2649822cdadd1cef4e19c35f37f138a97b5b38947cd460a901ecf4d7c59b763c87ee1c1d4edf7e09bb9c0db6141c23", 0xfffffdc9) ioctl$HIDIOCGFEATURE(r0, 0xc0404807, &(0x7f0000000080)={0x6, "726bff587a8bcccd439b972218966b6d28d7cb5ead759c2e071e9673f79babb5e007203e80437d514947a3d0d43d4b8c525ca73d34955d7fb7b2a0fccf25daea"}) 23:11:49 executing program 1: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) 23:11:49 executing program 2: r0 = syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x101201) write$hidraw(r0, &(0x7f0000000140)="dc1fb5c27e2649822cdadd1cef4e19c35f37f138a97b5b38947cd460a901ecf4d7c59b763c87ee1c1d4edf7e0fbb9c0db6141c23", 0xfffffdc9) write$hidraw(r0, 0x0, 0x0) 23:11:49 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x5, 0x70, 0x0, 0x40, 0xff, 0x7f, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000280), 0xe}, 0x40, 0x0, 0x5a3b, 0x6, 0x8001, 0x1ff, 0xadf}) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x4000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x4a, 0x0, 0x0, 0x86110, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3aaffffe, 0x0, @perf_config_ext={0x20, 0xa}, 0x2814, 0x9, 0x0, 0x0, 0x0, 0x8, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 324.376785][T12801] device syzkaller1 entered promiscuous mode 23:11:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440), 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000005fc0)={&(0x7f0000004d00)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004e00)}], 0x1, &(0x7f0000004e80)=[{0x18, 0x0, 0x0, "01"}, {0x10, 0x0, 0x10000}], 0x28}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 325.141441][T12834] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 325.160879][T12834] team0: Device ipvlan0 failed to register rx_handler [ 325.556730][T12838] device syzkaller1 entered promiscuous mode [ 325.919521][T12809] device syzkaller1 entered promiscuous mode 23:11:51 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81}, [@generic={0x9, 0x1, 0xe, 0x7, 0x3}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}]}, &(0x7f0000000100)='GPL\x00', 0x8, 0xa7, &(0x7f0000000280)=""/167, 0x41000, 0x18, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x3, 0x1d, 0x6}, 0x10}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid\x00') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x2, 0xa, 0x2) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000004cc0), 0x8) sendmsg$kcm(r4, &(0x7f0000005fc0)={&(0x7f0000004d00)=@ethernet={0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004e00)}], 0x1, &(0x7f0000004e80)=[{0xb0, 0x10f, 0xffffffff, "8c625a50cbcfd14cb2a4152345eb9de604ca478957898fff195514aaa5d9a4824573b75b73946ffc67346b209f9802358e3f354c98087199fdd740a389447f4e8b5d1dee55540d11de0318f733bcb1d58c3bb273c53d41ab25a150f03b9ebbecb5aea710858c526247ef3864cbf8b9cf3a94214cb58be40fe1a063371dde62f41438d656f2a9e40d09063f0b2ff5914b12a354d1662d3da31bf055b3af"}, {0x10, 0x0, 0x2}, {0x18, 0x118, 0x6fa, "e704"}, {0xf10, 0x6, 0x10000, "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"}], 0xfe8}, 0x8090) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpu\t\t&6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) 23:11:51 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x2}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000080)="676025b5e7aa498c6ed2564bf633a3e13d0deb9b209337bb5004f4", 0x1b}, {&(0x7f0000000380)="a6c869a01e3bb88d90748eab5df3b107cc9a5cac517e1efae6e54caa3f09d3591652149669cf1508a7600a59fd6a9320c14490f5cccdd9f7bd2336f92b4bf8418581f144df9de9a58717aaabea0da306b08776dcb7cde1", 0x57}, {&(0x7f00000004c0)="5f8a94947a3b041e958fb59c7adda788e469c16e6d647a9a5d38799084437c241c0a045bccb3c62c64955c261d1056bebc90bc2ff5dd133206adeb9d33f026c732a89fb5c763ed5f5d4e395c5ec43a7038de39d6aef20ea7fda889f9c4b1fe95b54654d67827bd", 0x67}, {&(0x7f0000000100)="76e2f648a6492dd436282be39b25ced8e8ba801da342c61d7ba685dcc65ac81e4b9e4101", 0x24}, {&(0x7f0000000540)="477db6d71e4fb04a54a6acdd25aa958216a9bb1d2859b048d546496578830d889073980139c9952dc2afb9aee7522b4c1fa7bbc61c9b60eae05cf0554382483821b0a72484fc7aac427636140aceac506a3ce0c311300dfe6190d554", 0x5c}], 0x5}, 0x20000000) 23:11:51 executing program 4: r0 = syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x3, 0x82) write$hidraw(r0, &(0x7f0000000140)="dc1fb5c27e2649822cdadd1cef4e19c35f37f138a97b5b38947cd460a901ecf4d7c59b763c87ee1c1d4edf7e09bb9c0db6141c23", 0xfffffdc9) 23:11:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x5, 0x70, 0x0, 0x40, 0xff, 0x7f, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000280), 0xe}, 0x40, 0x0, 0x5a3b, 0x6, 0x8001, 0x1ff, 0xadf}) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x4000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x4a, 0x0, 0x0, 0x86110, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3aaffffe, 0x0, @perf_config_ext={0x20, 0xa}, 0x2814, 0x9, 0x0, 0x0, 0x0, 0x8, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 23:11:51 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) [ 326.252602][T12865] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 326.334039][T12865] team0: Device ipvlan0 failed to register rx_handler 23:11:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000300)={0x5, 0x70, 0x0, 0x40, 0xff, 0x7f, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000280), 0xe}, 0x40, 0x0, 0x5a3b, 0x6, 0x8001, 0x1ff, 0xadf}) sendmsg$inet(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x4000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x4, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000d00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x4a, 0x0, 0x0, 0x86110, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3aaffffe, 0x0, @perf_config_ext={0x20, 0xa}, 0x2814, 0x9, 0x0, 0x0, 0x0, 0x8, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 23:11:51 executing program 4: syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x0) 23:11:52 executing program 4: syz_open_dev$evdev(&(0x7f0000000800)='/dev/input/event#\x00', 0x0, 0xce100) 23:11:52 executing program 0: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000080)=""/16) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000300)={0x51, 0x72, 0x0, {}, {0x60}, @rumble}) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000400)={0x2, 0x0, 0x4}) 23:11:52 executing program 4: syz_open_dev$evdev(&(0x7f0000001080)='/dev/input/event#\x00', 0x0, 0x68543) 23:11:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff00a}], 0x1}, 0x6d70) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x2}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000080)="676025b5e7aa498c6ed2564bf633a3e13d0deb9b209337bb5004f4", 0x1b}, {&(0x7f0000000380)="a6c869a01e3bb88d90748eab5df3b107cc9a5cac517e1efae6e54caa3f09d3591652149669cf1508a7600a59fd6a9320c14490f5cccdd9f7bd2336f92b4bf8418581f144df9de9a58717aaabea0da306b08776dcb7cde1", 0x57}, {&(0x7f00000004c0)="5f8a94947a3b041e958fb59c7adda788e469c16e6d647a9a5d38799084437c241c0a045bccb3c62c64955c261d1056bebc90bc2ff5dd133206adeb9d33f026c732a89fb5c763ed5f5d4e395c5ec43a7038de39d6aef20ea7fda889f9c4b1fe95b54654d67827bd", 0x67}, {&(0x7f0000000100)="76e2f648a6492dd436282be39b25ced8e8ba801da342c61d7ba685dcc65ac81e4b9e4101", 0x24}, {&(0x7f0000000540)="477db6d71e4fb04a54a6acdd25aa958216a9bb1d2859b048d546496578830d889073980139c9952dc2afb9aee7522b4c1fa7bbc61c9b60eae05cf0554382483821b0a72484fc7aac427636140aceac506a3ce0c311300dfe6190d554", 0x5c}], 0x5}, 0x20000000) [ 327.373702][T12840] device syzkaller1 entered promiscuous mode [ 327.699656][T12879] device syzkaller1 entered promiscuous mode 23:11:54 executing program 2: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xffffffffffffffff, 0x44040) 23:11:54 executing program 3: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0xaf, 0x8202) 23:11:54 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000003c0)={0x0, 0x0, 0x0}) 23:11:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000000)) 23:11:54 executing program 5: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x5452, 0xfffffffffffffffe) 23:11:54 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x4020940d, &(0x7f00000000c0)=[0x5]) [ 328.881162][T12921] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 328.923642][T12921] team0: Device ipvlan0 failed to register rx_handler 23:11:54 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, 0x0) 23:11:54 executing program 4: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56a, 0xd7, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x1, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x100}}}]}}]}}, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x0, 0x0, 0x0) 23:11:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x5452, 0xfffffffffffffffe) 23:11:54 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r0, 0x41014500, 0x0) 23:11:54 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x8000450a, 0x0) 23:11:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x5452, 0xfffffffffffffffe) 23:11:54 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000000c0)=[0x6]) 23:11:54 executing program 3: r0 = syz_open_dev$hidraw(&(0x7f00000002c0)='/dev/hidraw#\x00', 0x2, 0x0) write$hidraw(r0, 0x0, 0x0) 23:11:54 executing program 2: r0 = syz_open_dev$hidraw(&(0x7f00000002c0)='/dev/hidraw#\x00', 0x2, 0x0) read$hidraw(r0, 0x0, 0x0) 23:11:54 executing program 5: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:54 executing program 0: syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000100)={[{@fat=@showexec='showexec'}]}) 23:11:54 executing program 3: syz_open_dev$hidraw(&(0x7f0000001280)='/dev/hidraw#\x00', 0x6005, 0x600) 23:11:54 executing program 2: r0 = syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x101201) write$hidraw(r0, &(0x7f0000000140)="dc1fb5c27e2649822cdadd1cef4e19c35f37f138a97b5b38947cd460a901ecf4d7c59b763c87ee1c1d4edf7e09bb9c0db6141c23", 0xfffffdc9) write$hidraw(0xffffffffffffffff, &(0x7f0000000040)='J', 0x1) 23:11:55 executing program 4: syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56a, 0xd7, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x1, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x100}}}]}}]}}, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x0, 0x0, 0x0) 23:11:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x5452, 0xfffffffffffffffe) [ 329.921431][T12963] FAT-fs (loop0): bogus number of reserved sectors [ 329.940984][T12968] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 23:11:55 executing program 3: r0 = syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x82) write$hidraw(r0, &(0x7f0000000140)="dc1fb5c27e2649822cdadd1cef4e19c35f37f138a97b5b38947cd460a901ecf4d7c59b763c87ee1c1d4edf7e09bb9c0db6141c23", 0xfffffdc9) 23:11:55 executing program 2: r0 = syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x0, 0x101201) write$hidraw(r0, &(0x7f0000000140)="dc1fb5c27e2649822cdadd1cef4e19c35f37f138a97b5b38947cd460a901ecf4d7c59b763c87ee1c1d4edf7e09bb9c0db6141c23", 0xfffffdc9) [ 330.009437][T12963] FAT-fs (loop0): Can't find a valid FAT filesystem [ 330.029287][T12968] team0: Device ipvlan0 failed to register rx_handler 23:11:55 executing program 1: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x5452, 0xfffffffffffffffe) [ 330.103002][T12963] FAT-fs (loop0): bogus number of reserved sectors [ 330.124421][T12963] FAT-fs (loop0): Can't find a valid FAT filesystem 23:11:55 executing program 1: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x5452, 0xfffffffffffffffe) 23:11:55 executing program 0: r0 = syz_open_dev$hidraw(&(0x7f0000000040)='/dev/hidraw#\x00', 0x1, 0x109902) write$hidraw(r0, &(0x7f0000000100)="c5", 0x1) 23:11:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x0, @multicast2}}, 0x0, 0x0, 0x38, 0x0, "f6e0b7556a3e78adc20a2f91ca1c0380b4e3ac8a8f5db5b694a5a2697e0d54915552381732690f8dcb05dd6bf89cd73f154717b22ced3d0983c68c6034e0d7cac7cc69f20a83cbb994446a3d818fcc48"}, 0xd8) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000500), 0x4) setsockopt$sock_int(r2, 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[], 0x2bcf) recvmsg(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7115}, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 23:11:55 executing program 5: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:55 executing program 3: pipe(&(0x7f0000001bc0)={0xffffffffffffffff}) ioctl$EVIOCGABS0(r0, 0x80184540, 0x0) 23:11:55 executing program 1: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x5452, 0xfffffffffffffffe) 23:11:55 executing program 0: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) 23:11:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) 23:11:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='uid_map\x00') read$eventfd(r0, &(0x7f0000000000), 0xff3f) 23:11:55 executing program 0: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0)='security.capability\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) fsetxattr$security_capability(r2, &(0x7f0000000040)='security.capability\x00', &(0x7f0000002380)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@random={'security.', '!Q\x00'}, 0x0, 0xffffffffffffff65) 23:11:55 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x5452, 0xfffffffffffffffe) 23:11:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa8, 0xa8, 0x3, [@var, @enum={0x0, 0xd, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @func, @array]}, {0x0, [0x0]}}, 0x0, 0xc3}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 330.923190][T13012] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 330.978267][T13012] team0: Device ipvlan0 failed to register rx_handler 23:11:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup2(r2, r3) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r5, &(0x7f0000007fc0), 0x4000000000002b8, 0x0) 23:11:56 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x5452, 0xfffffffffffffffe) 23:11:56 executing program 0: clone(0x4100, 0x0, 0x0, 0x0, 0x0) clone(0x4e100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) rt_sigreturn() unlinkat(0xffffffffffffffff, 0x0, 0x0) exit(0x0) [ 331.161552][T13022] x_tables: duplicate underflow at hook 2 23:11:56 executing program 5: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:56 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setreuid(0xee00, 0xee01) getgroups(0x1, &(0x7f0000000000)=[0xee00]) setresgid(r0, 0x0, 0x0) exit(0x0) 23:11:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x51, &(0x7f0000000080)={0x5, {{0x10, 0x2}}}, 0x90) 23:11:56 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x5452, 0xfffffffffffffffe) 23:11:56 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000180)="bf", 0x1, r0) [ 331.635250][T13022] x_tables: duplicate underflow at hook 2 23:11:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 23:11:57 executing program 1: syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x5452, 0xfffffffffffffffe) 23:11:57 executing program 4: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "1000", 0x18, 0x3a, 0x1ff, @empty, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0xff, [], @private0}}}}}}, 0x0) [ 331.931916][T13047] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 331.981544][T13047] team0: Device ipvlan0 failed to register rx_handler 23:11:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0800000706ffffff7f00fafff604100000a2260c00010006"], 0x1}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x208002, 0x0) 23:11:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000016c0)=[{{&(0x7f0000000140)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10, 0x0}}], 0x1, 0x0) 23:11:59 executing program 1: syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x5452, 0xfffffffffffffffe) 23:11:59 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fd/3\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') r4 = openat(r3, &(0x7f0000000080)='./file0\x00', 0x145042, 0x24) r5 = memfd_create(&(0x7f00000001c0)='\xe58\xb9C;`\xb6p\x98\xcf\x1dT\b$$+\x10\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$P9_RGETATTR(r2, &(0x7f0000000340)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, 0xa0) pwritev(r5, &(0x7f0000000180)=[{&(0x7f0000000140)="fb", 0x1}], 0x1, 0x0, 0x0) write$P9_RREADDIR(r4, &(0x7f0000000400)={0xb}, 0xb) sendfile(r2, r5, 0x0, 0x5) 23:11:59 executing program 4: syz_emit_ethernet(0x8f, &(0x7f0000000040)={@random="8ddd966fecea", @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x11, 0x0, @private}, {0x0, 0x0, 0xb3, 0x0, @opaque="23bf46b0cee71c9f6ea29162415a71030b82deddfd867bbc52e3b65860b1784a8c9166fec091e57098bdd413f861f57ea9871644d8d21b5c84c036c2cfe7e659b5279b0890a6ce6ae749d8bae083d34ae27cd4634e5d86e5a7c8b47d2157c75f6c8de1c25f"}}}}}, 0x0) 23:11:59 executing program 5: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:11:59 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 333.994702][T13066] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 23:11:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:11:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) inotify_init1(0x0) pselect6(0x40, &(0x7f0000000040)={0x1c}, 0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x204}, 0x14}}, 0x0) 23:11:59 executing program 1: syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x5452, 0xfffffffffffffffe) [ 334.045372][T13066] team0: Device ipvlan0 failed to register rx_handler [ 334.186443][T13077] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 334.219411][T13077] netlink: 2076 bytes leftover after parsing attributes in process `syz-executor.3'. [ 334.273048][T13077] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 23:11:59 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) r1 = dup2(r0, r0) sendmsg$unix(r1, &(0x7f0000000600)={&(0x7f0000000240)=@abs, 0x6e, 0x0}, 0x0) 23:11:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000031c0)=[{&(0x7f0000003900)={0x20, 0x12, 0x1, 0x0, 0x0, "", [@nested={0xd, 0x0, 0x0, 0x1, [@typed={0x4, 0x2c}, @generic="1d206310ef"]}]}, 0x20}], 0x1}, 0x0) 23:12:00 executing program 3: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@random="833695d1b54d", @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @empty}, @address_request}}}}, 0x0) 23:12:00 executing program 0: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@multicast, @local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, '\x00', 0x10, 0x21, 0x0, @local, @local, {[], {{0xfffd, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 'm=A', 0x0, "66b429"}}}}}}}, 0x0) 23:12:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000031c0)=[{&(0x7f0000000000)={0x1c, 0x21, 0x1, 0x0, 0x0, "", [@nested={0x9, 0x0, 0x0, 0x1, [@generic="af311c1818"]}]}, 0x1c}], 0x1}, 0x0) 23:12:00 executing program 2: r0 = mq_open(&(0x7f0000000640)='geneve1\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f00000006c0)=""/80, 0x50, 0x0, &(0x7f0000000740)) 23:12:00 executing program 5: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) [ 334.971070][T13103] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 334.996988][T13103] team0: Device ipvlan0 failed to register rx_handler 23:12:00 executing program 2: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c2000700aaaaaaaaaaaa81000000080045"], 0x0) 23:12:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r3, 0x0) 23:12:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:12:02 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "b89eaf", 0x38, 0x3a, 0x0, @private1, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "8e02e7", 0x0, 0x3a, 0x0, @mcast2, @ipv4={[], [], @multicast1}, [], "811be0b158a92045"}}}}}}}, 0x0) 23:12:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000003ac0)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000000)=""/241) 23:12:02 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000040)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "e3d57e", 0x10, 0x11, 0x0, @dev, @local, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67}], {0x0, 0x0, 0x8}}}}}}, 0x0) 23:12:02 executing program 1: syz_emit_ethernet(0x4e, &(0x7f00000004c0)={@local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "b89eaf", 0x18, 0x3a, 0x0, @private1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @mcast2}}}}}}, 0x0) 23:12:02 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) [ 337.142541][T13126] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 337.187754][T13126] team0: Device ipvlan0 failed to register rx_handler 23:12:02 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "b8b174", 0x10, 0x3a, 0x1ff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x81}}}}}}, 0x0) 23:12:02 executing program 1: syz_emit_ethernet(0x46, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6052099e00012100fe8000000000000000000000000000aafe8000000000000000000000000000aa"], 0x0) 23:12:02 executing program 0: syz_emit_ethernet(0x32, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0xa010100, @multicast1}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 23:12:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 337.395405][T13142] dccp_invalid_packet: pskb_may_pull failed [ 337.428210][T13142] dccp_invalid_packet: pskb_may_pull failed 23:12:02 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "b8b174", 0x10, 0x3a, 0x1ff, @dev={0xfe, 0x80, [], 0x24}, @local, {[], @ndisc_ra}}}}}, 0x0) 23:12:02 executing program 1: pselect6(0x7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x3938700}, 0x0) 23:12:02 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "bf3e0a", 0x0, 0x2f, 0x0, @private0, @local}}}}, 0x0) 23:12:02 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "b8b174", 0x10, 0x3a, 0x1ff, @dev={0xfe, 0x80, [], 0x24}, @local, {[], @ndisc_ra}}}}}, 0x0) 23:12:03 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000000)={@multicast, @empty, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @multicast1, {[@rr={0x7, 0x3}]}}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 23:12:03 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='pagemap\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000007c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x40004007fff, 0x32fe3cf2}, 0x14) sendfile(r1, r0, 0x0, 0x10000edbe) 23:12:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:12:03 executing program 1: syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "b8b174", 0x18, 0x3a, 0x1ff, @rand_addr=' \x01\x00', @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, [], @local}}}}}}, 0x0) [ 337.978882][T13166] ICMPv6: NA: 00:00:00:00:00:00 advertised our address fe80::aa on syz_tun! [ 338.007828][T13168] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 23:12:03 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "b8b174", 0x10, 0x3a, 0x1ff, @dev={0xfe, 0x80, [], 0x24}, @local, {[], @ndisc_ra}}}}}, 0x0) [ 338.021428][T13166] ICMPv6: NA: 00:00:00:00:00:00 advertised our address fe80::aa on syz_tun! [ 338.046694][T13168] team0: Device ipvlan0 failed to register rx_handler 23:12:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000200)={0x3c}, 0x0, 0x0) write$nbd(r0, &(0x7f0000000000), 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:12:03 executing program 1: sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x4}]}, 0x44}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f00000000c0)) 23:12:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func]}, {0x0, [0x0, 0x0]}}, 0x0, 0x28}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:12:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="08030000170001"], 0x308}}, 0x0) 23:12:05 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "b8b174", 0x10, 0x3a, 0x1ff, @dev={0xfe, 0x80, [], 0x24}, @local, {[], @ndisc_ra}}}}}, 0x0) 23:12:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:12:05 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @multicast1, {[@noop]}}, {0x0, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "757a36f8c96917622c414dfb9ab247425700ab02556248a9", "d4d7cac899f0cddb01d61af919288048ca6e72143e59cdb51694a5e9a527f948"}}}}}}, 0x0) 23:12:05 executing program 2: r0 = msgget(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x1, 0x2000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) listen(r1, 0x1000001) getsockopt$IP_SET_OP_VERSION(r2, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000140)=0xffffffffffffff19) r3 = socket$nl_generic(0x10, 0x3, 0x10) listen(0xffffffffffffffff, 0x2) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r4, 0x0, 0x0) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000480)=0x4) msgsnd(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0300000000000000a505b999c0399b29a06e28fef3dcec0773b45d55a6e29ff3bb232ad80bdcfa7f35d5ff6ae925020000000000040067fae57a", @ANYBLOB="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"], 0x3a, 0x800) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) msgctl$IPC_RMID(r0, 0x0) [ 340.505515][T13196] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 340.518236][T13199] netlink: 480 bytes leftover after parsing attributes in process `syz-executor.0'. [ 340.542841][T13196] team0: Device ipvlan0 failed to register rx_handler 23:12:05 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, 'EQf', 0x8, 0x11, 0x0, @dev, @remote, {[], {0x0, 0x0, 0x8}}}}}}, 0x0) 23:12:05 executing program 1: syz_emit_ethernet(0x12, &(0x7f0000000000)={@local, @multicast, @val={@void}, {@generic={0x88ca}}}, 0x0) 23:12:05 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:12:05 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000100)={@local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "b8b174", 0x48, 0x3a, 0x0, @private0, @local, {[], @param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "0a9d72", 0x0, 0x0, 0x0, @mcast1, @private0, [@hopopts={0x3c}, @routing={0x2c}], "95029f70fa7a47f4"}}}}}}}, 0x0) 23:12:06 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000003, 0x10, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') readlinkat(r4, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)=""/88, 0x58) 23:12:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000031c0)=[{&(0x7f0000003900)={0x20, 0x12, 0x1, 0x0, 0x0, "", [@nested={0xd, 0x0, 0x0, 0x1, [@typed={0x4}, @generic="1d206310ef"]}]}, 0x20}], 0x1}, 0x0) 23:12:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$unix(0x1, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0x98, 0x0, 0xb0, 0x98, 0xb0, 0x1b8, 0x1a8, 0x1a8, 0x1b8, 0x1a8, 0x3, 0x0, {[{{@ip={@multicast2, @dev, 0x0, 0x0, 'wlan1\x00', 'bond_slave_0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@inet=@set3={{0x50, 'set\x00'}, {{0x0, 0x6}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@multicast2, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 23:12:08 executing program 2: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x268, 0x0, 0xd0, 0xd0, 0xd0, 0xd0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x1d0, 0x3, 0x0, {[{{@ip={@local, @remote, 0x0, 0xffffffff, 'geneve0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev, 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c8) 23:12:08 executing program 0: setreuid(0x0, 0xee01) r0 = msgget$private(0x0, 0x0) setreuid(0xffffffffffffffff, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000000c0)={{0x1, 0x0, 0x0, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) 23:12:08 executing program 1: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x301, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000300000001}) 23:12:08 executing program 3: pipe2$9p(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSYMLINK(r0, &(0x7f00000000c0)={0x14}, 0x14) write$P9_RAUTH(r0, &(0x7f0000000080)={0x14}, 0xfe9b) 23:12:08 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:12:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2c, 0x9, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x2c}}, 0x0) [ 343.649562][T13235] ipt_CLUSTERIP: bad local_nodes[0] 0 23:12:09 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @multicast1, {[@rr={0x7, 0x3}]}}, {0x0, 0x0, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 23:12:09 executing program 3: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x5000000) 23:12:09 executing program 0: setreuid(0x0, 0xee01) r0 = msgget$private(0x0, 0x0) setreuid(0xffffffffffffffff, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000000c0)={{0x1, 0x0, 0x0, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) 23:12:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) [ 343.786839][T13246] x_tables: duplicate underflow at hook 3 23:12:09 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000806000108000604"], 0x0) [ 344.014030][T13246] x_tables: duplicate underflow at hook 3 23:12:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000000), &(0x7f00000000c0)=0x8) 23:12:09 executing program 0: setreuid(0x0, 0xee01) r0 = msgget$private(0x0, 0x0) setreuid(0xffffffffffffffff, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000000c0)={{0x1, 0x0, 0x0, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) 23:12:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:12:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0xa0) 23:12:09 executing program 3: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x5000000) 23:12:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)=@abs={0x8, 0x1}, 0x8) 23:12:09 executing program 0: setreuid(0x0, 0xee01) r0 = msgget$private(0x0, 0x0) setreuid(0xffffffffffffffff, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000000c0)={{0x1, 0x0, 0x0, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) 23:12:09 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0xffffffffffffff64, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 23:12:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:12:09 executing program 3: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x5000000) 23:12:09 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000140)={r4}, &(0x7f0000000180)=0x8) 23:12:09 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004800)={0x1c, 0x1c, 0x2}, 0x1c) [ 344.550124][T12557] Bluetooth: hci2: command 0x0406 tx timeout [ 344.550193][ T8] Bluetooth: hci3: command 0x0406 tx timeout [ 344.556748][T12557] Bluetooth: hci0: command 0x0406 tx timeout [ 344.587508][ T8] Bluetooth: hci5: command 0x0406 tx timeout [ 344.617860][T12557] Bluetooth: hci4: command 0x0406 tx timeout 23:12:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:12:10 executing program 0: syz_emit_ethernet(0x108, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 23:12:10 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) bind(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 23:12:10 executing program 3: futex(&(0x7f000000cffc), 0x180, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000040), 0x5000000) 23:12:10 executing program 1: syz_emit_ethernet(0x4df, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 23:12:10 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000001700)=ANY=[@ANYBLOB="1c1c4e2204a0a30afe8000000000000000000000000000bb3f00"/125, @ANYRES32], 0x98) 23:12:10 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$sock_linger(r1, 0xffff, 0x80, &(0x7f0000000000)={0x7fffffff, 0x8}, 0x8) dup2(r0, r1) 23:12:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:12:10 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 23:12:10 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) socket(0x2, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2}, 0x1c) 23:12:10 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 23:12:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) 23:12:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) 23:12:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0xffffffffffffff92, &(0x7f0000000080)=[{&(0x7f0000000440)=""/125, 0x7d}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{r2, 0x1}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) poll(&(0x7f0000000200)=[{}], 0x1, 0x8000000000049) shutdown(r3, 0x0) 23:12:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000600), 0xc) 23:12:10 executing program 2: r0 = socket(0x2, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000140)=ANY=[], 0x94) 23:12:10 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f00000000c0)=ANY=[@ANYRES32], &(0x7f0000000100)=0x36) 23:12:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) 23:12:10 executing program 4: syz_emit_ethernet(0x19, &(0x7f0000000200)={@local, @empty, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random="431e82371734", @local={0xac, 0x14, 0x0}, @broadcast}}}}, 0x0) 23:12:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000700), &(0x7f0000000740)=0x8) 23:12:11 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000540), 0x8c) 23:12:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000080), &(0x7f0000000100)=0x4) 23:12:11 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f00000003c0)=@in6={0x6b, 0x1c}, 0x1c) 23:12:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) 23:12:11 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv4}}, 0x0) 23:12:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001640)={&(0x7f00000003c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 23:12:11 executing program 3: openat(0xffffffffffffffff, 0x0, 0x149776d0f461d08, 0x0) 23:12:11 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 23:12:11 executing program 4: r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000006c0)=ANY=[@ANYBLOB="10024e22ac1400aa000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ff00000000000000000000c3579d78c10b1fcb00000b2b515400000000000000000000000000000000000000000000000000000000000000f3000000000003724bd0db418f6f0000000096"], &(0x7f00000002c0)=0x94) 23:12:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 23:12:11 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x2000, 0x0, &(0x7f00000000c0)) 23:12:11 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_buf(r0, 0x29, 0x33, &(0x7f0000000000)="80c4c70d", 0x4) 23:12:11 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000840), 0x8) 23:12:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), 0xb) 23:12:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 23:12:11 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000240)={@local, @empty, @val, {@ipv6}}, 0x0) 23:12:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:12:12 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/hwrng\x00', 0x200000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 23:12:12 executing program 3: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000027c0)=[{0x0}], 0x0, 0x0) 23:12:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 23:12:12 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2000c7fc, &(0x7f0000000180)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000b40)="390284246ca1dc05ce4410a6ca80c1439fd609fdadaaa966d94159393148a97dc2efa999231aa8d2b255f1c09634f8a6684c61270614d2edd0b2fb32e02fefe644849d797868b9c0b9fd90fa189c5d3c1bed393699a709243aaf3d5eba9908ed1ba395ae04ad7bdfa9ca552b83794b860580efc4b32cd07905c189e832276bd09b6addcaaa174627814d0751fdff16c3c82edfde1ac3da835fcbb3f7fae30053f44370fbb7c5fdfdb8447a2106d7135b7372ab7a3d8eb6326fb3b1ef6418a1bef59973cf2acf2c085b53e30b241e6a3908a6886cceed10ab9b", 0xd9}, {&(0x7f0000000c40)="5f9257f0f2bcff3ba8d986b579c5", 0xe}, {&(0x7f0000001340)="2901b6b49ce299941154caa84a11128971a05bfec715cde5b515ceb72085e18eb1692b942371c16d1be783605832a45d727d1cbfac1f69ef440ca0f8a296e7848860f54c6b78f69fab3d0556c44a2556f2d87954a532894f0e045e0d28b45999d13a436972ab24493138ad3edac851a0e06420bc92182520222fd09c0d6748b053c553f6811309a6208b0847ae9629c2016533eaa2c289a566b72608dd7a19b2bff266b3ab9c8829b1ff70acb8aebee44e6f1522f8e0dc08d82d949211d0c8d5eeea65b3abff3cb852da70dc5f493b9327e5b176fa5bb2334d4d100d6a56034d77ada7321bba00b53e79d51cfd57d51f6cd2dbcf0e703f102396bf905d2d739cb333b7ebe9d7304b78a4acff968fb3bdf775d8ebf31529dbe09f0a74542387ffad3edc96a992124e1b757bb6775fed14a8c8f2d968f2e9afa9c3381b1058635777533ca03a0b1fbafeb82e23d1645eafdc945eb323740afe70a7cfbf7f006ead418f64358e87114ecf4a80eb940500a315e39beabeb5f1adb2a287757c63be16c7ed210dd4339b1550350d8805afaf7bd2951050d56cb0229a5d8741d7b1ccd5a10d7d263e79b8f4649481709f3853183118c81fef7deb7f771f93174abddeb03004309bafc2b0906cd415b6413f52f78b190d9db651ed7beb03d1959aa63a77a9deb9ef4200c383691eb79567f261dcbad29b72bea14438435b9cda4fb4cabbe0b84c53d4dec036200f0b0b29879e28ce45629a1a584e46c183dd572c79536ed262876bb818de2e17687413acb2587cf5174061285fd35e65fada9da31fc0b043eaa27d68e33148ec04838570a0cb062d1ea36756e945b61206fc9bf90e2c88b09248fb95bc081b533b4f1ad19289df4d9c8d2b4b5b6dc6639e02a0717694b10d4077be5c7f230c953603e0a821c13193e4adce2c3e23df22f02db01fed3338dcc7e27cc8cc0b5c609fb44b8bfd08bfad1a612359c7c8c7f9c3a1a924f8d2245275823bcb14c61db8245e6ddf9b5ebe1550c1c3b4d5e2d2c03d71231e8af0a6bcdf0f8eb1bff80e07f44b7f2cc3693bdcddc85cb1cca6293a9026940f81a420ce2185460f47caf637b30855880d98182bf6db4533b1e79863b5a21ddcf25d8c1233f80e995611a12131603ca1680d7a5384d881c76b4b2c7c2776de6aafffd02a9d495c1b281411d73b17d7f4793e2d821fbab0eda8f354dfab95e0b3e43d7f3ae5098c3e8634bd5bbf06922badcb24fe897e3b11bf97e9bb5dafa43d5891361d293336be5da9883bdf5579005f8b3d7a0019e0b0452fcdcfcd5113380b783984cf84e7d94bf821985014ff147e9d10cc3a7a05f0d3ca7c03305e334cfaaa494e1250efaa6a1698127aae36af249ce707ed5f40f1bcc179bf3f9adad19eb125ac37", 0x3e2}], 0x3}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="11268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 23:12:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x0) 23:12:12 executing program 4: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:12:12 executing program 1: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:12:12 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, 0x0, 0x0) [ 347.031095][T13448] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 347.069034][T13448] team0: Device ipvlan0 failed to register rx_handler [ 347.264895][T13451] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 347.308560][T13451] team0: Device ipvlan0 failed to register rx_handler 23:12:12 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000d00)="3033beab31cf5cfe15f064e19c92358e28cf2cb9c56b0af008293801f4bc03f7c2004ebcb77632c9721df2f74603964ea2847f11790080e62e351597799ccb19d170936a457041418db0ff51c9e4b10a3a4e3882f78df6a5a4cc459d27d27d34a40091c109a3ffe0d733a318e327f1040d6db89b53a613dd811f2c8fff870a2d788bf661086872ff84c8a49f536077cf11fc5e88c8db76947a", 0x99}], 0x1}, 0x0) 23:12:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)}, 0x0) 23:12:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000100)={0x10, 0x2}, 0x10) listen(r0, 0xe7) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 23:12:13 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f00000004c0)={0x1c, 0x1c, 0x1}, 0x1c) [ 347.926408][T13469] sctp: failed to load transform for md5: -2 23:12:13 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendto$inet(r1, &(0x7f0000000340)="8c", 0x1, 0x0, 0x0, 0x0) 23:12:13 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000000)="9b", 0x1, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:13 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000200)={r4}, &(0x7f0000000240)=0x8) 23:12:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000d00)='0', 0x1}], 0x1}, 0x0) 23:12:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)}, 0x0) 23:12:13 executing program 1: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f0001201", 0x2e}], 0x1}, 0x0) 23:12:13 executing program 3: r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000006c0)=ANY=[], &(0x7f00000002c0)=0x94) 23:12:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001080)=@in={0x10, 0x2}, 0x10) 23:12:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)}, 0x0) 23:12:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) [ 348.683271][T13509] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 348.697236][T13510] raw_sendmsg: syz-executor.4 forgot to set AF_INET. Fix it! 23:12:14 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000040)="17", 0x1, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x1}, 0x1c) dup2(r2, r1) [ 348.745462][T13509] team0: Device ipvlan0 failed to register rx_handler 23:12:14 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) connect$inet6(r2, &(0x7f00000000c0)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:14 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r0, &(0x7f0000000200)="3932ce6e2a44b562", 0x8, 0x0, &(0x7f0000001200)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:14 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200, &(0x7f0000000000), 0x4) 23:12:14 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@un=@file={0xa}, 0xa) 23:12:14 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 23:12:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000001f80)={0x10, 0x2}, 0x10) listen(r0, 0xe1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000040)=""/248, 0xf8}], 0x1) [ 349.350039][ T7] Bluetooth: hci1: command 0x0405 tx timeout 23:12:14 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @empty, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @rand_addr=0x8000, @empty, @loopback}}}}, 0x0) 23:12:14 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000180), &(0x7f00000001c0)=0xb) 23:12:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 23:12:14 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000040)="17", 0x1, 0x10c, &(0x7f00000000c0)={0x1c, 0x1c, 0x1}, 0x1c) dup2(r2, r1) 23:12:14 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r2, r1) 23:12:14 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000001f80)={0x10, 0x2}, 0x10) listen(r0, 0xe1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000040)=""/248, 0xf8}], 0x1) 23:12:15 executing program 1: pipe2(0x0, 0x0) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x800a00000, 0x0) 23:12:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000080)={0x0, 0x6, 0x0, 0xfffa}, 0x8) 23:12:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 23:12:15 executing program 0: socket$inet_sctp(0x2, 0x0, 0x84) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r2, r1) 23:12:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000700)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000040)="c7", 0x1}], 0x1, &(0x7f0000000680)=[@dstaddrv6={0x1c, 0x84, 0xa, @loopback}, @prinfo={0x14}], 0x30}, 0x0) 23:12:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000001f80)={0x10, 0x2}, 0x10) listen(r0, 0xe1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000040)=""/248, 0xf8}], 0x1) 23:12:15 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x23, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000240)=[{&(0x7f00000000c0)='\x00', 0x1}, {&(0x7f0000000100)="2f4718bea11d71", 0x7}], 0x2}, 0x0) 23:12:15 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000d00)='0', 0x1}], 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000340)="8c", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x5600}, 0x10) sendmsg(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 23:12:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 23:12:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000001f80)={0x10, 0x2}, 0x10) listen(r0, 0xe1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) readv(r1, &(0x7f0000000640)=[{&(0x7f0000000040)=""/248, 0xf8}], 0x1) 23:12:15 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000000)={@local, @remote, @val, {@ipv4}}, 0x0) 23:12:15 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 23:12:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a010d70eb0fe491e89e"], 0xa) 23:12:15 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xb) 23:12:15 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x89, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 23:12:15 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000180)='m', 0x1, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x81, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(r0, &(0x7f0000000240)=""/4096, 0x1000, 0xc0, 0x0, 0x0) 23:12:15 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 23:12:15 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000000)="9b", 0x1, 0x101, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 23:12:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000480), &(0x7f00000004c0)=0x8) 23:12:16 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)='{', 0x1, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000800)=ANY=[@ANYRES32=0x0, @ANYBLOB="070015"], 0x1d) 23:12:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080), 0x98) 23:12:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 23:12:16 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000000)={r3}, &(0x7f0000000040)=0x18) 23:12:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f00000007c0), &(0x7f0000000800)=0x4) 23:12:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@authinfo={0x10}], 0x10}, 0x0) 23:12:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000340)=ANY=[], &(0x7f0000000200)=0x8c) 23:12:16 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f00000000c0), 0x14) 23:12:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b0000", 0x17}], 0x1}, 0x0) 23:12:16 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) bind(r0, &(0x7f0000000280)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 23:12:16 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000140), 0x8c) 23:12:16 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f0000000500), &(0x7f0000000540)=0x8) 23:12:16 executing program 3: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x17) 23:12:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b0000", 0x17}], 0x1}, 0x0) 23:12:16 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000001b00)='}', 0x1, 0x0, &(0x7f0000001bc0)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}, 0x14) 23:12:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000002240)=[{&(0x7f0000000680)=""/208, 0xd0}], 0x1) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000600)=[{&(0x7f0000000200)="51ebd1fc028be075a2cbbaf838b50ea9c36f68221a8fe8fde3c6831e1edddc443348c91f934e06c70dc4cf9bc2771e0c8e3946f7fa8f568a164f69dba4d5b258cae043eaa54a7e2426d1f2675e1ce9a1fc2622a5624c50072fd2c4c331cbc61b7503813dde3ef6f98e7171eb23d8f1c86cdf2f64fec9bdda9c15db89d4c1636d2ff5ff0029f88f3d2eae63c637be829c92c0cb65473f53b28f702abf594f10650057453a16a4c5032b7251ec3851d3c40218bd1d0d20d8db0b4384a6588132cbe140114a62af3d686c64152cf6c28c8d4f0113726e9adb66b2e5aa7bf189c2aa9bdd8e82bd557fbf00000000000000", 0xff37}, {&(0x7f0000000a40)="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", 0xde}, {&(0x7f0000000380)="2c384b233da75f426b65cd80111e54c1cb5908cd4b7141abd29022267175ba02e5cbc62a7ec98839a7065e253199d6811265158c59716df762265231340f6aebe9a5fcc40648b5c4d56d8c7f763f91cb2d6b9b7601b2cb1afbf10c3c9bc8ff70ab5504135e0b57e40b6f04f43d0047ff1e8cd77b3b63d439d567f647bd99fc0228dd4f04f5e3d04c03825b878d0e4befc9869632c135b26719e3e3c9f99ce10d8cff3d00abaa16312527266f548b0cd865e9f9ba2afc92fe472fa56836a6c4b804399a13ebfbeb939061c8048d0f78f0b29c304f692e4d21faa00812f629", 0xde}, {&(0x7f0000000840)="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", 0xcc}, {&(0x7f0000000580)="5f2ebb4c91ce3d97e32e9329b4c8c8230c16696455aec3513120851c49a9e7a52443ab5fc45a2229bccf25b8bd2dd23679208ec93f582925768a53acf9f45fdd737e46b9fede9cedce12f39788179b09", 0x50}], 0x4) shutdown(r3, 0x0) 23:12:16 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @empty, @val, {@ipv4}}, 0x0) 23:12:16 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b0000", 0x17}], 0x1}, 0x0) 23:12:16 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x48}, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r2, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000000), 0x8) 23:12:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000080)={0x0, 0x0, 0x9}, 0x8) 23:12:17 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) sendto$inet6(r1, &(0x7f0000000040)="17", 0x1, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a", 0x23}], 0x1}, 0x0) 23:12:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 23:12:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000100)="ee", 0x1}], 0x1, &(0x7f0000000200)=[@authinfo={0x10}], 0x10}, 0x0) 23:12:17 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000300)={0x10, 0x2}, 0x10) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 23:12:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000280), &(0x7f0000000240)=0x4) 23:12:17 executing program 2: syz_emit_ethernet(0x9a, &(0x7f0000000040)={@local, @empty, @val, {@ipv4}}, 0x0) 23:12:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a", 0x23}], 0x1}, 0x0) 23:12:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000080), 0x8) 23:12:17 executing program 4: syz_emit_ethernet(0x4df, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 23:12:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002600)={&(0x7f0000001400)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000002540)=[@prinfo={0x14}], 0x14}, 0x0) 23:12:17 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000080), &(0x7f0000000140)=0x98) 23:12:17 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x23, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000240)=[{&(0x7f00000000c0)='\x00', 0x1}, {&(0x7f0000000100)="2f4718bea11d71", 0x7}], 0x2, &(0x7f00000006c0)=[{0x10}], 0x10}, 0x0) 23:12:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000340)=0x101, 0x4) 23:12:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000003f40)={&(0x7f0000002c80)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) 23:12:17 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f00000004c0)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a", 0x23}], 0x1}, 0x0) 23:12:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, &(0x7f00000029c0), &(0x7f0000003a00)=0x1002) 23:12:18 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 23:12:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9, 0xfff}, 0x14) 23:12:18 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000840), 0xc) 23:12:18 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 23:12:18 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a001000000002", 0x29}], 0x1}, 0x0) 23:12:18 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000040)={r2}, 0x8) 23:12:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 23:12:18 executing program 4: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv6}}, 0x0) 23:12:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$sock_linger(r1, 0xffff, 0x80, &(0x7f0000000000)={0x7fffffff}, 0x8) dup2(r0, r1) 23:12:18 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f00000005c0)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:18 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a001000000002", 0x29}], 0x1}, 0x0) 23:12:18 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 23:12:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_linger(r1, 0xffff, 0x80, &(0x7f0000000080)={0x1ff, 0x10c3}, 0x8) dup2(r0, r1) 23:12:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000200), &(0x7f00000000c0)=0x94) 23:12:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x103, &(0x7f0000000200)={r3, 0x2, 'bO'}, &(0x7f0000000040)=0xa) 23:12:18 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a001000000002", 0x29}], 0x1}, 0x0) 23:12:18 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000100), &(0x7f0000000080)=0x94) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000001680), &(0x7f00000016c0)=0x14) 23:12:18 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000001b00)='}', 0x1, 0x0, &(0x7f0000001bc0)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000000c0), 0x8c) 23:12:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=@file={0xa}, 0xa) bind$unix(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a010d"], 0xa) 23:12:19 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000001700), &(0x7f0000001740)=0x18) 23:12:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f000", 0x2c}], 0x1}, 0x0) 23:12:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) 23:12:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000080)={0x0, 0x6}, 0x8) 23:12:19 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000028c0)={0x0, 0x0, 0x0}, 0x20301) 23:12:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240), &(0x7f0000000000)=0x98) 23:12:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f000", 0x2c}], 0x1}, 0x0) 23:12:19 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/248, 0xf8}], 0x1) 23:12:19 executing program 4: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x34, 0x2}, 0x10) 23:12:19 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r2, r1) 23:12:19 executing program 1: syz_emit_ethernet(0x4de, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 23:12:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10}, 0x10) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10}, 0x10) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@in={0x10}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="66a45134afc024bbada8bb324fd2568844d83371eb6547dca81d850ef5210bc864bfb95cafad86d3b81b064c72de9a86a99ea54076b2ef8c6c1ec085350064d9dc70c95a964b7fd78275277ddb0a564207d802129b", 0x55}, {&(0x7f0000000100)="1927cd9fa37a38f61fb3e10c59707ce6c7699ba35d289a27ac4f3c11eacb452377f1c86a0ee1c36a38f6604a97dce60b98b2b0188ff8bc88f90a25779b37c6381cea21fb058ef915ee70e8fe717417d3d5d148b0f9527b02d6d63939a6ac184c93f58a190fa249031504ea432b157d3d397476a7d2cae02d05fbb786c56bde0e", 0x80}, {&(0x7f0000000340)="a392e0ebc3cc703d2000c58137efb1c6e9851820bb3a972094aff3f4836e2dc12a92e99a5e731609f4c7f026407dfaa74bd6b969d19796db8fa969a57e0cecc114f5db0a8233334dbaeeb8c63061f1f49d9a90ef0aa8e598c46241fbe6722c960d7ca5debd3d56b0383467a6ea80d9aa6939cb6a4297c89bc8fcf064b5a923af6ed97258f370da0b8906fc0ad081fc54b03e53462f21d94f70b0a257f39b6619f056d95a94f5c47485c12d1511f1518581a581c64369fc34a6c1c56c51069c2534c99102e66e108e1373131858c1f4766132f7797358cd95ea768cddc441e0ab2b1bd3b8b4e1d9b889b3", 0xea}, {&(0x7f0000000440)="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", 0xf31}], 0x4, &(0x7f0000001440)=[{0x10}, {0x10}], 0x20}, 0x108) 23:12:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f000", 0x2c}], 0x1}, 0x0) 23:12:19 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000400)={r3}, &(0x7f0000000440)=0x8) 23:12:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @loopback}], 0x24}, 0x0) 23:12:19 executing program 1: syz_emit_ethernet(0x212, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 23:12:19 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x14, 0x1c, 0x2}, 0x1c) 23:12:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000002240)=[{&(0x7f0000000680)=""/208, 0xd0}, {0x0}], 0x2) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000600)=[{&(0x7f0000000200)="51ebd1fc028be075a2cbbaf838b50ea9c36f68221a8fe8fde3c6831e1edddc443348c91f934e06c70dc4cf9bc2771e0c8e3946f7fa8f568a164f69dba4d5b258cae043eaa54a7e2426d1f2675e1ce9a1fc2622a5624c50072fd2c4c331cbc61b7503813dde3ef6f98e7171eb23d8f1c86cdf2f64fec9bdda9c15db89d4c1636d2ff5ff0029f88f3d2eae63c637be829c92c0cb65473f53b28f702abf594f10650057453a16a4c5032b7251ec3851d3c40218bd1d0d20d8db0b4384a6588132cbe140114a62af3d686c64152cf6c28c8d4f0113726e9adb66b2e5aa7bf189c2aa9bdd8e82bd557fbf00000000000000", 0xff37}, {&(0x7f0000000a40)="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", 0xde}, {&(0x7f0000000380)="2c384b233da75f426b65cd80111e54c1cb5908cd4b7141abd29022267175ba02e5cbc62a7ec98839a7065e253199d6811265158c59716df762265231340f6aebe9a5fcc40648b5c4d56d8c7f763f91cb2d6b9b7601b2cb1afbf10c3c9bc8ff70ab5504135e0b57e40b6f04f43d0047ff1e8cd77b3b63d439d567f647bd99fc0228dd4f04f5e3d04c03825b878d0e4befc9869632c135b26719e3e3c9f99ce10d8cff3d00abaa16312527266f548b0cd865e9f9ba2afc92fe472fa56836a6c4b804399a13ebfbeb939061c8048d0f78f0b29c304f692e4d21faa00812f629", 0xde}, {&(0x7f0000000840)="04ea8d82281e7383e1f6228ab3447e18d4cb1017b75225acbf4766da4d7a7670ebb9e5f4b7ff6e73c417584d5328fbdf9405b57847a97dc2ddb6b9b963f218c4e41626da6c491cb71614c97ef3a786e426dd118d2e06f1a60c1c8a1cf42563d1147987faf44dd3a947d1ce23bdd21586c6347f815bc7753f4cb07a52cdc643c1dd498c5283fe738fb5fe6a29f43529be3d4b74f129deb8a648e956671cf9fed7b2d551ce8beede5eaa90fbdd7fa3b4e125f2b4e56944d07e93dac751b89dabc7fad2b27d9c8dbc52e5d96cd528adafcd9564e37ef90e68bd49146789232202417b90158efdfe17f34b9a9e4c5daf856b6a249d988aa9203246f6d2505151c1f134b6d8a2c0423bd5e5b99cfe4dd2ea7226e19e32da0ccdc299a68f919dcaaa95fd932fd004b1db6fdfe4f71bf58567ca3d796286be046d1bf03e9e0c64ed3e2fc33c825005b0dbc50a476a8c5adee9f9fc9b2d1a3d0b1351ca176271d36549b788ad5f217435d4402ca564421957e8b34806e8fbc7e6b0e492a5c72ae898b9286842b546ab10837347a14395a626ac1756b3c7091c9cbc10524ffff2c042095a544c49da01ecddb07ff1631410c115f481472294ef00f24aba365ed7f65d1074560aee8d0006e57bc4", 0xcc}, {&(0x7f0000000580)="5f2ebb4c91ce3d97e32e9329b4c8c8230c16696455aec3513120851c49a9e7a52443ab5fc45a2229bccf25b8bd2dd23679208ec93f582925768a53acf9f45fdd737e46b9fede9cedce12f39788179b09", 0x50}], 0x4) shutdown(r3, 0x0) 23:12:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f00012", 0x2d}], 0x1}, 0x0) 23:12:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x1f}, 0x10) 23:12:20 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000200)=ANY=[@ANYBLOB="019821278d15e93f35bbbbbb86dd60dfff3000482f00fe880000000000000000000000000001ff020000000000000000000000000001242088be000000000000080070af3f6c000086dd080088be"], 0x0) 23:12:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000d00)="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", 0x5ad}], 0x1}, 0x0) 23:12:20 executing program 0: mlock(&(0x7f0000ff6000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x0) 23:12:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@file={0xa}, 0xa) 23:12:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000d00)="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", 0x5ad}], 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000340)="8c", 0x1, 0x0, 0x0, 0x0) 23:12:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) 23:12:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f00012", 0x2d}], 0x1}, 0x0) 23:12:20 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x79, 0x1c, 0x1}, 0x1c) 23:12:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = dup2(r3, r4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r6, 0x3, 0x8000, 0x1}, 0x10) 23:12:20 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_buf(r0, 0x29, 0x33, &(0x7f0000000000)="80", 0x1) 23:12:20 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000000780)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 23:12:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000002240)=[{&(0x7f0000000680)=""/208, 0xd0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000600)=[{&(0x7f0000000200)="51ebd1fc028be075a2cbbaf838b50ea9c36f68221a8fe8fde3c6831e1edddc443348c91f934e06c70dc4cf9bc2771e0c8e3946f7fa8f568a164f69dba4d5b258cae043eaa54a7e2426d1f2675e1ce9a1fc2622a5624c50072fd2c4c331cbc61b7503813dde3ef6f98e7171eb23d8f1c86cdf2f64fec9bdda9c15db89d4c1636d2ff5ff0029f88f3d2eae63c637be829c92c0cb65473f53b28f702abf594f10650057453a16a4c5032b7251ec3851d3c40218bd1d0d20d8db0b4384a6588132cbe140114a62af3d686c64152cf6c28c8d4f0113726e9adb66b2e5aa7bf189c2aa9bdd8e82bd557fbf00000000000000", 0xff37}, {&(0x7f0000000a40)="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", 0xde}, {&(0x7f0000000380)="2c384b233da75f426b65cd80111e54c1cb5908cd4b7141abd29022267175ba02e5cbc62a7ec98839a7065e253199d6811265158c59716df762265231340f6aebe9a5fcc40648b5c4d56d8c7f763f91cb2d6b9b7601b2cb1afbf10c3c9bc8ff70ab5504135e0b57e40b6f04f43d0047ff1e8cd77b3b63d439d567f647bd99fc0228dd4f04f5e3d04c03825b878d0e4befc9869632c135b26719e3e3c9f99ce10d8cff3d00abaa16312527266f548b0cd865e9f9ba2afc92fe472fa56836a6c4b804399a13ebfbeb939061c8048d0f78f0b29c304f692e4d21faa00812f629", 0xde}, {&(0x7f0000000840)="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", 0xcc}, {&(0x7f0000000580)="5f2ebb4c91ce3d97e32e9329b4c8c8230c16696455aec3513120851c49a9e7a52443ab5fc45a2229bccf25b8bd2dd23679208ec93f582925768a53acf9f45fdd737e46b9fede9cedce12f39788179b09", 0x50}], 0x4) shutdown(r3, 0x0) 23:12:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a00100000000280f00012", 0x2d}], 0x1}, 0x0) 23:12:20 executing program 4: syz_emit_ethernet(0xea, &(0x7f0000000040)={@local, @empty, @val, {@ipv4}}, 0x0) 23:12:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000040)='B', 0x1, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 23:12:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0xb) 23:12:21 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) sendto(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 23:12:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000340), &(0x7f0000000240)=0x8) 23:12:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000700)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000040)="c7", 0x1}], 0x1, &(0x7f0000000680)=[@dstaddrv6={0x1c, 0x84, 0xa, @loopback}], 0x1c}, 0x0) 23:12:21 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0xffffffffffffff64, 0x2}, 0x10) listen(r0, 0x4a) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) dup2(r2, r0) 23:12:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000840), 0xc) 23:12:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 23:12:21 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f0000000000), 0x4) 23:12:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0xb) 23:12:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="bd", 0x1}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="100000008400000008"], 0x74}, 0x0) 23:12:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000840), 0xc) 23:12:21 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x13, &(0x7f0000000080)={r4}, 0x8) 23:12:21 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000040), &(0x7f0000000080)=0x8) 23:12:22 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv6}}, 0x0) 23:12:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0xffffffffffffff92, &(0x7f0000000080)=[{&(0x7f0000000440)=""/125, 0x7d}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{r2, 0x1}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000200)=[{r4}], 0x1, 0x8000000000049) shutdown(r3, 0x0) 23:12:22 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008"], 0x0) 23:12:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20}, 0x14) 23:12:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000000)={0x0, 0x2, "9cf5"}, &(0x7f0000000100)=0xa) 23:12:22 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000400), 0x10) 23:12:22 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@local, @empty, @val, {@ipv4}}, 0x0) 23:12:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000040), &(0x7f0000000080)=0x8) 23:12:22 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000180)='[', 0x1}], 0x1, &(0x7f0000000440)=[{0x10}], 0x10}, 0x0) 23:12:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0a012e"], 0xa) 23:12:22 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x81, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:22 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000000c0)={0xf800}, 0x10) 23:12:22 executing program 2: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x23, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[{0x10}], 0x10}, 0x0) 23:12:23 executing program 3: syz_emit_ethernet(0x20af, &(0x7f0000000000)=ANY=[@ANYBLOB="533ec5135b92ffffffffffff86dd6045036420790000000000000000000042b3238dd01b17896d"], 0x0) 23:12:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@prinfo={0x14}], 0x14}, 0x0) 23:12:23 executing program 4: syz_emit_ethernet(0x21a, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 23:12:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x10) 23:12:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:23 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000080)=@un=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000001500)=[{0x10}, {0x10}], 0x20}, 0x0) 23:12:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000040)='S', 0x1}], 0x1, &(0x7f0000000100)=[@sndinfo={0x1c}], 0x1c}, 0x0) 23:12:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@init={0x14}, @sndrcv={0x2c}], 0x40}, 0x0) 23:12:23 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004800)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:23 executing program 3: syz_emit_ethernet(0x4de, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 23:12:23 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x5600}, 0x10) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 23:12:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0165"], 0xa) 23:12:23 executing program 0: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x23, 0x0, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 23:12:23 executing program 3: syz_emit_ethernet(0x1006, &(0x7f0000001140)={@broadcast, @random="ce3df91d183c", @val, {@ipv6}}, 0x0) 23:12:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000140)=0x8c) 23:12:23 executing program 1: syz_emit_ethernet(0x62, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 23:12:23 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x4a) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 23:12:23 executing program 4: open$dir(&(0x7f0000000180)='./file0\x00', 0x40a80, 0x0) 23:12:23 executing program 3: r0 = socket(0x2, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000140)=ANY=[@ANYBLOB="10024e20e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d2edfa5c94b68da500"/134, @ANYRES32], 0x94) 23:12:23 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000040), 0x4) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 23:12:23 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000200)=@in6={0x1c, 0x1c}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000840), 0xc) 23:12:23 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 23:12:24 executing program 4: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000001c0)=0x8) 23:12:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000002240)=[{&(0x7f0000000680)=""/208, 0xd0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000600)=[{&(0x7f0000000200)="51ebd1fc028be075a2cbbaf838b50ea9c36f68221a8fe8fde3c6831e1edddc443348c91f934e06c70dc4cf9bc2771e0c8e3946f7fa8f568a164f69dba4d5b258cae043eaa54a7e2426d1f2675e1ce9a1fc2622a5624c50072fd2c4c331cbc61b7503813dde3ef6f98e7171eb23d8f1c86cdf2f64fec9bdda9c15db89d4c1636d2ff5ff0029f88f3d2eae63c637be829c92c0cb65473f53b28f702abf594f10650057453a16a4c5032b7251ec3851d3c40218bd1d0d20d8db0b4384a6588132cbe140114a62af3d686c64152cf6c28c8d4f0113726e9adb66b2e5aa7bf189c2aa9bdd8e82bd557fbf00000000000000", 0xff37}, {&(0x7f0000000a40)="f8b7d894487953508b0924d4290495c20ab8dffc1565e174617c7b8f1b4bdb5709eaccf5890bd6e56f52a2bb0f90239281b2086c0344733d1734b0806a9b84c6be33d85576e17240e06b3e72c5b16f263d283fc3efb8a0c2be896df199f0effad75590b2a4e67e367526b141ce717b73ce5b8e11a1668de7c4d2e8379534e15e8ea9411400626cb4316a402738bac8c946533ba2458452776c2ccd2b500f2b011297a18b06905b03970b5d1e2a55b5a845e04701de821baaa4d6cb5f8e59966e919903141620dadd2aed7fac77acbbe354ec060000008f7d3158fc18fce386de1e0121dfe6b161348e0eaf856a9a039870f320a2a69019b62029bf9c22bc4a4a57d110fb7fc06d433b0a36b5a834244b67d89a88280eb47b82cb59235492440b10b0e6e7187a5a62876bdb42d296f5f9446a0892da8f890f16a17020dd75392310102c98d67eff82dc5cf1538f5d6b55c4106d66ed86651fcc2745a861eec45763bd463eabc94b696bfeff00000000000000000000000000000000000000000000886525b986dfa86c64b4e3978fc3d0ec8cae1327e2c7291cca2a611b98fd10c0a1acf4efa81e3510eab8fc175bae10e52128287d9590a0b3d532244991db885710b40de0cd4170213f8a099dc0223b712509fc6972ae1ad3468fd4b2d4c7ae630688d2aa638aa9b941996ab72c8a0495389c18382b19d942816c4ff34dfcd57329ce357627f2a3dc293199ef8838113d1a784e0e9b8d15e27678f56c1516d6aee4ff0cc6f500d3c88ac73d001996ddf4b2b30dd580e266f2c1e1cea9effbb3d16ed3ac64b81edbaac43d01834cf3f7eb7a34b01f0bae5ec51052f6ec578734c1f71a1ba82f6087f384d2bc16ada4bc5f5ffe0b2ec88b305e8cd8b4f99db3060df71e0f2e8c2ce6556a1f6f25c9", 0xde}, {&(0x7f0000000380)="2c384b233da75f426b65cd80111e54c1cb5908cd4b7141abd29022267175ba02e5cbc62a7ec98839a7065e253199d6811265158c59716df762265231340f6aebe9a5fcc40648b5c4d56d8c7f763f91cb2d6b9b7601b2cb1afbf10c3c9bc8ff70ab5504135e0b57e40b6f04f43d0047ff1e8cd77b3b63d439d567f647bd99fc0228dd4f04f5e3d04c03825b878d0e4befc9869632c135b26719e3e3c9f99ce10d8cff3d00abaa16312527266f548b0cd865e9f9ba2afc92fe472fa56836a6c4b804399a13ebfbeb939061c8048d0f78f0b29c304f692e4d21faa00812f629", 0xde}, {&(0x7f0000000840)="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", 0xcc}, {&(0x7f0000000580)="5f2ebb4c91ce3d97e32e9329b4c8c8230c16696455aec3513120851c49a9e7a52443ab5fc45a2229bccf25b8bd2dd23679208ec93f582925768a53acf9f45fdd737e46b9fede9cedce12f39788179b09", 0x50}], 0x4) shutdown(r3, 0x0) 23:12:24 executing program 3: syz_emit_ethernet(0x62, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 23:12:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000440), 0x8c) 23:12:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x8) 23:12:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:12:24 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 23:12:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x5) 23:12:24 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000003f40)={&(0x7f0000002c80)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000003f00)=[@dstaddrv4={0x10, 0x84, 0x9, @remote={0xac, 0x14, 0x0}}], 0x10}, 0x0) 23:12:24 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:24 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000100), 0x8) 23:12:24 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000580)=ANY=[@ANYBLOB="01"], &(0x7f00000002c0)=0x8) 23:12:24 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000040)=0x23) 23:12:25 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffff92, &(0x7f0000000080)=[{&(0x7f0000000440)=""/125, 0x7d}], 0x1}, 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x23, &(0x7f0000000000), 0xfe6a) 23:12:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:12:25 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f00000002c0)="cc", 0x1, 0x0, &(0x7f0000000340)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:25 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000001b00)='}', 0x1, 0x0, &(0x7f0000001bc0)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000d00)="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", 0x5ad}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000040)={0x0, 0x5600}, 0x10) sendmsg(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 23:12:25 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="10"], 0x248}, 0x0) 23:12:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), &(0x7f0000000040)=0x94) 23:12:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0xffffffffffffff92, &(0x7f0000000080)=[{&(0x7f0000000440)=""/125, 0x7d}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{r2, 0x1}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) poll(&(0x7f0000000200)=[{}, {}], 0x2, 0x8000000000049) shutdown(r3, 0x0) 23:12:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, &(0x7f00000017c0)="8e004537262b9c05d777e145a299b94d23b5571acf10dc0198ef050bc6ecdc53aca6fdc2bd295fc26c408b4354b5bd83bbc690c4012e1b5923022070047e56879565f2f87804d7f7ec8ea0c923671d4177ac88a5e59cd1d5d6678cd6003de9ea32a7ac7e757af4e43fb0e674f9923781548047fef5b7c930bea510db7cc3c55b39ee2969b7448233e7ca95ac2102a53516ceeb2a0e600368f514d172f1c0dd5c0d66ce10544203f748831be8868493b47fbe5a35bdb1a99da1bff4cb5962e11e1a221daa0c1de7ad05cff5cb8c037f7bec6a7348b2295866ced2dd4c4e10065de283cc1e0a3dc04c8455639d069c46695cf84924895f81258c8a66f9b1447e33ebebc41be70cb9353a7adadd48feff542ca7a63226801957845851506759d29452c8ed3bea135342c516578f2b2231a5ccb24b7f543bed81d1ccfe661a9f78adb41a6dfd89035d7e3a5b339eaaf63bc817a79781f538d68094f5d582b0a737a5d57c0e37d636800a69415d123765242e5beee86e86664bb6b72dbb92dcd44da22ceb73c05c5b1022a023b993424d056e602d2dffbc86d2692103b77067698618eb3f0cd4e4d650e23fab2a356325de2775031d4187898009d501a1b2e0a82afcffb4d493a106f38b8113e39375d48e5d44e091cd7e086f319e8e9909e55e8c80f06ce40a1823b844c4225dcb49acf78cffc48a7604aee2c17391c365f44d73d2f60ab56d8a97ce99b8b477e7739572d80bb5e7c4eba98370d942413cd4407779df588656b7c122c314e15748248451faaa848acaf8110f6d20339a8adb87ce4bb5e2c7982632d34349dd27849ad11816ed37f9f399ae452fe9a1d88cbe2e25cac95cdfbdac923eadf7753b771c69f45a5b2d97de48b23719f96f4d23fe14b8d0d458b1a698e629b8f64371104799570869bcaf75ef77b43324c194be1199d59bd45325a504937ebef7c1ccdbd885aafec474e4f270b5ac2649cb822a724c0f11cf218192bc7c6ebfb9bb769a45172a7e7c47b3ca4a6b37b13191ef5f573a2fc84b6e4a4811003c57fb333bbb0c8b94a24edb96f36b1c8bae5896944f8c260804f2cdd5deb808a62a448f7a4ae98802f290513f721f34346f58ad80d14954b48dfa2960f3e1d2568840ce0ecd4053bb64e453a1397f1028f096f22ea5592ae2337d76a39508b85e93c284d1a12621f02a44fe0751f8a7585fcdafd6d8c918050402b153e0ff52e380a9c47e208bbd8351716f8e053ec6eac20649c6a3d0eefe4723486881f19bf5fc2f51ff79452fb9858320d805e18567fa85f4aa8cafc0470b23d6b938784cf6ef8f585f3fb44d62ec426bd41bdeda1312b4cc447d820f2a807ad2acba28f1c01668a7ddba90977b6affb79008f9083226ed754d526e92ba5669f0080f265b8dd8d5ea2532ad5da890f5796e06cee36a5d5ab3a4a32492a380e25aaf7bc9bbfeca5a83cbf8746a4e7d070f0f5c6839117c2ce6425af2138402a765e4e17913bfb6823b40f5a5d8b2f96e8cf6defc5104f517dad8f42bccd4abd0c95eba5c3854ec12f4bd775150b7e1f808eca743ea79d12586e9c6ef99f4e735fa6c91e8c64011144596496e3cf010bae9753e8983c3bdc3ea015361023762aaf8c546c76089fea45d91ea2822e9a8cbad1261930108152fcadbda00147b6e674bb9fe38b5c9b0d7ac79445dc8d634431cca53e7be7bdf9167e41e6dda172b48212981ad1d880b87f04460e6776985ad12b1f46d5f0aba85b6cadbce49674fc3b05d28ee22c0286a5f8595ecc69b24131965f787db8eb1996aa837cb82f87ce31a1e739a4ca2611f278e7c28cf9167f4c64d203175e24895dcad3e45837b1d9f89a2ccd8d7f9cb38a38087721d9101495a2f2f4cb0c5f048729b9830d4a0fe68b8d408df38a9ff295395e47fbf6f228766bcc9d6e7e7ad82a743499e5a54a9afcde6a5afea15be619fd0d34ef18c8438756c8cc61d3599be9416e09e22c9eb391add5610e00c038bd1b841a71c661bb64b314456f05120f0d203ea150a56671f6e421a19f194cb9a016b02fcf13fc06d6e9cb1a59114975fae85425d62ccd9e696fdcaa5ca3e25a40f886fdbf02c899ad727674798df8e544d93154fe5be8dcd1694a390625c390b842f100b87ceeb709bb63fae561c451d14eb345533d2bffacd51de437dca1e0af9a95d842d6f3ae8b835fd4dad5f562e63a4118c53500c3aa0817512f18c4bef73963ed5c0ee7ad52f919bd40bfde64086f5ef1a2c73fbf1516a558ada889adb6da448f5d8649577d6bfa3ec499503b3cef6ba77223f527d37e28684d5b141304ea0b8b3edd85cb9be294fdec16642a5a4fac3e6d3f334ea1c56e59f86d4b8d5ff8abcb9511b377730f9d9a814d524de63c6e30e7bc837e414058e7dabdc6414ae4a543acceb4f6f0c16860593c3b95284c75a9bf0d874bada008578e6a228ddf6f8f37e4e7387c25bd4864d69880110a563e9711253d6815f1defc8d19684ece637bb38388e8a3ae07727a499788c03e65f2f2587f635362999eef57707f4f2975948fc2c6815dbc420389cbf5d5c85ee1716379c58b85c113ae31ad6b9e64772c48b88f5d8fe1eeb95efd51cab1101ba4e64873d0fb12b325780be94336746c51be1b5b65187145749f230198c220484a46fcbed5548b0964959f08faab52a414a1f8a088a3418ca5813fb671e471ede8ce53c2f0a77e65b8a0226d78c9fe5252c6ce078d43d8e194ba39664761c2a7097ba90594f83f04c39d8125114ff77744845a37e9d4f9ea0dddc7564585f0c58f8e9af8f769b1c55b1c6711b5225592257164c287510e92766c7a3ad7f61bdf3d796164839ada29fb2e5675a6d13d3c8e60a06d82d0922b3a474df1af18756efd14dc58f9fadf97dfa90183864138d6fe85c21644863a4d3da3f80090f66a377d9b6abc9054eabd88ec603dbe4026c0e5df2076325f38f8379817bfa650e33da8814704783a614b28e25523156b69631cb5aec55287f4de17205d6dbda517c31fa711587754b5466358c70fb37961baee2299c3a283e00e69497074fe5d918cf53d672db14c4d59a406a0488b20ebab51c61a52aaadfa777f75f0d24becd25db1547995473c68ff96ed67e1fff5289cfb88d93f5efc75aafef2621a855c7cd6e2fbf68e3d01b87802662b227a688aeac11abd687eb2f5946a59087d85df7c953e63ee93f5c5f2c400d054d7766546047af90e73280b1de9b795af93c7e4b779aacf586ce10121d2841211fbc7e0636a0440c1ab1de0fb90f04ff24dcf2b69755ca844df9d9023da55852262232ec5d9b6b58041e50c8aa805fdc2f8bddf4a7cff8cf055a3aa652ad724153127e51f56b95c04cffd1bd868bda32becabd5a9cf560f0e1e28b5ea9e6d0677dddcfcce8d57af79e7d9d5110749fd24bce57bd8432c419c5f5f3844f3bcaae6dc1352d4bdd5adbcc4ad933b06b8a1586af99b4c8091aa39eb5dcd512fff8b6f4418c049341bccbfeeadb881ed8ec9fef0a4103d72e3e847ae93ea05ea309dfb5cc5d7f09188db9c8f218e9e5df9322c9d06ec5663a914ddbe0ffd18be448cc681477431df6bfc6b6bd7deb7978e4a36ac39491c5f70240ea37b670fd17738cac0e3cf6bfbfdf4f73241eaeb3fb04b686771c8b5f2e8af39b904cfa646bd5751a76014bd9ef6b16adc209c32aa46cfc00a683f0e0343282a13ecbf3685c65c6369c9fb0bd8edafea833645c5af721515b459ad540c6b95b4fecacca3b811cf26b23dd4ac98552815429463031832650718d447244c28b26c0a4cc492a9f3ba3ad30d0c3cce225cc7deae88207c9bc45a9d3cf6907d3f1cb224ff1ede63f90dc46dc6530e5936306f9c63529b78505ce91ce9308368db3d152733630ee53645c9a26a05db2b957dbbfa3273f86f23b102f9ba6764f5cefff94ddb7ed84254997aa7cdf297a839b377885c0a749834356f027e29c1e323d591b2a840ce5e84e62c369161d607e859536d9ff1020ed3d953401d60965ee7f4833433fa52ed95db7de2c00ca3770da607b87bfa6400afb5c4d786eca9ebf2d54560922360337aab97367fbe43890c51ab421efa98ee1b75f03b5e8164a698460ccb84581859b19400dda4cd07684d2d30c2dfb66d9408141ce5dda759f940a9f7b2e2c83d58ad64c73a479a20eb01b9044116c76c9897c6a2f8a257893c4b22a27b8913b2f7a0a10582724c4d59d943ecaf30d7879c0724fa703360225468445e98425de1087ed82ac619b7bddb184514ff0c546a58d26b02bf2e4258f76d31cd0b227777a50a1a9d165c8f154a938bb4a6d1068590e3bd0464431a73294273aec545ad2a6413937987d2c75dedafd3b43f7b2a2e4d1873d6c046ded4b9f02ff7e75795db429cdf2629281df21f2a8473a4b2c2584c2fc27874cf26604c9beb5417b594b8a89d66471c5bb8bc05e86e312d3f59bafe8da147d08f8c0dc3ad1af516b91ecc1026e636d3faba8d62ab8f784ea67f87c8a52a0b72a65abfe00786d63592760d1aeb59cb7cfa9b3640aaab76285f156274286d7f2f7945ad74032bcce1004d4d32f4fb207ce3be2076dc25b5d8b15eb3251cc6655f3fc658a8ef8e32b76be49f996b2de72854e008878c8d96e2fb4566236d85e10f1d4df3e69d745f51b39efe6e031d3e1fcb6b008b4435107b8352f4037964a7ca1cecfc545755b0b3c5bf6a7e9ea81acac74173b969b2001227e1257ab10ca062b85620291ac50af7927a0f6492e22640d621fa6a27ac2a3a5b4004ff03afc8e0809d03c10f23d24f239b04bce59a7a466766ceaa001363a0122a3cecee0c78c5361dabdfeb7a10d96dfda83fd4a9d7e9425593e61d00788507cb1d9ff97a364444811975572ec3bc39096d2da4130cdb7f49d1cd960f4f523ff686bcd0b0314259a4773925f01c084bbf58dd1fcfa3eeddbccea9c5ae7ddbdba93b68a8f5268f0e5864b8bcd8f14a30d9a874c91da41a1c372ea5d62051126dd97897bd7813b4cfaee94921743079bb38ae038824b038a93e28f59f91b5661920378624a605e06744974badf6a0999f464aa4b47ef71a166a46c5a843f4e19b4d4b61a389285e3af9a5dc0db85a426008e99442ebd2ca1a7631487e2fb4074c0cc2e1cf959154932f1967abf4a74cb1d2e51f1990b6156fa5d7a75cc3cab355a92bf869ea0ebd50ea80111daed8b95d3c9e408067844b8c83fb4bb39fa98bf39c4ab0b3bb7a2eb8171f841614e7d02ae31daa7f1fa36e5246a03409dad3768e81558ce01c97dbf1ef867da8ea16f4e6f8af241327dc8d0b15ba5f97671d5b6206bdd68e67a0236aeb707bb4bab536eaa7b9524eefd921498bcb00483527a7b9b8a24d9ec4904a64cc27362cac55e3987ae463f178f51e5005ff93f4979c8f8f2dbcd670f754397e46a22c215c72c5b356533c815522f99e97cb637163df51e8527b576b29ce26e06f132653eafb60d63ae6b69f8ab17d4e4371225994ab4597d62c472a33eae0080e5ccebccd7177963a7ac5ff0da55cbf93aa6dacbc603a9fa5d65e83b16ad3025c0a3efd0d878062b017baa074b4d60ec4a3e9c31dc0f09a72b74f5d30ca3ca1bcbd0610ce874c0602f0dd92da0c4050b2814720304f43103fd2114a37f023fb6607af67dc19f701934e3b275a530f32b09986811c9a392f13d58d209bed02aaa6f595c9b8308b590a3692806640e288fec18d7c3d4fccf20847a2dc75241da25301123f0be150a116e646509b901f844699bd357c0e95ea1f27b", 0xff1, 0x0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) 23:12:25 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:25 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6) 23:12:25 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @remote={0xac, 0x14, 0x0}, @local, @broadcast}}}}, 0x0) 23:12:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, &(0x7f00000017c0)="8e", 0x1, 0x0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000b40)="1a", 0x1}], 0x1}, 0x0) 23:12:25 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 23:12:25 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000200)={r4}, &(0x7f0000000240)=0x8) 23:12:25 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000200)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:25 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000002a40)=ANY=[], 0x1c, 0x0, 0x0, 0x0, 0x10}, 0x0) 23:12:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r2, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000000), 0x8) 23:12:25 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)='{', 0x1, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000029c0)={&(0x7f0000002880)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) 23:12:26 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:26 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2}, 0x1c) bind$inet(0xffffffffffffffff, 0x0, 0x0) 23:12:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0xe9) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000d00)='0', 0x1}], 0x1}, 0x0) sendto$inet(r1, &(0x7f0000000340)="8c", 0x1, 0x0, 0x0, 0x0) 23:12:26 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x8008, &(0x7f0000000040), 0x4) 23:12:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f0000000100), 0x4) 23:12:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000002240)=[{&(0x7f0000000680)=""/208, 0xd0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000600)=[{&(0x7f0000000200)="51ebd1fc028be075a2cbbaf838b50ea9c36f68221a8fe8fde3c6831e1edddc443348c91f934e06c70dc4cf9bc2771e0c8e3946f7fa8f568a164f69dba4d5b258cae043eaa54a7e2426d1f2675e1ce9a1fc2622a5624c50072fd2c4c331cbc61b7503813dde3ef6f98e7171eb23d8f1c86cdf2f64fec9bdda9c15db89d4c1636d2ff5ff0029f88f3d2eae63c637be829c92c0cb65473f53b28f702abf594f10650057453a16a4c5032b7251ec3851d3c40218bd1d0d20d8db0b4384a6588132cbe140114a62af3d686c64152cf6c28c8d4f0113726e9adb66b2e5aa7bf189c2aa9bdd8e82bd557fbf00000000000000", 0xff37}, {&(0x7f0000000a40)="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", 0xde}, {&(0x7f0000000380)="2c384b233da75f426b65cd80111e54c1cb5908cd4b7141abd29022267175ba02e5cbc62a7ec98839a7065e253199d6811265158c59716df762265231340f6aebe9a5fcc40648b5c4d56d8c7f763f91cb2d6b9b7601b2cb1afbf10c3c9bc8ff70ab5504135e0b57e40b6f04f43d0047ff1e8cd77b3b63d439d567f647bd99fc0228dd4f04f5e3d04c03825b878d0e4befc9869632c135b26719e3e3c9f99ce10d8cff3d00abaa16312527266f548b0cd865e9f9ba2afc92fe472fa56836a6c4b804399a13ebfbeb939061c8048d0f78f0b29c304f692e4d21faa00812f629", 0xde}, {&(0x7f0000000840)="04ea8d82281e7383e1f6228ab3447e18d4cb1017b75225acbf4766da4d7a7670ebb9e5f4b7ff6e73c417584d5328fbdf9405b57847a97dc2ddb6b9b963f218c4e41626da6c491cb71614c97ef3a786e426dd118d2e06f1a60c1c8a1cf42563d1147987faf44dd3a947d1ce23bdd21586c6347f815bc7753f4cb07a52cdc643c1dd498c5283fe738fb5fe6a29f43529be3d4b74f129deb8a648e956671cf9fed7b2d551ce8beede5eaa90fbdd7fa3b4e125f2b4e56944d07e93dac751b89dabc7fad2b27d9c8dbc52e5d96cd528adafcd9564e37ef90e68bd49146789232202417b90158efdfe17f34b9a9e4c5daf856b6a249d988aa9203246f6d2505151c1f134b6d8a2c0423bd5e5b99cfe4dd2ea7226e19e32da0ccdc299a68f919dcaaa95fd932fd004b1db6fdfe4f71bf58567ca3d796286be046d1bf03e9e0c64ed3e2fc33c825005b0dbc50a476a8c5adee9f9fc9b2d1a3d0b1351ca176271d36549b788ad5f217435d4402ca564421957e8b34806e8fbc7e6b0e492a5c72ae898b9286842b546ab10837347a14395a626ac1756b3c7091c9cbc10524ffff2c042095a544c49da01ecddb07ff1631410c115f481472294ef00f24aba365ed7f65d1074560aee8d0006e57bc4", 0xcc}, {&(0x7f0000000580)="5f2ebb4c91ce3d97e32e9329b4c8c8230c16696455aec3513120851c49a9e7a52443ab5fc45a2229bccf25b8bd2dd23679208ec93f582925768a53acf9f45fdd737e46b9fede9cedce12f39788179b09", 0x50}], 0x4) shutdown(r3, 0x0) 23:12:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x1f, 0x800}, 0x10) 23:12:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000700)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f00000005c0)=[{&(0x7f0000000040)="c7", 0x1}], 0x1, &(0x7f0000000680)=[@prinfo={0x14}], 0x14}, 0x0) 23:12:26 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x26, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 23:12:26 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:26 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:27 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 23:12:27 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f00000004c0)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001840)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001780)=[@sndinfo={0x1c}, @dstaddrv4={0x10, 0x84, 0x9, @local={0xac, 0x14, 0x0}}, @dstaddrv4={0x10, 0x84, 0x9, @local={0xac, 0x14, 0x0}}, @dstaddrv4={0x10, 0x84, 0x9, @local={0xac, 0x14, 0x0}}, @dstaddrv4={0x10}, @init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @broadcast}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast2}, @init={0x14}], 0xb0}, 0x0) 23:12:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000080)={0x1}, 0x1) 23:12:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000040)=""/248, 0xf8}], 0x1) 23:12:27 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f00000002c0)={&(0x7f0000000240)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 23:12:27 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @remote, @val, {@ipv4}}, 0x0) 23:12:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f00000002c0), &(0x7f0000000300)=0xc) 23:12:27 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockname$inet(r0, 0x0, &(0x7f0000001580)) 23:12:27 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 23:12:27 executing program 2: r0 = socket(0x1c, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000001080)=ANY=[@ANYBLOB="1c1c4e2100000000000000000000f7"], &(0x7f0000001140)=0x98) 23:12:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000040), 0x14) 23:12:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f0000000100), 0x4) 23:12:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0x98) 23:12:27 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000100), &(0x7f0000000080)=0x94) 23:12:27 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) connect$inet6(r2, &(0x7f00000000c0)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, &(0x7f00000017c0)="8e", 0x1, 0x0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) 23:12:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000340)=0x101, 0x4) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000b40)="1af0d6d49d89d6528926b2a17f1cc0bad8a074b90ad332784085603a2bec9459e824826a015988b46aefbfe2c3d529dff42dd27f108e6dd62d918aa763349408146b2f5f2f06081c0341bc72a0cc6b2166f0e379c25d41dbefc2abf4c011c224a787aa967bfe6f1c8a7aa2f972a85f469754b25567eed8c96806adc98355fa03ff8b0642fc24093d8b1023d36556b7cac73dc01d0e33e98ddb0a5251", 0x9c}], 0x1}, 0x0) 23:12:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f0000000100), 0x4) 23:12:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000002240)=[{&(0x7f0000000680)=""/208, 0xd0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000600)=[{&(0x7f0000000200)="51ebd1fc028be075a2cbbaf838b50ea9c36f68221a8fe8fde3c6831e1edddc443348c91f934e06c70dc4cf9bc2771e0c8e3946f7fa8f568a164f69dba4d5b258cae043eaa54a7e2426d1f2675e1ce9a1fc2622a5624c50072fd2c4c331cbc61b7503813dde3ef6f98e7171eb23d8f1c86cdf2f64fec9bdda9c15db89d4c1636d2ff5ff0029f88f3d2eae63c637be829c92c0cb65473f53b28f702abf594f10650057453a16a4c5032b7251ec3851d3c40218bd1d0d20d8db0b4384a6588132cbe140114a62af3d686c64152cf6c28c8d4f0113726e9adb66b2e5aa7bf189c2aa9bdd8e82bd557fbf00000000000000", 0xff37}, {&(0x7f0000000a40)="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", 0xde}, {&(0x7f0000000380)="2c384b233da75f426b65cd80111e54c1cb5908cd4b7141abd29022267175ba02e5cbc62a7ec98839a7065e253199d6811265158c59716df762265231340f6aebe9a5fcc40648b5c4d56d8c7f763f91cb2d6b9b7601b2cb1afbf10c3c9bc8ff70ab5504135e0b57e40b6f04f43d0047ff1e8cd77b3b63d439d567f647bd99fc0228dd4f04f5e3d04c03825b878d0e4befc9869632c135b26719e3e3c9f99ce10d8cff3d00abaa16312527266f548b0cd865e9f9ba2afc92fe472fa56836a6c4b804399a13ebfbeb939061c8048d0f78f0b29c304f692e4d21faa00812f629", 0xde}, {&(0x7f0000000840)="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", 0xcc}, {&(0x7f0000000580)="5f2ebb4c91ce3d97e32e9329b4c8c8230c16696455aec3513120851c49a9e7a52443ab5fc45a2229bccf25b8bd2dd23679208ec93f582925768a53acf9f45fdd737e46b9fede9cedce12f39788179b09", 0x50}], 0x4) shutdown(r3, 0x0) 23:12:28 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x40600, 0x0) 23:12:28 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000040), 0x8) 23:12:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0xa0) 23:12:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0)={0xf7, 0x0, 0xdd}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0xb) 23:12:28 executing program 2: syz_emit_ethernet(0x30b, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 23:12:28 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x100, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:28 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x81, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:28 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f00000004c0)={0x1c, 0x1c, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:28 executing program 1: syz_emit_ethernet(0x50, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 23:12:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080)={0x0, @in, 0x6}, 0x98) 23:12:28 executing program 0: r0 = socket(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000500)=ANY=[], &(0x7f00000005c0)=0x94) 23:12:29 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x50, &(0x7f0000000080)={0x4, {{0x1c, 0x1c}}}, 0x88) 23:12:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000040)="d8", 0x1}], 0x1, &(0x7f0000000880)=ANY=[@ANYBLOB="100000008400000008000000ff0000002c00000084"], 0x3c}, 0x0) 23:12:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000001480)=[@dstaddrv4={0x10, 0x84, 0x9}], 0x10}, 0x0) 23:12:29 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 23:12:29 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000100)={@local, @remote, @val, {@ipv4}}, 0x0) 23:12:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000001f80)={0x10, 0x2}, 0x10) listen(r0, 0xe1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 23:12:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000580)=""/110, 0x6e}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000002240)=[{&(0x7f0000000680)=""/208, 0xd0}, {0x0}, {0x0}, {0x0}], 0x4) recvfrom$inet(r3, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r4, &(0x7f0000000600)=[{&(0x7f0000000200)="51ebd1fc028be075a2cbbaf838b50ea9c36f68221a8fe8fde3c6831e1edddc443348c91f934e06c70dc4cf9bc2771e0c8e3946f7fa8f568a164f69dba4d5b258cae043eaa54a7e2426d1f2675e1ce9a1fc2622a5624c50072fd2c4c331cbc61b7503813dde3ef6f98e7171eb23d8f1c86cdf2f64fec9bdda9c15db89d4c1636d2ff5ff0029f88f3d2eae63c637be829c92c0cb65473f53b28f702abf594f10650057453a16a4c5032b7251ec3851d3c40218bd1d0d20d8db0b4384a6588132cbe140114a62af3d686c64152cf6c28c8d4f0113726e9adb66b2e5aa7bf189c2aa9bdd8e82bd557fbf00000000000000", 0xff37}, {&(0x7f0000000a40)="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", 0xde}, {&(0x7f0000000380)="2c384b233da75f426b65cd80111e54c1cb5908cd4b7141abd29022267175ba02e5cbc62a7ec98839a7065e253199d6811265158c59716df762265231340f6aebe9a5fcc40648b5c4d56d8c7f763f91cb2d6b9b7601b2cb1afbf10c3c9bc8ff70ab5504135e0b57e40b6f04f43d0047ff1e8cd77b3b63d439d567f647bd99fc0228dd4f04f5e3d04c03825b878d0e4befc9869632c135b26719e3e3c9f99ce10d8cff3d00abaa16312527266f548b0cd865e9f9ba2afc92fe472fa56836a6c4b804399a13ebfbeb939061c8048d0f78f0b29c304f692e4d21faa00812f629", 0xde}, {&(0x7f0000000840)="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", 0xcc}, {&(0x7f0000000580)="5f2ebb4c91ce3d97e32e9329b4c8c8230c16696455aec3513120851c49a9e7a52443ab5fc45a2229bccf25b8bd2dd23679208ec93f582925768a53acf9f45fdd737e46b9fede9cedce12f39788179b09", 0x50}], 0x4) shutdown(r3, 0x0) 23:12:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000001480)=[@dstaddrv4={0x10, 0x84, 0x9}], 0x10}, 0x0) 23:12:29 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008060001"], 0x0) 23:12:29 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x25, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000000)=0x8) 23:12:29 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/57, 0x39}, {0x0}], 0x2}, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xd051, 0x0, 0x0, 0x800e00556) shutdown(r2, 0x0) ppoll(&(0x7f0000000180)=[{}, {}, {}, {}], 0x4, 0x0, 0x0, 0x0) shutdown(r3, 0x0) 23:12:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000001480)=[@dstaddrv4={0x10, 0x84, 0x9}], 0x10}, 0x0) 23:12:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0xffffffffffffff92, &(0x7f0000000080)=[{&(0x7f0000000440)=""/125, 0x7d}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff68, 0x0, 0x0, 0x800e00547) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ppoll(&(0x7f0000000040)=[{r2, 0x1}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r3, 0x0) 23:12:29 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:29 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaab71ef84dc5bc24b2"], 0x0) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="db26fe421c1c"], 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x8008, &(0x7f0000000000)=0x2ffffff, 0x48) 23:12:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000001480)=[@dstaddrv4={0x10, 0x84, 0x9}], 0x10}, 0x0) 23:12:29 executing program 5: r0 = socket$inet6(0x1c, 0x20000003, 0x0) recvfrom$inet6(r0, &(0x7f0000000500)=""/4096, 0x1000, 0x0, 0x0, 0x0) 23:12:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9}, 0x14) 23:12:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=[@sndrcv={0x2c}], 0x2c}, 0x0) 23:12:30 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000140)={r4}, &(0x7f0000000180)=0x8) 23:12:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000680)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@dstaddrv4={0x10, 0x84, 0x9, @multicast2}, @sndrcv={0x2c}], 0x3c}, 0x0) 23:12:30 executing program 5: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@random="d3f708fcf45a", @random="fc87b91f9939", @val, {@ipv4}}, 0x0) 23:12:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000100)="ee", 0x1}], 0x1, &(0x7f0000000200)=[@init={0x14}, @authinfo={0x10}], 0x24}, 0x0) 23:12:30 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) sendto$inet6(r0, &(0x7f0000001b00)='}', 0x1, 0x0, &(0x7f0000001bc0)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:30 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0x1c, &(0x7f0000000600)=""/54, &(0x7f0000000640)=0x36) 23:12:30 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvfrom$inet6(r0, 0x0, 0x0, 0x40043, 0x0, 0x0) 23:12:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_linger(r1, 0xffff, 0x80, &(0x7f0000000080)={0x1ff}, 0x8) dup2(r0, r1) 23:12:30 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000001b00)='}', 0x1, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x18) 23:12:30 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 23:12:31 executing program 3: shmget(0x2, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) 23:12:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000300)=@un=@file={0xa}, 0xa) 23:12:31 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @remote, @val, {@ipv6}}, 0x0) 23:12:31 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv4}}, 0x0) 23:12:31 executing program 0: syz_emit_ethernet(0x199, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv6}}, 0x0) 23:12:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="bd", 0x1}], 0x1, &(0x7f0000000500)=ANY=[], 0x74}, 0x0) 23:12:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:12:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0)={0x0, 0x0, 0xdd}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0xb) 23:12:31 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 23:12:31 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000100)={r4}, 0x8) 23:12:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000800)=ANY=[], 0x1d) 23:12:31 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000000)={r3}, &(0x7f0000000080)=0x8) 23:12:31 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt(r0, 0x84, 0x0, &(0x7f0000000040)="88", 0x1) 23:12:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0xd, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x5, 0x0, 0x3, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:31 executing program 0: unlink(&(0x7f0000000000)='./file0\x00') 23:12:31 executing program 1: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:12:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xd, &(0x7f00000000c0), 0x4) 23:12:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10}, 0x10) read(r0, &(0x7f0000001b80)=""/4104, 0x1008) sendmsg$inet_sctp(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)="79a8c8aaa8e421a966f7148e79c973b2dde38dee6e6b7201e7facebb68fcbdd72f6f4bdae4eef9457269c9dc1c", 0x2d}], 0x1}, 0x0) 23:12:31 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x1c, 0x1c, 0x2}, 0x1c) 23:12:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000800)={0x0}}, 0x0) 23:12:31 executing program 1: socketpair(0x6, 0x0, 0x0, &(0x7f0000000000)) [ 366.633941][T14630] sctp: [Deprecated]: syz-executor.4 (pid 14630) Use of int in maxseg socket option. [ 366.633941][T14630] Use struct sctp_assoc_value instead 23:12:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') pipe(&(0x7f00000000c0)) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r6], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830500000000000000", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 23:12:32 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000095c0)={&(0x7f0000009480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f0000009500)=""/154, 0x26, 0x9a, 0x1}, 0x20) close(r0) 23:12:32 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000080)=@framed={{}, [@func, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000140)='syzkaller\x00', 0x3, 0xae, &(0x7f0000000180)=""/174, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv4_delroute={0x30, 0x19, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x30}}, 0x0) 23:12:32 executing program 0: pipe(&(0x7f0000000340)) 23:12:32 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, 0x0) [ 366.968218][ T36] audit: type=1804 audit(1610493152.233:86): pid=14643 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir855498080/syzkaller.xVFO6o/202/cgroup.controllers" dev="sda1" ino=15686 res=1 errno=0 23:12:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000100), 0x4) 23:12:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) 23:12:32 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100)={[0x5]}, 0x8}) 23:12:32 executing program 1: pselect6(0x40, &(0x7f0000000000)={0x6}, 0x0, &(0x7f0000000080)={0x3}, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100)={[0x5]}, 0x8}) 23:12:32 executing program 5: socketpair(0x25, 0x5, 0x0, &(0x7f00000000c0)) [ 367.272565][ T36] audit: type=1804 audit(1610493152.543:87): pid=14663 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/178/cgroup.controllers" dev="sda1" ino=15779 res=1 errno=0 23:12:32 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) 23:12:32 executing program 4: r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000680)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 23:12:32 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvmmsg(r0, &(0x7f0000002d40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12000, 0x0) 23:12:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 23:12:32 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/time\x00') 23:12:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000000), 0x4) 23:12:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:33 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 23:12:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004fc0)={0x11, 0x3, &(0x7f0000003300)=@framed, &(0x7f0000003340)='syzkaller\x00', 0xb79, 0xf4, &(0x7f0000003a00)=""/244, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:33 executing program 0: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x1}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @map={0x18, 0xa, 0x1, 0x0, r0}, @ldst={0x2, 0x0, 0x2, 0xb, 0x5, 0x800000000000001f, 0x1}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000140)='syzkaller\x00', 0x3, 0xae, &(0x7f0000000180)=""/174, 0x0, 0x14, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x0, 0x0, 0x7f}, 0x10}, 0x78) 23:12:33 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000080)=0x4, 0x4) 23:12:33 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x141000, 0x0) 23:12:33 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000007c0)='ns/ipc\x00') 23:12:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x44, 0x0, 0x0) 23:12:33 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r0, 0x104, 0x3, 0x0, &(0x7f00000008c0)) 23:12:33 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000140)) [ 368.124752][ T36] audit: type=1804 audit(1610493153.393:88): pid=14700 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/179/cgroup.controllers" dev="sda1" ino=15793 res=1 errno=0 23:12:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x40) 23:12:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) 23:12:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100040000000000000801"], 0x28}}, 0x0) 23:12:33 executing program 0: bpf$OBJ_PIN_MAP(0x10, &(0x7f00000000c0)={0x0}, 0x10) 23:12:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) 23:12:33 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002240)) 23:12:33 executing program 4: bpf$OBJ_PIN_MAP(0x9, &(0x7f00000000c0)={0x0}, 0x10) 23:12:34 executing program 4: socketpair(0x2c, 0x0, 0x0, &(0x7f00000003c0)) 23:12:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getroute={0x1c, 0x1a, 0x1}, 0x1c}}, 0x0) 23:12:34 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_freezer_state(r0, 0x0, 0x0) 23:12:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f00000019c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:12:34 executing program 1: bpf$OBJ_PIN_MAP(0x14, &(0x7f00000000c0)={0x0}, 0x10) 23:12:34 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 368.901322][ T36] audit: type=1804 audit(1610493154.173:89): pid=14738 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/180/cgroup.controllers" dev="sda1" ino=15779 res=1 errno=0 23:12:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000100)=0x721, 0x4) 23:12:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000740)=ANY=[@ANYBLOB='X\t'], 0x58}}, 0x0) 23:12:34 executing program 5: bpf$OBJ_PIN_MAP(0x7, &(0x7f00000000c0)={0x0}, 0x10) 23:12:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0xa, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x2, 0xa, 0x6, 0xffffffffffffffe0}, @ldst={0x0, 0x3, 0x2, 0x0, 0xc, 0x0, 0x4}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400}, @map_val, @map={0x18, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000080)='syzkaller\x00', 0x80, 0x9a, &(0x7f00000000c0)=""/154, 0x82000, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x5, 0x4, 0xa2, 0x7f}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)) epoll_wait(0xffffffffffffffff, &(0x7f0000000f80), 0x0, 0xf8000000) 23:12:34 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005900)={0x0, 0x0, 0x0, &(0x7f0000005740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1024, 0x1, 0x3}, 0x40) 23:12:34 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x85dc82a0da1f3af1, 0x0) 23:12:34 executing program 4: openat$ppp(0xffffffffffffff9c, 0x0, 0x531c00, 0x0) 23:12:34 executing program 2: unshare(0x480) 23:12:34 executing program 5: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000c80)='NLBL_MGMT\x00') [ 369.777385][ T36] audit: type=1804 audit(1610493155.043:90): pid=14763 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/181/cgroup.controllers" dev="sda1" ino=16384 res=1 errno=0 23:12:35 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmmsg$inet(r1, &(0x7f0000006e40)=[{{&(0x7f0000000040)={0x2, 0x0, @private}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000140)="9852d78c3399a9790aafac0a3878459a28c65553d8b2576e0071ecaf2d7889a748e958f75863c6518d312360613425902e664918094e6fbba3a8a7d647e62e3fa6bb03a482", 0x45}], 0x1}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000340)="b8", 0x1}, {0x0}], 0x2, &(0x7f0000000740)}}], 0x2, 0x0) 23:12:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) socket$nl_netfilter(0x10, 0x3, 0xc) 23:12:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) 23:12:35 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) sendto$rose(r0, 0x0, 0x0, 0x10, 0x0, 0x0) 23:12:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:35 executing program 0: socketpair(0x2, 0xa, 0x0, &(0x7f0000000040)) 23:12:35 executing program 1: syz_emit_ethernet(0x7e, &(0x7f0000000200)=ANY=[@ANYBLOB="019821278d15e93f35bbbbbb86dd60dfff3000482f00fe880000000000000000000000000001ff020000000000000000000000000001242088be000000000000080070af3f6c000086dd080088be"], 0x0) 23:12:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'team_slave_1\x00', &(0x7f0000000000)=@ethtool_perm_addr={0x37, 0x2, "45e2"}}) 23:12:35 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x18}, 0x10) [ 370.452576][ T36] audit: type=1804 audit(1610493155.723:91): pid=14791 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/201/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 23:12:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) 23:12:35 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000002340)='ethtool\x00') [ 370.588185][ T36] audit: type=1804 audit(1610493155.823:92): pid=14795 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/182/cgroup.controllers" dev="sda1" ino=16190 res=1 errno=0 23:12:35 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f0000000380)={'syzkaller0\x00', @ifru_flags}) 23:12:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000800)="df59c71a4dc8a144bb60494f431876d92a7219a486eaa08b342c99e060f15924e7c7437b1504e40163a85ad6c1cd58aa407275271f3098ec7bca28777cc80e86ca90871984158c653a679bda65d2057848a357b594d918591e7c6b4b5fd9c982f278feb8de7986b50894bb699840a4776d53887a7deb11b2dc7e49b043b2ab6af5b63ae244ec4edd582ea517cb02944279b40ada731d276bac63a12276d1802b62f628189c0c02bc613ee6cedd05d6a0ea11663201d9eeca", 0xb8}, {&(0x7f00000017c0)="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", 0x4f5}], 0x2}, 0x0) 23:12:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) socket$nl_netfilter(0x10, 0x3, 0xc) 23:12:36 executing program 2: sendmsg$RDMA_NLDEV_CMD_RES_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) pipe(&(0x7f00000001c0)) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 23:12:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x8, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 23:12:36 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000037000511d25a80648c63940d0135fc60060012400c0002000200000037153e370a0001805a256400d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)=@hci={0x1f, 0x3}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)}, {0x0}], 0x2, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x18}, 0x40480c4) r1 = getpid() perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x0, 0x4, 0x5, 0x8, 0x0, 0x80000001, 0xc080, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xf}, 0x82300, 0x0, 0x0, 0x0, 0x80000000}, r1, 0xf, 0xffffffffffffffff, 0x0) 23:12:36 executing program 4: r0 = semget(0x0, 0x0, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000040)=""/110) 23:12:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 371.155520][T14822] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 23:12:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r1, 0x2, &(0x7f0000000380)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r0}]) 23:12:36 executing program 4: openat$random(0xffffffffffffff9c, &(0x7f0000004bc0)='/dev/urandom\x00', 0x88302, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') read$eventfd(r0, 0x0, 0x0) [ 371.404024][ T36] audit: type=1804 audit(1610493156.673:93): pid=14828 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/183/cgroup.controllers" dev="sda1" ino=15751 res=1 errno=0 [ 371.562509][ T36] audit: type=1804 audit(1610493156.713:94): pid=14827 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/202/cgroup.controllers" dev="sda1" ino=16382 res=1 errno=0 23:12:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') io_setup(0xe, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_destroy(r1) 23:12:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000080)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 23:12:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000037000511d25a80648c63940d0135fc60060012400c0002000200000037153e370a0001805a256400d1bd", 0x2e}], 0x1}, 0x0) getpid() [ 371.799428][T14822] device Z0 entered promiscuous mode [ 371.835505][T14826] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 371.884617][T14826] device Z1 entered promiscuous mode 23:12:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) socket$nl_netfilter(0x10, 0x3, 0xc) [ 371.975798][T14852] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:12:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000037000511d25a80648c63940d0135fc60060012400c0002000200000037153e370a0001805a256400d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)=@hci={0x1f, 0x3}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)}, {0x0}], 0x2, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x18}, 0x40480c4) r1 = getpid() perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x0, 0x4, 0x5, 0x8, 0x0, 0x80000001, 0xc080, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xf}, 0x82300, 0x0, 0x0, 0x0, 0x80000000}, r1, 0xf, 0xffffffffffffffff, 0x0) 23:12:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24000844) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 372.134784][T14852] device Z0 entered promiscuous mode [ 372.168687][T14855] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 372.199099][T14855] device Z1 entered promiscuous mode [ 372.242334][T14865] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 372.259824][T14866] mac80211_hwsim hwsim5 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) 23:12:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:37 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000280)="05", 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, 0x0, 0x0) [ 372.285589][T14867] mac80211_hwsim hwsim5 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 372.298680][ T36] audit: type=1804 audit(1610493157.563:95): pid=14868 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/184/cgroup.controllers" dev="sda1" ino=16377 res=1 errno=0 23:12:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000037000511d25a80648c63940d0135fc60060012400c0002000200000037153e370a0001805a256400d1bd", 0x2e}], 0x1}, 0x0) getpid() 23:12:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24000844) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 372.589924][T14878] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 372.629284][T14865] device Z2 entered promiscuous mode 23:12:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24000844) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) [ 372.725845][T14878] device Z2 entered promiscuous mode 23:12:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 372.779267][T14886] mac80211_hwsim hwsim5 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) 23:12:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24000844) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 23:12:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000037000511d25a80648c63940d0135fc60060012400c0002000200000037153e370a0001805a256400d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)=@hci={0x1f, 0x3}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)}, {0x0}], 0x2, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x18}, 0x40480c4) r1 = getpid() perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x0, 0x4, 0x5, 0x8, 0x0, 0x80000001, 0xc080, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xf}, 0x82300, 0x0, 0x0, 0x0, 0x80000000}, r1, 0xf, 0xffffffffffffffff, 0x0) 23:12:38 executing program 4: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)="9c88a80000000000000000008100080088ca", 0x12}], 0x1}, 0x0) 23:12:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 373.005299][T14891] mac80211_hwsim hwsim7 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) 23:12:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x19, 0x0, 0x0, 0x101, 0x0, 0x1}, 0x40) [ 373.098264][T14900] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 373.118313][T14899] mac80211_hwsim hwsim5 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 373.136715][T14901] batman_adv: batadv0: adding TT local entry 00:00:00:00:00:00 to non-existent VLAN 2048 [ 373.171804][T14900] device Z3 entered promiscuous mode [ 373.238800][ T36] audit: type=1804 audit(1610493158.503:96): pid=14895 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/204/cgroup.controllers" dev="sda1" ino=16373 res=1 errno=0 23:12:38 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, &(0x7f00000029c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000c440)={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000700), 0x8) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r2, 0x3) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000037000511d25a80648c63940d0135fc60060012400c0002000200000037153e370a0001805a256400d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000640)={&(0x7f00000001c0)=@hci={0x1f, 0x3}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)="898e91735402a6dc14f9475c30d2e84e3018203788e3e3ea3696540b853fc90aca2e729cb21c38b1e44fc30435b37b766138167e4b1f5a67391010ac9d5817da30598bed4814905afc5a494bb99756dcb41616ce953cdd18a45ecd1958e725e82ef20ad544e7008b04d7eaa04c743b2a5dd9576df4e6084ba792b8bac935789f779b8c820a38891657db899c2cc37cac01f2f38bbe28689189d7e5d27b3f9fbf502cfe58334ca43bfdc14044a7b1a1e7b5d99833529571339a71e406b8b091c72f0e2fda3fa46377c0b8799856ce540a832ed0", 0xd3}, {&(0x7f0000000540)="143c8cf6525870391893262e4498a8786475fff8916e3b979d0ae6f82c62c52645606a4c10b2a6096d92792bd4fbb9e22bc86a07f46fdb938553e6729d500ea25ff55faa678c0631a72250b92f6a950fa062553cf481d5d12bac7f17bfe45ef866f1c6f5e65b528bc11eaca0bd1c76856193e2f5e3fe3a2b1fcdf0", 0x7b}], 0x2, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000002900004fdd9b751974d4b950562b774eba292db8f8f30600d77858c65dd2debdc530dc122ba35c6d56c1046dc4181227ba934d83f2"], 0x18}, 0x40480c4) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f00000002c0)='freu,\x8etGte\x00'}, 0x30) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x7f, 0x9, 0xbe, 0x7f, 0x0, 0x861, 0x92822, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x8, 0x3, 0x2, 0x8001, 0x7, 0xf0ce}, 0x0, 0x8, r1, 0x1) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xc080, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0xd057}, r3, 0xf, r4, 0x3) [ 373.391686][ T36] audit: type=1804 audit(1610493158.603:97): pid=14909 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/185/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 23:12:38 executing program 2: socketpair(0x28, 0x0, 0x28, &(0x7f0000000000)) [ 373.507639][T14919] netlink: 'syz-executor.4': attribute type 2 has an invalid length. 23:12:38 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:39 executing program 1: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x3, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) [ 373.889455][T14919] device Z3 entered promiscuous mode [ 373.903208][T14927] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 373.936927][T14931] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 373.967602][T14927] team0: Cannot enslave team device to itself [ 374.019168][T14929] bridge0: port 3(team0) entered blocking state [ 374.035621][T14929] bridge0: port 3(team0) entered disabled state 23:12:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) socket$nl_netfilter(0x10, 0x3, 0xc) 23:12:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) 23:12:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x11, 0x200000000000002, 0x300) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x4, 0x7}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1}, 0xc) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001980)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x4, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 23:12:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000006c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 374.208735][T14929] device team0 entered promiscuous mode [ 374.224698][T14929] device team_slave_0 entered promiscuous mode [ 374.252763][T14929] device team_slave_1 entered promiscuous mode [ 374.308490][T14929] bridge0: port 3(team0) entered blocking state [ 374.316246][T14929] bridge0: port 3(team0) entered forwarding state [ 374.331574][ T36] audit: type=1804 audit(1610493159.603:98): pid=14942 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/186/cgroup.controllers" dev="sda1" ino=16376 res=1 errno=0 [ 374.388077][T14931] device Z4 entered promiscuous mode [ 374.406092][T14943] mac80211_hwsim hwsim15 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 374.431109][T14927] device team0 left promiscuous mode [ 374.437046][T14927] device team_slave_0 left promiscuous mode 23:12:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000700), 0x8) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r2, 0x3) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000037000511d25a80648c63940d0135fc60060012400c0002000200000037153e370a0001805a256400d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000640)={&(0x7f00000001c0)=@hci={0x1f, 0x3}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)="898e91735402a6dc14f9475c30d2e84e3018203788e3e3ea3696540b853fc90aca2e729cb21c38b1e44fc30435b37b766138167e4b1f5a67391010ac9d5817da30598bed4814905afc5a494bb99756dcb41616ce953cdd18a45ecd1958e725e82ef20ad544e7008b04d7eaa04c743b2a5dd9576df4e6084ba792b8bac935789f779b8c820a38891657db899c2cc37cac01f2f38bbe28689189d7e5d27b3f9fbf502cfe58334ca43bfdc14044a7b1a1e7b5d99833529571339a71e406b8b091c72f0e2fda3fa46377c0b8799856ce540a832ed0", 0xd3}, {&(0x7f0000000540)="143c8cf6525870391893262e4498a8786475fff8916e3b979d0ae6f82c62c52645606a4c10b2a6096d92792bd4fbb9e22bc86a07f46fdb938553e6729d500ea25ff55faa678c0631a72250b92f6a950fa062553cf481d5d12bac7f17bfe45ef866f1c6f5e65b528bc11eaca0bd1c76856193e2f5e3fe3a2b1fcdf0", 0x7b}], 0x2, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000002900004fdd9b751974d4b950562b774eba292db8f8f30600d77858c65dd2debdc530dc122ba35c6d56c1046dc4181227ba934d83f2"], 0x18}, 0x40480c4) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f00000002c0)='freu,\x8etGte\x00'}, 0x30) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x7f, 0x9, 0xbe, 0x7f, 0x0, 0x861, 0x92822, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x8, 0x3, 0x2, 0x8001, 0x7, 0xf0ce}, 0x0, 0x8, r1, 0x1) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xc080, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0xd057}, r3, 0xf, r4, 0x3) [ 374.469370][ T36] audit: type=1804 audit(1610493159.633:99): pid=14940 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/205/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 [ 374.509114][T14927] device team_slave_1 left promiscuous mode [ 374.549071][T14927] bridge0: port 3(team0) entered disabled state 23:12:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000006c0)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 374.630211][T14927] team0: Cannot enslave team device to itself 23:12:39 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x7656cf20208799f0, 0x0) [ 374.672186][T14930] bridge0: port 3(team0) entered blocking state [ 374.678839][T14930] bridge0: port 3(team0) entered disabled state 23:12:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 374.743910][T14930] device team0 entered promiscuous mode [ 374.774144][T14930] device team_slave_0 entered promiscuous mode [ 374.831808][T14930] device team_slave_1 entered promiscuous mode 23:12:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1103], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4, 0x7, 0x3}, &(0x7f00000005c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=0x3eca}}, 0x10) 23:12:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) socket$nl_netfilter(0x10, 0x3, 0xc) [ 374.875155][T14930] bridge0: port 3(team0) entered blocking state [ 374.881678][T14930] bridge0: port 3(team0) entered forwarding state 23:12:40 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 375.198957][ T36] audit: type=1804 audit(1610493160.463:100): pid=14969 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/206/cgroup.controllers" dev="sda1" ino=16368 res=1 errno=0 [ 375.374548][T14955] device Z5 entered promiscuous mode [ 375.419268][T14958] mac80211_hwsim hwsim15 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 375.454480][T14978] device team0 left promiscuous mode [ 375.472688][T14978] device team_slave_0 left promiscuous mode [ 375.533542][T14978] device team_slave_1 left promiscuous mode 23:12:40 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0xb, &(0x7f00000029c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 375.584498][ T36] audit: type=1804 audit(1610493160.853:101): pid=14979 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/188/cgroup.controllers" dev="sda1" ino=16384 res=1 errno=0 [ 375.610119][ T9] wlan1: Trigger new scan to find an IBSS to join [ 375.612531][T14978] bridge0: port 3(team0) entered disabled state [ 375.624835][ T25] wlan1: Trigger new scan to find an IBSS to join 23:12:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000700), 0x8) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r2, 0x3) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000037000511d25a80648c63940d0135fc60060012400c0002000200000037153e370a0001805a256400d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000640)={&(0x7f00000001c0)=@hci={0x1f, 0x3}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000340)="898e91735402a6dc14f9475c30d2e84e3018203788e3e3ea3696540b853fc90aca2e729cb21c38b1e44fc30435b37b766138167e4b1f5a67391010ac9d5817da30598bed4814905afc5a494bb99756dcb41616ce953cdd18a45ecd1958e725e82ef20ad544e7008b04d7eaa04c743b2a5dd9576df4e6084ba792b8bac935789f779b8c820a38891657db899c2cc37cac01f2f38bbe28689189d7e5d27b3f9fbf502cfe58334ca43bfdc14044a7b1a1e7b5d99833529571339a71e406b8b091c72f0e2fda3fa46377c0b8799856ce540a832ed0", 0xd3}, {&(0x7f0000000540)="143c8cf6525870391893262e4498a8786475fff8916e3b979d0ae6f82c62c52645606a4c10b2a6096d92792bd4fbb9e22bc86a07f46fdb938553e6729d500ea25ff55faa678c0631a72250b92f6a950fa062553cf481d5d12bac7f17bfe45ef866f1c6f5e65b528bc11eaca0bd1c76856193e2f5e3fe3a2b1fcdf0", 0x7b}], 0x2, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000002900004fdd9b751974d4b950562b774eba292db8f8f30600d77858c65dd2debdc530dc122ba35c6d56c1046dc4181227ba934d83f2"], 0x18}, 0x40480c4) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f00000002c0)='freu,\x8etGte\x00'}, 0x30) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x7f, 0x9, 0xbe, 0x7f, 0x0, 0x861, 0x92822, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x8, 0x3, 0x2, 0x8001, 0x7, 0xf0ce}, 0x0, 0x8, r1, 0x1) r3 = getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0xc080, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0xd057}, r3, 0xf, r4, 0x3) 23:12:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1103], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4, 0x7, 0x3}, &(0x7f00000005c0)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=0x3eca}}, 0x10) [ 375.755916][T14978] team0: Cannot enslave team device to itself [ 375.791344][T14980] bridge0: port 3(team0) entered blocking state [ 375.798548][T14980] bridge0: port 3(team0) entered disabled state 23:12:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) socket$nl_netfilter(0x10, 0x3, 0xc) [ 375.954414][T14980] device team0 entered promiscuous mode [ 375.993814][T14980] device team_slave_0 entered promiscuous mode [ 376.018846][T14980] device team_slave_1 entered promiscuous mode 23:12:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@alu={0x7, 0x1}, @jmp={0x5, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe}, @jmp={0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x100000}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 376.099239][T14980] bridge0: port 3(team0) entered blocking state [ 376.106963][T14980] bridge0: port 3(team0) entered forwarding state 23:12:41 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 376.442650][ T36] audit: type=1804 audit(1610493161.713:102): pid=15000 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/189/cgroup.controllers" dev="sda1" ino=16384 res=1 errno=0 [ 376.456483][T14985] device Z6 entered promiscuous mode 23:12:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@alu={0x7, 0x1}, @jmp={0x5, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe}, @jmp={0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x100000}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 376.539734][T15003] validate_nla: 7 callbacks suppressed [ 376.539751][T15003] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 376.600789][T15003] device team0 left promiscuous mode [ 376.640077][T15003] device team_slave_0 left promiscuous mode [ 376.674965][T15003] device team_slave_1 left promiscuous mode [ 376.712528][T15003] bridge0: port 3(team0) entered disabled state 23:12:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24000844) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 23:12:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:42 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000500)) [ 376.845015][T15003] team0: Cannot enslave team device to itself 23:12:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 376.931053][T15005] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 376.957612][T15005] bridge0: port 3(team0) entered blocking state [ 377.005097][T15005] bridge0: port 3(team0) entered disabled state 23:12:42 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, &(0x7f00000029c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:42 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f00000029c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 377.178140][ T36] audit: type=1804 audit(1610493162.443:103): pid=15019 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/190/cgroup.controllers" dev="sda1" ino=16379 res=1 errno=0 [ 377.182620][T15005] device team0 entered promiscuous mode [ 377.269296][ T36] audit: type=1804 audit(1610493162.493:104): pid=15022 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/209/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 [ 377.310030][T15005] device team_slave_0 entered promiscuous mode [ 377.338551][T15005] device team_slave_1 entered promiscuous mode [ 377.362054][T15005] bridge0: port 3(team0) entered blocking state [ 377.368571][T15005] bridge0: port 3(team0) entered forwarding state 23:12:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000025000f000dffffffbd0301000000000095002000000000006916000000000000bf6700000000000017060000b964b0fd4506feff00200000540600000ee60000bf150000000000000f6500000000000065070000020000002c030000000000001f75000000000000bf540000000000000700000004000000ad430100000000007c000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c27dfef618ecf264e0f84f9f17d3c30e3c7bdd2d17f2f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703d6c4f633a9a4f16d0a3e127bee45a0100000fe9de56c9d8a81426135613a9ac60bef0d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5af65727546e7c955ccefa1f6ab689fde4de4e63ede202fa4e0a2127b8b83c71a51445dc8da39e5b0ab7bcb8f512036a5ba6d04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb735fd552bdc268694aeb0743e326c81cb6cf5c8ac86f8a297dff0445b13d0045fb3cda32a673a6bb55d8c85f21dce431e56723888f84b3ebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb400001e3738270b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154bcb4000000000000000000000000000000bc3af2b170ad3e2b268f4ddc211bc3ebf0bd9d42ca019dd5d03fcf74686e9fbe2562979eaed840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7eab04871bc47287cd31cc43ea0ffb567b40407d000000000000000000000000005f37d83f84e98a523d80bd56a57fa82b82f639601ae899a53f6715a0a62a29ab028acfc1cb26a0f6a5480a55d638a0c544ba0dc828c22fe3000071c252021e0a60a800000000000000437d57fcf8295f63a70837f5cd4e5e77964522dc7ca3aa3476b7f2d851d27fd4de6eabb43e0799dc8d9fb7dc6c523ffbd74a6a40e4acb1ac693a27051f2ab759b8dbe8439db2a0426c7e7c0032028c95b29b6ddb551176693a921c76beceff7e4fbfea5011af0a99fa077ffe70cac8b9e44023a1749eb1d0d572b77d6e0d0fcd74035c7a1eb6eb4e1c8ef2629f5ecff4626746d6abe98a255e92c3c4f79bfcd0d9174138c820cfeb73dec68ed56b5d3dfdf0cb8b71ad79000000000000000000000000000000dd434a25e95d0ec29d3adaccf89d0888031ecdfdb4dfbe444673be099ece7e4009c76c716d906fbc539b412e0478cfee4485f423c63f49db43833c92eeeb647eebd4d7a93a17bcbb6bae5ff876375d4f18ca372104772a3a35ecedd97fc191d8f64d2b1d60c6d12911aada66c26aa4802c3514c3d92ec9f9f3262cb13f4a2575fbe943a6c400"/1103], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)}}, 0x10) [ 377.484553][T15013] mac80211_hwsim hwsim12 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) 23:12:42 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:42 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000c440)={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000080)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 377.589841][ T95] wlan1: Trigger new scan to find an IBSS to join 23:12:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24000844) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 23:12:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000002) [ 377.718057][ T36] audit: type=1804 audit(1610493162.983:105): pid=15034 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/191/cgroup.controllers" dev="sda1" ino=16372 res=1 errno=0 [ 377.792658][T15040] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 377.865727][T15040] device team0 left promiscuous mode [ 377.908514][T15040] device team_slave_0 left promiscuous mode 23:12:43 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x40}, 0x40) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001980)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x4, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) [ 377.951754][T15040] device team_slave_1 left promiscuous mode [ 377.998738][T15040] bridge0: port 3(team0) entered disabled state [ 378.112373][T15040] team0: Cannot enslave team device to itself 23:12:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 378.157634][T15043] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 378.201595][T15043] bridge0: port 3(team0) entered blocking state [ 378.228083][T15043] bridge0: port 3(team0) entered disabled state 23:12:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 378.619181][T15043] device team0 entered promiscuous mode [ 378.630461][T11192] wlan1: Trigger new scan to find an IBSS to join [ 378.631277][T12524] wlan1: Trigger new scan to find an IBSS to join 23:12:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1103], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4}, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)}}, 0x10) [ 378.659670][T15043] device team_slave_0 entered promiscuous mode [ 378.666013][T15043] device team_slave_1 entered promiscuous mode [ 378.705221][T15043] bridge0: port 3(team0) entered blocking state [ 378.711611][T15043] bridge0: port 3(team0) entered forwarding state [ 378.735253][ T36] audit: type=1804 audit(1610493164.003:106): pid=15057 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/192/cgroup.controllers" dev="sda1" ino=16369 res=1 errno=0 [ 378.766805][T15047] mac80211_hwsim hwsim12 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) 23:12:44 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 23:12:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24000844) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 23:12:44 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x40}, 0x40) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001980)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x4, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) [ 378.867279][ T36] audit: type=1804 audit(1610493164.063:107): pid=15060 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/211/cgroup.controllers" dev="sda1" ino=16383 res=1 errno=0 23:12:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 378.983280][T15066] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 379.012131][ T36] audit: type=1800 audit(1610493164.063:108): pid=15060 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16383 res=0 errno=0 [ 379.044299][T15066] device team0 left promiscuous mode [ 379.067825][T15066] device team_slave_0 left promiscuous mode [ 379.095990][T15066] device team_slave_1 left promiscuous mode [ 379.130372][ T36] audit: type=1804 audit(1610493164.063:109): pid=15059 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/211/cgroup.controllers" dev="sda1" ino=16383 res=1 errno=0 [ 379.161251][T15066] bridge0: port 3(team0) entered disabled state [ 379.289263][T15066] team0: Cannot enslave team device to itself [ 379.345039][T15068] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 23:12:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 379.388832][T15068] bridge0: port 3(team0) entered blocking state [ 379.405455][ T36] audit: type=1804 audit(1610493164.673:110): pid=15075 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/212/cgroup.controllers" dev="sda1" ino=16372 res=1 errno=0 [ 379.460910][T15068] bridge0: port 3(team0) entered disabled state [ 379.593789][T15068] device team0 entered promiscuous mode [ 379.606950][T15068] device team_slave_0 entered promiscuous mode [ 379.631148][T15068] device team_slave_1 entered promiscuous mode 23:12:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x40}, 0x40) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001980)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x4, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 23:12:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 379.667121][T15068] bridge0: port 3(team0) entered blocking state [ 379.674404][T15068] bridge0: port 3(team0) entered forwarding state [ 379.725434][ T36] audit: type=1804 audit(1610493164.993:111): pid=15080 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/193/cgroup.controllers" dev="sda1" ino=16369 res=1 errno=0 [ 379.785343][T15071] mac80211_hwsim hwsim12 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) 23:12:45 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 23:12:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x11) socket$kcm(0x11, 0x200000000000002, 0x300) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x40}, 0x40) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001980)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x4, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 23:12:45 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x700) [ 380.018274][T15089] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 380.054311][T15089] device team0 left promiscuous mode [ 380.083807][T15089] device team_slave_0 left promiscuous mode 23:12:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 380.127667][T15089] device team_slave_1 left promiscuous mode 23:12:45 executing program 4: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x7, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) [ 380.184894][T15089] bridge0: port 3(team0) entered disabled state 23:12:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 380.318839][T15089] team0: Cannot enslave team device to itself [ 380.352763][T15092] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 380.381602][T15092] bridge0: port 3(team0) entered blocking state [ 380.402435][T15092] bridge0: port 3(team0) entered disabled state [ 380.409250][ T36] audit: type=1804 audit(1610493165.673:112): pid=15098 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/214/cgroup.controllers" dev="sda1" ino=16376 res=1 errno=0 23:12:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f0000000080)) [ 380.498635][T15092] device team0 entered promiscuous mode [ 380.530135][T15092] device team_slave_0 entered promiscuous mode [ 380.581363][T15092] device team_slave_1 entered promiscuous mode [ 380.618825][ T36] audit: type=1804 audit(1610493165.883:113): pid=15103 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/194/cgroup.controllers" dev="sda1" ino=16369 res=1 errno=0 [ 380.627070][T15092] bridge0: port 3(team0) entered blocking state [ 380.651480][T15092] bridge0: port 3(team0) entered forwarding state 23:12:46 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f0000000080)) 23:12:46 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x3b, &(0x7f0000000040)=r0, 0x18) setsockopt$sock_attach_bpf(r0, 0x29, 0x36, 0x0, 0x0) 23:12:46 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1e, &(0x7f00000029c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:46 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 23:12:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 23:12:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:46 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000c440)={0x19, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:46 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000280)="05", 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) [ 381.093218][T15119] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 381.147262][T15119] device team0 left promiscuous mode 23:12:46 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001540)={0x17, 0x0, 0x6, 0x3, 0x19b0}, 0x40) [ 381.171917][T15119] device team_slave_0 left promiscuous mode [ 381.207588][ T36] audit: type=1804 audit(1610493166.473:114): pid=15120 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/195/cgroup.controllers" dev="sda1" ino=16380 res=1 errno=0 [ 381.241158][T15119] device team_slave_1 left promiscuous mode [ 381.275743][T15119] bridge0: port 3(team0) entered disabled state [ 381.366182][T15119] team0: Cannot enslave team device to itself [ 381.396050][T15122] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 381.429135][T15122] bridge0: port 3(team0) entered blocking state [ 381.479316][T15122] bridge0: port 3(team0) entered disabled state 23:12:46 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000280)="05", 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) 23:12:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {}]}]}}, &(0x7f0000000140)=""/252, 0x36, 0xfc, 0x1}, 0x20) [ 381.589718][T12524] wlan1: Creating new IBSS network, BSSID 7a:79:87:7b:5f:74 [ 381.597607][T11192] wlan1: Trigger new scan to find an IBSS to join [ 381.619113][T15122] device team0 entered promiscuous mode 23:12:46 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104040c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff251005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000002740)={&(0x7f0000000100)=@l2={0x1f, 0x77ea, @any, 0x5c}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)="98946b5c984d7d3e3c3c6f88", 0xc}, {&(0x7f0000000300)="d44b81ec15bf7ef373edb14d750c37695d47c8a499edd32c686ab13ecdbda2b568036ccdbb329feaecd7faddbfe82ef140f75f7ce2ad7f61cf76959766134b79739e5dca1dea13fc", 0x48}], 0x2, &(0x7f00000003c0)=[{0xc08, 0x107, 0x8, "1997193cdd0f3419184a801be656f4ac0f2f96ea75f3b24ceef78f61598056a96b52b80792579e83090769b5b07dc564c2d1c75bbd9f79616f657818f7744f995571e5bc6a174d37631613a54ee597c67920dc21e546f837b0cae0b1f3194b1a2ab44ce7a209e47e9265de5f8ee30ad99b23054a282beca2e784df77237a396f4cb4ac92de54072e67154897cca6ed3b683827aeded834cffa1e4e724cdd30a08ae80186dba559b6878832335d2dddf2ee2d1b59827f21c2f0633dce2e3e476297a766841d60e81db884452e8e4253d890708a50271631e0f37d211f30e984d566d7fee6020f136faa605113e3996cb2b8cb9a14d625008f3299fa51adaa6eca5144f555aa80c4b2281092a9c2f5018deee8e3e64fe82dd97397ba6c80a94b595d4306e520c7febc833e76bb887dfa9c35fba8d1152b94f72cc852a4b646b5a7be7c87b7b48272ffdf66827e59e9126c8b876e51e3084a8e1b9901bb6e180c798ce8d501d9791be7444d69424827eeb04e9425de84a911b3778170bc6d9868366e1fa4a016bf173ab439ddec0fb7e595089931ebce1bc49042f58296469c2c71405f6de6dc3f5b252cf7ba85b0d02d622298b8a6cc464a5691a3693b747a9fab2d8d9bb7ab8e4ea6da24800d7d091acc00b390aa9727e937bdf68c2ee5dc8358b405769ceeb4b7140746a64b501766917beddde9c464f1c54c11655d42b81930eaff9a0d61b4ebf1fd7b6e46d399bf2e4945b7e207f8f6d1ea916dd971678eef611a514d978db5eb7b29ffbdd94d657df9472fdedffd86e7ea757e6e1a055fa81b97cb1f67ac91a743a63cf1018163a0baba7020323d4106ee792ecc5345082c03a4c44c60172263d89bb4e81263c51ba923d34bf48bc60aded3afc2c29ed15903069cb736222c1bbae136213a33fd2a08357a613f9021879f2d51d5605e513b06ed559b021c5227a7559bd07bde63a6921c81522dd4770bef0da8ae9ffcea57166e805bafb1c5dcbc6f02f71e7e533bcf33d7c4e39730362aba9ca487b7796681ad456eff9f56514c068d59d5d217ec90dbb455742383b23356b8f32881b7f1797c73b88f1d1a784e7e45c38a20ab085e06581d8d8376db543b4a9c841bfb57d5afc9d443f015af5630c0fb1bc53f1f60eb6a7963c96da8689d4930a75e22cb55f72e32edf36c31473c89620787b71773b5aca145673bc4413df7e99b704cb5e4b0101ba1f7f069168022f0c155d2f615e68b13348ef195fa920835915dbd225fb008f313f2474a49558f3840bd3a0755acd8b1e3ca1a59e30d85ed67f0dabba690ed2fe4b29000ee22abaabf73cadcc2753e39a44daa6dc1a8100ae98857ef8f671d5acc49bcbc59584ff0d58dad39ec3c4d0404c1643d5d2c2c709086b5c25b73d3ee83fbd2e46f08a6ab5c6c4c8100b2981489c3309846ce9cd4f50244584bfdc29094d048afaaeddb69c456e3da89322340ffd973ab1bb7b9b93d2acbd996f9bd04abdb295100d548c7a69fe8fc0a655a61fc2d27d3a5e25fa5d79f1ef425d688592d1bde75ee0fe999480eef9eb832e0f296deb9b842ad99cb1b21b8a2160dc20d553059383fb083ca825b9e95fa9b93171397c8dafb835a945850453311663422a1ea796cbff950e182f7dbb66a8f8ee8f199d932bfc8c4a93d9f65569f20cc405d74725dff1fff876fca90957517b0206c25b87e791ceefff0c7a0ce8187c29f50c6b083097691236daea3011362b312e592549b90091b118fa7e7b13f89f4842731dc1f1e944d67a48db1bdf8d5d5137ea4827111c1dd070aada8536f564e9b30dcebd7ede19e18b258a9d674cd50f0640cdc37bc539b7b66aeadfa49098dd2f1c4b62f1a1eaed83791659b0d6dbda09bdc11540b9c79d07e200669aa50d45901527e73d9333c3478ef8baed0d92bfd7cb0ce11cba703121bffff691b2cea6f0fb0560737887024ebc72a16a86f2b4f91cc0cad738a4c08e67eb37345c470d60728461f0abb7f755a976fa51f7cdf98eb0f92e20a082af83fa5c330ae98c17bdb5ecb216e492acb31f5b7d80b4bc111a89938b49bf7089af7bc7f7545853251175c8fceff9c0db055c2beb5b50c9bf62d415caa1511ab23802ad002b11c56c6042ddc9df11f415bcfcaaf3c5d183ad74e418abf2ca482b5577f48584de505b9c50ea47094bd6c9c7bd58a6bc9ae8ff2e8da4aac80feeb87a00a48383e92271d3921c835900c43710913e79a36970e92935601145c478e3e5eed53c10fe15c419b6ec1805cb248d53dcba1061c43645e1d31eac54176073137bc47d7ac9269c0cdc46078fea711c768feda899b3e6de948835c71bef141ae4eb7a0c00f6573d72bbb1e0c82bc51f3a8ce7abed99f266c042ffcec0169605715788c947ba7d60cb4c98581f2f3a272062f447c638f8b585a94170ece081445ede997cde6ce59174201d278641fc18bf596527a10d89d45e9e0378a52593065019af6d01be92f3de1a7ae1ba466f22d1a5ce13b913f044860de609c65b5c97efb34204e5c2958984cc19f8adf2b2bf27fe714be6ffe0571df7e8d1e8d83bd5c641ba30cf28b4ddfb8995d532212215935440b5b9bf1a40daf8ebc583eab1ed318f0c527232a1b35c36f751fa9aaae32cc10aa4c97e4f5dae51edfd3413aba5283e51f115c6ade953b0809d7a6e08eb98ae093bca5fd83ceccaafc1dcb9923777615f8249329115fadffb2778f6dca783fb452ae2ecd060fb43c0f2aa9fc8cd013ae37250eaef927be83a2d51f3d9ed946a1275c6ea7a452bd82db5129f605bd7206995fa94efe9b09b09c4e963f2c000c17003f3d121eeae44eae4602b127a709a90a973f81afa56e30ff4245d2cf8afd703f154dfa821a4c7389b823cf5f32d2de8d90d453bbe0a62bffcfe58f81fa73b20d2c991e3b003284753a81e7c623aeff5c5943a1501dce6e4d8cba9a33131e23d058198e827a2114447364cd35a2840646bd78f2b7a93b8c2bad788007ed9dc72d223f5e0269774e2fa2c32b5f05b11468f8319c9dbbe98a8f7491add735270e50e9bfeb5cc76f85b58ad692682fc3d318d14fcc1abdf095df8c290f0b2c8b5eb02fbba1bba5b5af130fbe1eac2865937561908a0fa27d75bd6bdcf1d2ca9bb5b45368720c1659a948e44c266fd5968e79d4efd76772171dfad9f93abe6ebb4d90349e1638471e65225b40d7ed7bb8add810a5b0e949a5025b310254a5cf768467e33766edb3d46a1c01aba629e5038905bbbc230736e4d2f57cacc5416562165af01f5fab1575bd39ced7fad56ee40b80f3faf2367e0204fdd95a4373bcb9007a6d32e1e63afe05f9a0e6eb0034ad15f4ec4248cb6321cf2fe8da57fb4ffe6542d8fc7c3a18889b29916241ff0222bd16894c98f74e2a16d80ecdef1ddfedc6d3d7f7370e7d3976a91df74e093b50cb1b43740ccb1560cdd9d89cf7eb9e73cf2fb4c3f3daca4bacee1e3848e2231d5085d35ad6d77e152bcebcb96d51793810df0c468565f5c15d49fea6964455afbbc611be4607471f6380efc4dbe0fab6294b1ed172a6341c143bc5731cb13484b471235daf76e646d1dcb2c80a502d2f0a5b07deabbf9d86b42c052d8f24b87eada97592308eac3677403c3f4a7f70862be673636176c4b8bf231e73b283b46cfb76033e1dfab5c6110ccf0d03fbe186e54abd0519dd1bccb04aff8b81eb7d65c498baefe187546afe473e72b676fda5ed2a42e7c46318d7ab8853b7398ace2d8bf6172cb85de043876a0e20e33c73b52feaafa8889829d3a05159f69413ccdf4a2017784855dceb870363b72a61285f202434d1f786ed2aa4413da5d19a70a5ba8ca7a67b9d15567659669f403580eb4a73c5325c404ecc44cd92e71872038da10911a8e4404f8050d1daac7dcb6c6400a485fd1b0e77cdd4ee57812d0aa3cecefa9aeaec2f96c9fca164d47e483c9334e42dc518542c955ae09bd17533b6c0a56cec91ed4d3d13432009f7ff59c06e330111e89e46e7557f5c8c62af2015feffffd54bcbd48de1b2991c5831203f01fc30141a7765191ae96c4da6fb7eb38f5ff5ef6eef62821d28e24c5430516101cca8cf20dc955cbf86fff3e59b9b7987aaa9e766eefa48eacc273419f99fece5887c1576d7ced29e7c564209f652217e3523e4a2df069b2dd079ab9c6a50cdcc59b852f85f8254e2e527ea4fb85f0f3d540d667c9d5aa8bc5a8d1b95a12198d6e7938824e09325b17f07bca79e42573d02d3bf5d29ab6b65a4539b8205f860c961780149b6617ac5296dc929b6b91c377f431991c8306f45a6ac8b4f6dcb7e72fd83bd8ec5b67a43b71bd9"}, {0x18, 0x115, 0x3, ' '}, {0xb8, 0x109, 0xffff, "4761cc24d8a02bf50107b440ebaefa826aa9955b56c435133f6aa2ff6f7274b2ea15c6c7e78d1a78568af5d17c859f830efe1c15b725321b8cd5b82da0e8f0e2f7dfe45cfbf03510dcc2651d934bb04c1b922b7ff897c0ab33f8c720c1f4a4f28b1735716d27429124a7930160e7ea5694119393b8532fcdcedf6008ba56a88403ebad14a8f4b222066c622d66ce683d67bf64928ad308d969a5ce15c8d20bf8cc7e73853333"}, {0x78, 0x119, 0x55e, "090c275aa29b31f3c317f1a49fbdfe789463c551db197e3f7c151610bb32b257411df1e86b3b0c527b4cddcab1a2d7630f90b40ecf47485ce1dc5e04167ca26a5a9dd17cec61281ace37efc47bd5f16ddab5ea66b886a6938e11eb9a6a09a275b3487cd836"}, {0x38, 0x117, 0x2, "d71bc2caa3736822663c2d83714c012d05412785bce6cbddd751322df36ebb398a7175"}, {0x1010, 0x108, 0x6, "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"}, {0x108, 0x10d, 0x1178, "08f58d3c1aa1d5309e64a425380934025f4436e8da531dbdf5b3b638f68cf736c98d7151139808c0ba6bbd1bff3c99f6e87403d0a723a633d2e4ff25bbe49bd85e25690c8c49cd9025ab41100373e70ae6eca4e90067ea04d48f78dcad85f4525b372e98bbf5078bf7d92def7e04ea4f88978766d6be443ca201b9addabf499201e37bcb2989b45f7d0514d27868af1c5fd55b9be086a37c0fb0553dce509ef013dc359666928dcd33727fabaeb328f76aed8d78dfa831b9f184c240c2f910d01edc69d9f013b6861cbc032457712b08859409bf62c39c511117560999503091543b0ef7d37ba8bc3fd9f49b748ec9af94"}], 0x1ea0}, 0x10080001) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) [ 381.644798][T15122] device team_slave_0 entered promiscuous mode [ 381.675617][T15122] device team_slave_1 entered promiscuous mode [ 381.725364][T15122] bridge0: port 3(team0) entered blocking state [ 381.732752][T15122] bridge0: port 3(team0) entered forwarding state 23:12:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 381.858920][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 381.893990][T15140] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 23:12:47 executing program 1: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000013c0)={0x0, 0x0, 0x0, &(0x7f00000012c0)="3e98d49a46d726d08dcd1dacee40ca18f89efdf2a5b75cad4410a5d4ba6ed17275354779e6b8bf6aa4266a0676b13bfeac145a7a3e3e699c6a2d135457fed14df8751dc387af2973446ae856b52e4e8abee6cfa913147238d3e862d0ad8d2b176ba837c45425bf42319b5fdf0e26fb7fc38d63f56c3617493cc7f569afaf02a7590d9ee4e1191373bdadd1fdcf45cd87dfea08460804f2e75dbd89f63cbe0e63b9d61b4ed80c3cc107f8e3c6d231066a4bc8a6cbbb42ea63158c09a02e512dfaa48be53e8d36bb039208934fb926304cc00174b7ca93e3aebc60b90577f4f745d17aa116adf38aba5596060393e66834480874468c"}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:47 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 381.983186][T15143] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.994594][T15143] bridge0: port 1(bridge_slave_0) entered disabled state 23:12:47 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000280)="05", 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) [ 382.059199][T15143] device bridge0 entered promiscuous mode 23:12:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@alu={0x7, 0x1}, @jmp={0x5, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe}, @jmp={0x4}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0xd000000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:12:47 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) 23:12:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) [ 382.512096][ T9] wlan1: Creating new IBSS network, BSSID ee:07:27:70:dc:a8 [ 382.549746][ T52] wlan1: Trigger new scan to find an IBSS to join 23:12:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000002) [ 382.629620][ T9] wlan1: Trigger new scan to find an IBSS to join [ 382.682410][T15147] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 382.707676][T15147] device team0 left promiscuous mode 23:12:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="350000002100056bd25a80648c0a940d6724fc6010001040480000000200000037153e370a00088004000000d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x7000000}, 0x0) [ 382.763673][T15147] device team_slave_0 left promiscuous mode [ 382.824719][T15147] device team_slave_1 left promiscuous mode 23:12:48 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@alu={0x7, 0x1}, @jmp={0x5, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe}, @jmp={0x4}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0xd000000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 382.877905][T15147] bridge0: port 3(team0) entered disabled state [ 383.208891][T15147] team0: Cannot enslave team device to itself [ 383.252413][T15152] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 383.271298][T15152] bridge0: port 3(team0) entered blocking state [ 383.292445][T15152] bridge0: port 3(team0) entered disabled state [ 383.316162][T15152] device team0 entered promiscuous mode [ 383.338742][T15152] device team_slave_0 entered promiscuous mode [ 383.360534][T15152] device team_slave_1 entered promiscuous mode [ 383.387061][T15152] bridge0: port 3(team0) entered blocking state [ 383.393535][T15152] bridge0: port 3(team0) entered forwarding state [ 383.458332][T15140] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 383.485659][T15140] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.492961][T15140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 383.500492][T15140] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.507613][T15140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 383.561159][T11192] wlan1: Creating new IBSS network, BSSID 96:eb:fe:4c:e4:68 [ 383.633619][T15166] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.640993][T15166] bridge0: port 1(bridge_slave_0) entered disabled state 23:12:49 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104040c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff251005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000002740)={&(0x7f0000000100)=@l2={0x1f, 0x77ea, @any, 0x5c}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)="98946b5c984d7d3e3c3c6f88", 0xc}, {&(0x7f0000000300)="d44b81ec15bf7ef373edb14d750c37695d47c8a499edd32c686ab13ecdbda2b568036ccdbb329feaecd7faddbfe82ef140f75f7ce2ad7f61cf76959766134b79739e5dca1dea13fc", 0x48}], 0x2, &(0x7f00000003c0)=[{0xc08, 0x107, 0x8, "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"}, {0x18, 0x115, 0x3, ' '}, {0xb8, 0x109, 0xffff, "4761cc24d8a02bf50107b440ebaefa826aa9955b56c435133f6aa2ff6f7274b2ea15c6c7e78d1a78568af5d17c859f830efe1c15b725321b8cd5b82da0e8f0e2f7dfe45cfbf03510dcc2651d934bb04c1b922b7ff897c0ab33f8c720c1f4a4f28b1735716d27429124a7930160e7ea5694119393b8532fcdcedf6008ba56a88403ebad14a8f4b222066c622d66ce683d67bf64928ad308d969a5ce15c8d20bf8cc7e73853333"}, {0x78, 0x119, 0x55e, "090c275aa29b31f3c317f1a49fbdfe789463c551db197e3f7c151610bb32b257411df1e86b3b0c527b4cddcab1a2d7630f90b40ecf47485ce1dc5e04167ca26a5a9dd17cec61281ace37efc47bd5f16ddab5ea66b886a6938e11eb9a6a09a275b3487cd836"}, {0x38, 0x117, 0x2, "d71bc2caa3736822663c2d83714c012d05412785bce6cbddd751322df36ebb398a7175"}, {0x1010, 0x108, 0x6, "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"}, {0x108, 0x10d, 0x1178, "08f58d3c1aa1d5309e64a425380934025f4436e8da531dbdf5b3b638f68cf736c98d7151139808c0ba6bbd1bff3c99f6e87403d0a723a633d2e4ff25bbe49bd85e25690c8c49cd9025ab41100373e70ae6eca4e90067ea04d48f78dcad85f4525b372e98bbf5078bf7d92def7e04ea4f88978766d6be443ca201b9addabf499201e37bcb2989b45f7d0514d27868af1c5fd55b9be086a37c0fb0553dce509ef013dc359666928dcd33727fabaeb328f76aed8d78dfa831b9f184c240c2f910d01edc69d9f013b6861cbc032457712b08859409bf62c39c511117560999503091543b0ef7d37ba8bc3fd9f49b748ec9af94"}], 0x1ea0}, 0x10080001) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) 23:12:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 23:12:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f000000c680)={&(0x7f000000c4c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, &(0x7f000000c5c0)=""/185, 0x26, 0xb9, 0x1}, 0x20) 23:12:49 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000002) [ 383.950191][T15179] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 383.965450][T15179] netlink: 'syz-executor.4': attribute type 8 has an invalid length. [ 383.984400][T15179] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 384.026484][T12557] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 23:12:49 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffffc3, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000010008104040c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240348ff251005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000002740)={&(0x7f0000000100)=@l2={0x1f, 0x77ea, @any, 0x5c}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)="98946b5c984d7d3e3c3c6f88", 0xc}, {&(0x7f0000000240)="4dafcf868404f735bf2e6083f05cfd9b373e835031820dd0a5456ba4fddb1be008401c72cd3b9e6d9b520bce8418341dcfaedbdc859e1be944130a894e9f3d07e9b64d4104dc7505129e8ca1e32753292930e67c0ca68705eadd61e1b1dc66", 0x5f}, {&(0x7f0000000300)="d44b81ec15bf7ef373edb14d750c37695d47c8a499edd32c686ab13ecdbda2b568036ccdbb329feaecd7faddbfe82ef140f75f7ce2ad7f61cf76959766134b79739e5dca1dea13fc", 0x48}], 0x3, &(0x7f00000003c0)=[{0xe10, 0x107, 0x8, "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"}, {0x20, 0x10f, 0x9, "83b82e36788f3acc782b97"}, {0x18, 0x115, 0x3, ' '}, {0xb8, 0x109, 0xffff, "4761cc24d8a02bf50107b440ebaefa826aa9955b56c435133f6aa2ff6f7274b2ea15c6c7e78d1a78568af5d17c859f830efe1c15b725321b8cd5b82da0e8f0e2f7dfe45cfbf03510dcc2651d934bb04c1b922b7ff897c0ab33f8c720c1f4a4f28b1735716d27429124a7930160e7ea5694119393b8532fcdcedf6008ba56a88403ebad14a8f4b222066c622d66ce683d67bf64928ad308d969a5ce15c8d20bf8cc7e73853333"}, {0x78, 0x119, 0x55e, "090c275aa29b31f3c317f1a49fbdfe789463c551db197e3f7c151610bb32b257411df1e86b3b0c527b4cddcab1a2d7630f90b40ecf47485ce1dc5e04167ca26a5a9dd17cec61281ace37efc47bd5f16ddab5ea66b886a6938e11eb9a6a09a275b3487cd836"}, {0x78, 0x3a, 0x8001, "b078a12c33c9fac59aa46777f7f686b7cd9fd2bace18df9764d41d24874deb2b7e5539ea7e74cc52916e8f703984a830279deedd2cfebb0e88e70c4c8e1b9a5e34bd51c8b37fe8d6f6437b7e480233cf16b35418aa18d07e8476ac2643f75df7531e3d630c0801c6"}, {0x40, 0x117, 0x2, "d71bc2caa3736822663c2d83714c012d05412785bce6cbddd751322df36ebb398a7175401409bacd5c64"}, {0x1010, 0x108, 0x6, "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"}, {0x108, 0x10d, 0x1178, "08f58d3c1aa1d5309e64a425380934025f4436e8da531dbdf5b3b638f68cf736c98d7151139808c0ba6bbd1bff3c99f6e87403d0a723a633d2e4ff25bbe49bd85e25690c8c49cd9025ab41100373e70ae6eca4e90067ea04d48f78dcad85f4525b372e98bbf5078bf7d92def7e04ea4f88978766d6be443ca201b9addabf499201e37bcb2989b45f7d0514d27868af1c5fd55b9be086a37c0fb0553dce509ef013dc359666928dcd33727fabaeb328f76aed8d78dfa831b9f184c240c2f910d01edc69d9f013b6861cbc032457712b08859409bf62c39c511117560999503091543b0ef7d37ba8bc3fd9f49b748ec9af94"}], 0x2148}, 0x10080001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) [ 384.108738][T15191] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 384.155499][T15191] device team0 left promiscuous mode [ 384.177400][ T36] kauditd_printk_skb: 3 callbacks suppressed [ 384.177445][ T36] audit: type=1804 audit(1610493169.443:118): pid=15190 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/218/cgroup.controllers" dev="sda1" ino=16378 res=1 errno=0 [ 384.182362][T15191] device team_slave_0 left promiscuous mode 23:12:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000044c0)={0x10, 0x0, 0x0, 0x8}, 0x40) [ 384.339363][T15191] device team_slave_1 left promiscuous mode [ 384.389892][T15191] bridge0: port 3(team0) entered disabled state [ 384.469027][T15191] team0: Cannot enslave team device to itself [ 384.507867][T15196] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 23:12:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000002) 23:12:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000002) 23:12:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000004440)={0x12, 0x20, 0x8, 0x8000, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x40) [ 384.534081][T15196] bridge0: port 3(team0) entered blocking state [ 384.553365][T15196] bridge0: port 3(team0) entered disabled state [ 384.646283][T15196] device team0 entered promiscuous mode [ 384.660952][T15196] device team_slave_0 entered promiscuous mode [ 384.680553][T15196] device team_slave_1 entered promiscuous mode [ 384.725548][T15196] bridge0: port 3(team0) entered blocking state [ 384.733096][T15196] bridge0: port 3(team0) entered forwarding state [ 384.783379][T15198] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 384.816668][T15198] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.823920][T15198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.831418][T15198] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.838530][T15198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.858477][ T36] audit: type=1804 audit(1610493170.123:119): pid=15214 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/219/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 23:12:50 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 384.948224][T15201] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 385.002615][T15202] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.010803][T15202] bridge0: port 1(bridge_slave_0) entered disabled state 23:12:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000002) [ 385.519073][T15203] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.527767][T15203] bridge0: port 1(bridge_slave_0) entered disabled state 23:12:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x10000, 0x0, 0x6}, 0x40) 23:12:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:50 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000004440)={0x12, 0x20, 0x8, 0x8000, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x40) [ 385.591412][ T95] wlan1: Trigger new scan to find an IBSS to join [ 385.617382][T15203] device bridge0 entered promiscuous mode 23:12:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24000844) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00@\x00\x00\x00\x00\x00!\x00\x01\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x18000000000002e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 23:12:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000002) [ 386.185226][T15222] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 386.207060][T15222] device team0 left promiscuous mode [ 386.224875][T15222] device team_slave_0 left promiscuous mode [ 386.248848][T15222] device team_slave_1 left promiscuous mode [ 386.273507][T15222] bridge0: port 3(team0) entered disabled state [ 386.302883][T15222] team0: Cannot enslave team device to itself [ 386.341244][T15224] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 386.358846][T15224] bridge0: port 3(team0) entered blocking state [ 386.390608][T15224] bridge0: port 3(team0) entered disabled state 23:12:51 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='memory.events\x00'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b04, &(0x7f0000000080)) 23:12:51 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000004440)={0x12, 0x20, 0x8, 0x8000, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x40) [ 386.437185][T15224] device team0 entered promiscuous mode [ 386.477112][T15224] device team_slave_0 entered promiscuous mode [ 386.507023][T15224] device team_slave_1 entered promiscuous mode [ 386.550123][ T36] audit: type=1804 audit(1610493171.823:120): pid=15238 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/200/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 [ 386.581749][T15224] bridge0: port 3(team0) entered blocking state [ 386.588167][T15224] bridge0: port 3(team0) entered forwarding state 23:12:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000002) 23:12:51 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 386.894406][T15244] mac80211_hwsim hwsim7 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 386.956126][T15255] mac80211_hwsim hwsim7 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 387.044359][T15263] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 23:12:52 executing program 2: socketpair(0x23, 0x0, 0x0, &(0x7f0000000580)) [ 387.095423][T15263] device team0 left promiscuous mode 23:12:52 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000004440)={0x12, 0x20, 0x8, 0x8000, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x40) [ 387.133921][T15263] device team_slave_0 left promiscuous mode [ 387.160742][T15263] device team_slave_1 left promiscuous mode [ 387.215884][T15263] bridge0: port 3(team0) entered disabled state [ 387.323680][T15263] team0: Cannot enslave team device to itself [ 387.364526][T15266] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 387.425344][T15266] bridge0: port 3(team0) entered blocking state [ 387.470553][T15266] bridge0: port 3(team0) entered disabled state 23:12:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000012800)={0xb, 0x0, 0x0, 0x4, 0x429}, 0x40) [ 387.616800][T15266] device team0 entered promiscuous mode [ 387.639165][T15266] device team_slave_0 entered promiscuous mode 23:12:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 387.707867][T15266] device team_slave_1 entered promiscuous mode [ 387.774526][T15266] bridge0: port 3(team0) entered blocking state [ 387.782512][T15266] bridge0: port 3(team0) entered forwarding state 23:12:53 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x89a0, &(0x7f0000000000)={'wg0\x00'}) 23:12:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 387.890075][ T36] audit: type=1804 audit(1610493173.163:121): pid=15267 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/201/cgroup.controllers" dev="sda1" ino=16374 res=1 errno=0 23:12:53 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite\x00') ioctl$FS_IOC_FIEMAP(r0, 0x5451, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$FITHAW(r1, 0xc0045878) 23:12:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001700)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f00000016c0)=[@ip_tos_int={{0x14}}], 0x18}, 0x40080c0) 23:12:53 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 388.023984][ T36] audit: type=1800 audit(1610493173.163:122): pid=15267 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=16374 res=0 errno=0 23:12:53 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0xa, &(0x7f00000029c0)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 388.227373][T15300] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 23:12:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1}}]}}, &(0x7f0000000140)=""/252, 0x32, 0xfc, 0x1}, 0x20) [ 388.277013][T15300] device team0 left promiscuous mode [ 388.310039][T15300] device team_slave_0 left promiscuous mode [ 388.340804][T15300] device team_slave_1 left promiscuous mode [ 388.378126][T15300] bridge0: port 3(team0) entered disabled state 23:12:53 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000800000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000001040)='block_bio_remap\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000100)) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 388.475798][T15300] team0: Cannot enslave team device to itself [ 388.527402][T15301] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 388.545090][ T36] audit: type=1804 audit(1610493173.813:123): pid=15310 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/202/cgroup.controllers" dev="sda1" ino=16373 res=1 errno=0 23:12:53 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb20e}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x0, 0x6000) [ 388.548404][T15301] bridge0: port 3(team0) entered blocking state [ 388.575136][ T52] wlan1: Trigger new scan to find an IBSS to join [ 388.669855][T15301] bridge0: port 3(team0) entered disabled state [ 388.717577][ T36] audit: type=1800 audit(1610493173.983:124): pid=15285 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16372 res=0 errno=0 23:12:54 executing program 4: unshare(0x40000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) rt_sigtimedwait(&(0x7f00000002c0), &(0x7f0000000380), 0x0, 0x8) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x4}], 0x1) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 388.812802][T15301] device team0 entered promiscuous mode [ 388.840328][T15301] device team_slave_0 entered promiscuous mode 23:12:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 388.883381][T15301] device team_slave_1 entered promiscuous mode [ 388.950080][T15301] bridge0: port 3(team0) entered blocking state [ 388.957315][T15301] bridge0: port 3(team0) entered forwarding state 23:12:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_DETACH(0x13, &(0x7f0000000140)={@map=0x1}, 0x10) 23:12:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0xff, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000000c0)) getrlimit(0x0, &(0x7f0000000240)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x8, 0x6000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000380)={0x0, r0, 0x7fffffff, 0x0, 0x6}) open(&(0x7f0000000140)='./bus\x00', 0x141142, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x11d) creat(0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) [ 389.099935][T15322] IPVS: ftp: loaded support on port[0] = 21 23:12:54 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 389.374735][T15347] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 389.404540][T15347] device team0 left promiscuous mode 23:12:54 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x8001000, 0x0, 0x0, 0x0, 0x0) [ 389.437552][T15347] device team_slave_0 left promiscuous mode [ 389.474444][T15347] device team_slave_1 left promiscuous mode [ 389.516934][T15347] bridge0: port 3(team0) entered disabled state 23:12:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup2(r0, r0) ioctl$TCSETSW2(r1, 0x402c542c, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 389.560069][ T3247] wlan1: Creating new IBSS network, BSSID 0a:3a:53:b4:0e:94 [ 389.590261][ T52] wlan1: Trigger new scan to find an IBSS to join [ 389.670105][T15347] team0: Cannot enslave team device to itself [ 389.708527][T15354] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 23:12:55 executing program 2: socketpair(0x0, 0x0, 0x2, 0x0) [ 389.772991][T15354] bridge0: port 3(team0) entered blocking state 23:12:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 389.821802][T15354] bridge0: port 3(team0) entered disabled state [ 389.948161][T15354] device team0 entered promiscuous mode [ 390.009856][T15354] device team_slave_0 entered promiscuous mode 23:12:55 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='overlay\x00', 0x0, 0x0) [ 390.053130][T15354] device team_slave_1 entered promiscuous mode [ 390.136209][T15354] bridge0: port 3(team0) entered blocking state [ 390.143473][T15354] bridge0: port 3(team0) entered forwarding state [ 390.274317][T15388] overlayfs: missing 'lowerdir' [ 390.283519][T15390] overlayfs: missing 'lowerdir' [ 390.319045][ T36] audit: type=1804 audit(1610493175.583:125): pid=15359 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/224/cgroup.controllers" dev="sda1" ino=15751 res=1 errno=0 [ 390.458004][T15322] IPVS: ftp: loaded support on port[0] = 21 23:12:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sys_exit\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:12:56 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:56 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:12:56 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r0, 0x0, 0x100000002) 23:12:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/461], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 391.034200][T15425] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 391.079117][T15425] device team0 left promiscuous mode 23:12:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000001fc0)='./file0\x00', 0x40, 0x0) close(r0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)) 23:12:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000010000104"], 0x44}}, 0x0) sendfile(r4, r3, 0x0, 0x100000005) [ 391.114724][T15425] device team_slave_0 left promiscuous mode [ 391.119111][T15431] fuse: Invalid rootmode [ 391.165157][T15425] device team_slave_1 left promiscuous mode [ 391.206868][T15425] bridge0: port 3(team0) entered disabled state 23:12:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7400}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 391.304028][T15425] team0: Cannot enslave team device to itself [ 391.341032][T15430] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 391.391270][T15430] bridge0: port 3(team0) entered blocking state [ 391.457077][T15430] bridge0: port 3(team0) entered disabled state [ 391.478834][ T36] audit: type=1804 audit(1610493176.743:126): pid=15450 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir553000135/syzkaller.4yY7QN/181/cgroup.controllers" dev="sda1" ino=16372 res=1 errno=0 23:12:56 executing program 2: bpf$BPF_PROG_DETACH(0xd, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x1c}, 0x10) [ 391.561909][T15452] fuse: Invalid rootmode 23:12:56 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7400}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:12:56 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r0, 0x0, 0x100000002) [ 391.637647][T15430] device team0 entered promiscuous mode [ 391.681852][T15430] device team_slave_0 entered promiscuous mode [ 391.725374][T15430] device team_slave_1 entered promiscuous mode 23:12:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"/2623], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0300600d698cff9e14f00800", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 391.853633][T15430] bridge0: port 3(team0) entered blocking state [ 391.860053][T15430] bridge0: port 3(team0) entered forwarding state [ 391.944570][ T36] audit: type=1804 audit(1610493177.213:127): pid=15437 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/225/cgroup.controllers" dev="sda1" ino=16373 res=1 errno=0 [ 391.982821][T15450] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 23:12:57 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:57 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7400}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 392.142092][ T36] audit: type=1804 audit(1610493177.413:128): pid=15447 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir553000135/syzkaller.4yY7QN/181/cgroup.controllers" dev="sda1" ino=16372 res=1 errno=0 23:12:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacf27e32fe507de3975101020231368b5cc3f9e50412c8fb3778945165ee42788e36777fe7c9f1f6c515b0e1a38d8650522be18bd10a48b043ccc42646d25dfd73dc67515fb265a0e3ccae66ab15da69dc9e173a649c1cfd6587d452d64e7cc957d775c35da860e8efbc6f2b52c46619d5fb96"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_DETACH(0xb, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x1c}, 0x10) 23:12:57 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r0, 0x0, 0x100000002) [ 392.500171][T15471] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 392.554114][T15471] device team0 left promiscuous mode [ 392.583848][T15471] device team_slave_0 left promiscuous mode 23:12:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"/2623], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0300600d698cff9e14f00800", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 392.629311][T15471] device team_slave_1 left promiscuous mode [ 392.669092][T15471] bridge0: port 3(team0) entered disabled state [ 392.748605][T15471] team0: Cannot enslave team device to itself [ 392.780435][T15472] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 23:12:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x9, 0x3, 0x1b8, 0x0, 0xffffffff, 0xffffffff, 0x90, 0xffffffff, 0x120, 0xffffffff, 0xffffffff, 0x120, 0xffffffff, 0x3, 0x0, {[{{@ip={@multicast2, @rand_addr, 0x0, 0x0, 'ip6gre0\x00', 'bond0\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@ip={@remote, @local, 0x0, 0x0, 'veth0_to_bond\x00', 'batadv0\x00'}, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x218) 23:12:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 392.820479][T15472] bridge0: port 3(team0) entered blocking state [ 392.855403][T15472] bridge0: port 3(team0) entered disabled state 23:12:58 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7400}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 393.049882][T15472] device team0 entered promiscuous mode [ 393.075701][T15472] device team_slave_0 entered promiscuous mode [ 393.092852][T15493] x_tables: duplicate underflow at hook 3 [ 393.119265][T15472] device team_slave_1 entered promiscuous mode [ 393.148895][T15472] bridge0: port 3(team0) entered blocking state [ 393.155393][T15472] bridge0: port 3(team0) entered forwarding state 23:12:58 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000008000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e6400000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000455781a5feee5e1ce784909b849d5550adf200000000000000b61d69f200daafaa50e11cb97c8ad51bcd6d9674c77404b9971e43405d621ffbc9a4fd39b0631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6dba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1dcc4ff8546fee53f5b2e7b91c61ced1ebad000000000000e8122a793c080a882add4e1179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3ad198e3f3a532efa04137d452ff47d2638da3261c8362bb7c7824be6195a66d2e17e122040e11e3bd4a69fc6e8d9f7043e09b9e10dc7777bfaea83a32bcad84aafafec372e98d5884e4ba1e9cc4a2bbe99e30816127f46a1aae33d4d63d716c0975e1ce4a655362e7062ff6ab3934555c01840219829472adefa06d3482c7b2711b98eabdca89b77efd13e6dba4a431ce47911834118093b6cabaa17a57727474e1785ee234835088445aa4a9b677d3d342640e328504aea02a2d727e62b7f097a02dbf8fe1d704765de7482040b2fc3000000000000000008947baeaaf954aff687deaa2f80492461d273ee26d8115cbca081a14cba24788779291745083fccdddc90d7af35c528d46362ea0d8d79c79ddca066da478c197d4a550470557bc99cca336bd88cd28a5ee651627e3a6fbf6ea53b95ddb64c69c7d8d2f4baddc239828760459564124bad6827679cfcda8b1e152ac1e2bcc5ede5b5687aa418abfa29acd7339e73b2cd185c9eb5fb34fccd20ffa155b16c0c309ed6f6663677df37de0ec0d0f548b273940be5d1fe0bae14d1a76bf741330dacd9cc19c0163bcc93059e8d2d1bfa928e2ba458ecd989cb3581a3f270ad48255ac000000000000000000002c723f32f506a961d24f7ea24ea331ae40a29400a9ce4898d7148f6578be3e04fdeb1f83d00bf3b2cfab632ce88cd30d3fc324fb9d94529b8d6e90633c31d70fa1e7093828fb443bf7e6aa7e563967ad24c1c86f6195b206f1a0880b3e3a40f9149b4fc1c5ad367dff706dcaab5cbcdfdbfeafce97cb1e5099e4d54e3c42d1cb638c885d12923741134b28907be48763d302a15e3d133c7bd27a86e9ff98231b9a998f9090df59d69f6d1f5380137f27286782b8ca81e323f25e0d43538b4f5dbf5577f38a449cadf84f578e0ab1422ebf2969dcf3b6193c3b7ac48508024909c8ebb4881d9c4305abd948aa9d1df6e5a5023baf51fbef3732713c11028dbff9d4459573e66307a9688694f7c780a282786a24052a1a174b255aa1046c82d3febb7d6787b671472c29918a594c3f9865ddf484932814c614324afb83423acf9402d678a3411cd8cac6cfba73f0c83c0024db9923c80ff4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19}, 0x42) 23:12:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:12:58 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:12:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"/2623], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0300600d698cff9e14f00800", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 23:12:58 executing program 4: ptrace$getsig(0x4202, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 393.552990][T15502] fuse: Invalid rootmode 23:12:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 393.621157][T15509] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 393.656957][T15509] device team0 left promiscuous mode [ 393.670981][T15509] device team_slave_0 left promiscuous mode [ 393.697105][T15509] device team_slave_1 left promiscuous mode 23:12:59 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0x8}, 0x8) [ 393.719454][T15509] bridge0: port 3(team0) entered disabled state [ 393.734648][T15514] fuse: Invalid rootmode [ 393.745906][T15517] fuse: Invalid rootmode 23:12:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 394.232639][T15509] team0: Cannot enslave team device to itself [ 394.262963][T15513] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 23:12:59 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x1c}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) 23:12:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"/2623], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0300600d698cff9e14f00800", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 23:12:59 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='overlay\x00', 0x0, &(0x7f0000000640)={[{@nfs_export_off='nfs_export=off'}]}) [ 394.294372][T15513] bridge0: port 3(team0) entered blocking state [ 394.333306][T15513] bridge0: port 3(team0) entered disabled state 23:12:59 executing program 5: write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r0, 0x0, 0x100000002) [ 394.436234][T15513] device team0 entered promiscuous mode [ 394.443429][T15513] device team_slave_0 entered promiscuous mode [ 394.456909][T15513] device team_slave_1 entered promiscuous mode [ 394.475120][T15513] bridge0: port 3(team0) entered blocking state [ 394.481533][T15513] bridge0: port 3(team0) entered forwarding state [ 394.549599][T11192] wlan1: Trigger new scan to find an IBSS to join 23:12:59 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r1, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 394.641945][T15536] overlayfs: missing 'lowerdir' 23:13:00 executing program 4: chdir(0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) rename(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='./file0\x00') chdir(&(0x7f0000000200)='./bus\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) 23:13:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:00 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='overlay\x00', 0x0, &(0x7f0000000640)={[{@nfs_export_off='nfs_export=off'}]}) 23:13:00 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="9b53cca566643d", @ANYRESHEX]) 23:13:00 executing program 5: write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r0, 0x0, 0x100000002) [ 395.201897][T15549] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 395.255960][T15549] device team0 left promiscuous mode [ 395.301547][T15547] overlayfs: failed to resolve './bus': -2 [ 395.307705][T15549] device team_slave_0 left promiscuous mode [ 395.340601][T15549] device team_slave_1 left promiscuous mode [ 395.381571][T15559] fuse: Unknown parameter '›SÌ¥fd' [ 395.406287][T15549] bridge0: port 3(team0) entered disabled state [ 395.414508][T15554] overlayfs: failed to resolve './file0': -2 [ 395.459756][T11192] wlan1: Creating new IBSS network, BSSID b2:86:48:a8:26:70 23:13:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}]}, 0x3c}}, 0x0) 23:13:00 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0xd, 0x4, &(0x7f0000000300)=@framed={{}, [@ldst={0x4, 0x2, 0x2}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 395.524512][T15549] team0: Cannot enslave team device to itself 23:13:00 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='overlay\x00', 0x0, &(0x7f0000000640)={[{@nfs_export_off='nfs_export=off'}]}) [ 395.575917][T15551] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 395.602348][T15551] bridge0: port 3(team0) entered blocking state [ 395.634026][T15551] bridge0: port 3(team0) entered disabled state [ 395.745384][T15551] device team0 entered promiscuous mode 23:13:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 395.785952][T15551] device team_slave_0 entered promiscuous mode [ 395.819286][T15551] device team_slave_1 entered promiscuous mode 23:13:01 executing program 5: write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r0, 0x0, 0x100000002) [ 395.903083][T15551] bridge0: port 3(team0) entered blocking state [ 395.910365][T15551] bridge0: port 3(team0) entered forwarding state 23:13:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 23:13:01 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r1, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:13:01 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='overlay\x00', 0x0, &(0x7f0000000640)={[{@nfs_export_off='nfs_export=off'}]}) 23:13:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) dup3(r0, r1, 0x0) ioctl$TIOCGPGRP(r1, 0x5416, 0x0) 23:13:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:01 executing program 2: futex(&(0x7f0000001b40)=0x2, 0x8b, 0x0, 0x0, 0x0, 0x0) [ 396.301304][T15592] overlayfs: missing 'lowerdir' 23:13:01 executing program 1: timerfd_create(0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x25) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x81) open$dir(0x0, 0x503201, 0x3) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x8) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x9, 0x4) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffa) [ 396.338875][T15595] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 23:13:01 executing program 4: perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x50000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0xff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:13:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 396.433099][T15595] device team0 left promiscuous mode [ 396.438693][T15595] device team_slave_0 left promiscuous mode [ 396.491296][T15595] device team_slave_1 left promiscuous mode [ 396.511238][T15595] bridge0: port 3(team0) entered disabled state [ 396.582072][T15595] team0: Cannot enslave team device to itself [ 396.588783][T15599] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 396.631589][T15599] bridge0: port 3(team0) entered blocking state 23:13:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:02 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "cdec8a", 0x44, 0x2f, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @rand_addr=' \x01\x00'}}}}, 0x0) [ 396.685850][T15599] bridge0: port 3(team0) entered disabled state 23:13:02 executing program 4: unshare(0x40000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)={0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/28, 0x4}], 0x1) 23:13:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 396.843669][T15599] device team0 entered promiscuous mode [ 396.863114][T15599] device team_slave_0 entered promiscuous mode [ 396.908091][T15599] device team_slave_1 entered promiscuous mode [ 396.926140][T15615] IPVS: ftp: loaded support on port[0] = 21 [ 396.974535][T15599] bridge0: port 3(team0) entered blocking state [ 396.982346][T15599] bridge0: port 3(team0) entered forwarding state 23:13:02 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r1, 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:13:02 executing program 1: timerfd_create(0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x25) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x81) open$dir(0x0, 0x503201, 0x3) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x8) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x9, 0x4) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffa) 23:13:02 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x6, [@const, @array, @func, @restrict, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x8e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:13:02 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000500)={0x48, &(0x7f0000000240)}) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004640)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/51, 0x33}, 0x7}, {{0x0, 0x0, &(0x7f0000000c80)=[{0x0}], 0x1}, 0x2}, {{&(0x7f0000000d00)=@nfc_llcp, 0x80, &(0x7f0000002180)=[{&(0x7f0000000d80)=""/60, 0x3c}, {&(0x7f0000002200)=""/4106, 0x100a}, {&(0x7f0000001f80)=""/238, 0xee}, {&(0x7f0000002080)=""/239, 0xef}], 0x4}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003440)=""/76, 0x4c}}], 0x5, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$getsig(0x4202, r0, 0xffffffffffffffff, &(0x7f00000002c0)) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000600)) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x1, 0x3b7}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000680)=0x36a) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x80, &(0x7f0000000840)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0xee00, @ANYBLOB=',hash,euid=', @ANYRESDEC=0xee00, @ANYBLOB="2c66736d616769633d3078303030303030303030303030303038332c726f6f74636f6e746578743d73797361646d5f752c7569643ca07b8c323df6792465ed33613b2c5272ce830870111a3074243ea84706b1077d3f880a9151662c861d58ad5afe6dc93dc7e0f6", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 397.345000][T15647] ptrace attach of "/root/syz-executor.2"[15645] was attempted by "/root/syz-executor.2"[15647] 23:13:02 executing program 1: timerfd_create(0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x25) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x81) open$dir(0x0, 0x503201, 0x3) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x8) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x9, 0x4) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffa) 23:13:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 397.503831][T15651] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 397.558287][T15651] device team0 left promiscuous mode 23:13:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 397.580955][T15651] device team_slave_0 left promiscuous mode [ 397.624389][T15651] device team_slave_1 left promiscuous mode [ 397.676261][T15651] bridge0: port 3(team0) entered disabled state [ 397.762526][T15663] fuse: Bad value for 'user_id' 23:13:03 executing program 1: timerfd_create(0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x25) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) creat(0x0, 0x81) open$dir(0x0, 0x503201, 0x3) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f00000000c0), 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x8) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x9, 0x4) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffa) [ 397.825159][T15651] team0: Cannot enslave team device to itself [ 397.888794][T15654] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 397.924630][T15654] bridge0: port 3(team0) entered blocking state 23:13:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 397.977932][T15654] bridge0: port 3(team0) entered disabled state [ 398.122974][T15617] IPVS: ftp: loaded support on port[0] = 21 [ 398.156605][T15654] device team0 entered promiscuous mode [ 398.186818][T15654] device team_slave_0 entered promiscuous mode 23:13:03 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x8, 0x6000) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) [ 398.233091][T15654] device team_slave_1 entered promiscuous mode [ 398.324328][T15654] bridge0: port 3(team0) entered blocking state [ 398.330875][T15654] bridge0: port 3(team0) entered forwarding state 23:13:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000003540)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="da02a44efc52bd5dd91d45e6ed067c2beced9e3e7d7448f5e7686c3da4b28c4137a285b82e2d33a8bf4ab7002e7c60113f57a8282f8ff46ec8ddbd19725e3e23d2a1b3a0d6d0bf5181706efa3a4b8c5517bff5a606d540fe4af6965dd37796d5c4ff01e307a5d5ac97ae813f5445f68560a920c1c025340ab1d577f70e397e8d8d9cd720c2bedcddc63133789a8c89bd32c51e5636afed1a85f60e332585ba04558ed35fed368dd99c036e3c012a56b9a39a70eac1f5d511634b27acc667d6fc6ec4e410335dd85df736e1713a7f7f5401", 0xd1}, {&(0x7f0000000000)="5778dd2158bf26afa7e1f92d4eab554888d55349c1b96965b69e81d0012877127c06eb500a2020d1bbda28706a22eed8b4325e6e2a36f5621773f8c79e89ba7655a326939c5c7ed6fe86f908f9c0b2c55d9528efbf7893f00fc1353fe84b2b3b460710c63a4daf5c83bd9650c2386cd6dac3", 0x72}, {&(0x7f0000000200)="cf692e42c50dddda936cf9a1df6bde364cdfeb985481a2a83d4f44c16fd1b3cd9203e090d8ff7f440d35a87dcab0ab5c0b989f18473a65a855b8be2c26efb4147e887f4bdb11f3ba3dcb57c0b8ff201dcc4947c168b228655bf8c8c2cbda2238c2bbc8fc2179d5edf0ad8a835485519368fa6d14a6ea5fef5b6ee46275c2298280a84544ccf80f66db36616aa4c1a9c4aa69fccbf6", 0x95}, {&(0x7f00000004c0)="3a5dcb0ff989c3f921041a15c3aa49b960375e624a67d024eb546ee4feeeff01330847f2efec7a7ee6ec92b9313177a78909443904b29aafb2c5b7c3103b579053a7cfcb540fa83bebc41874a6faeee6fcb24cee89f0420471da50d3dd9889dde82a3a8e4ca5128ba6646afe1713916d57bd038598934cd0d7070cb4faf33a118352b7b0a20ee83f478b3693c183119717052c02dae12ff2f165a59430afd03f968ea6177704fb38b2235894be4d10a6a79fae548afa674aea4287812fe3b7c866d57ad9ff0c4517a32cf3678228d85c700dce", 0xd3}, {&(0x7f00000005c0)="13a0c650589f1de437b2cbb7dfbdfbee11db519ac08c6bdd9a4c09e064f2969b47e487d63718a4b92e9c40773acfa7a5ebff7d4e036cb5b88929e49da9f2bcbff19af58fc8ff26f7082216576e40d485e64f78ed2b387b5667dd238bc86da197ce73ab3597e801ba06cbf14bc3ad9fba511c80b4ed2ed68d4143e05dc7ef9d10ead1ac56e7074d5b2d4d5527e84250a1643acc0f630a4a323caf718487b8654b2c0c949f241cc475a8b95d16359676a8558210bf5337ef40fb4bd8be9f660d25cb7f8f09c4a36a9c47a76f564c367b56812f4020f441cb513a20", 0xda}, {&(0x7f00000006c0)="5f23867e73b512fceeb1e4afe640bffa9eeece9036b419854c8e0cbe4a355f765944de4391f68ec548e825d116abb4ce3d106da7a6a4a7e0309f9c2845e77334a96da74b1d74f0b208c7d186ef05c80d8be24ab0c56c0722122a98736b689837f2cec8c3b749c4", 0x67}], 0x6}}, {{0x0, 0x0, &(0x7f0000003600)=[{&(0x7f00000007c0)="20f12b6b76b636bfa97b04a4b109d7ed1084cfdbcf300d7301e374d81a518c2fe13e78bda5418b9b7ef88ea865017c8051b1b61052ad662ee4183143fccf841f58a92242729ffeba99b47d923cd3b4386cf872fb", 0x54}], 0x1}}], 0x2, 0x4080) 23:13:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000008000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e6400000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b7000000000000009500000000000000455781a5feee5e1ce784909b849d5550adf200000000000000b61d69f200daafaa50e11cb97c8ad51bcd6d9674c77404b9971e43405d621ffbc9a4fd39b0631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d5595f6dba87b81d1106fb0289ce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1dcc4ff8546fee53f5b2e7b91c61ced1ebad000000000000e8122a793c080a882add4e1179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3ad198e3f3a532efa04137d452ff47d2638da3261c8362bb7c7824be6195a66d2e17e122040e11e3bd4a69fc6e8d9f7043e09b9e10dc7777bfaea83a32bcad84aafafec372e98d5884e4ba1e9cc4a2bbe99e30816127f46a1aae33d4d63d716c0975e1ce4a655362e7062ff6ab3934555c01840219829472adefa06d3482c7b2711b98eabdca89b77efd13e6dba4a431ce47911834118093b6cabaa17a57727474e1785ee234835088445aa4a9b677d3d342640e328504aea02a2d727e62b7f097a02dbf8fe1d704765de7482040b2fc3000000000000000008947baeaaf954aff687deaa2f80492461d273ee26d8115cbca081a14cba24788779291745083fccdddc90d7af35c528d46362ea0d8d79c79ddca066da478c197d4a550470557bc99cca336bd88cd28a5ee651627e3a6fbf6ea53b95ddb64c69c7d8d2f4baddc239828760459564124bad6827679cfcda8b1e152ac1e2bcc5ede5b5687aa418abfa29acd7339e73b2cd185c9eb5fb34fccd20ffa155b16c0c309ed6f6663677df37de0ec0d0f548b273940be5d1fe0bae14d1a76bf741330dacd9cc19c0163bcc93059e8d2d1bfa928e2ba458ecd989cb3581a3f270ad48255ac000000000000000000002c723f32f506a961d24f7ea24ea331ae40a29400a9ce4898d7148f6578be3e04fdeb1f83d00bf3b2cfab632ce88cd30d3fc324fb9d94529b8d6e90633c31d70fa1e7093828fb443bf7e6aa7e563967ad24c1c86f6195b206f1a0880b3e3a40f9149b4fc1c5ad367dff706dcaab5cbcdfdbfeafce97cb1e5099e4d54e3c42d1cb638c885d12923741134b28907be48763d302a15e3d133c7bd27a86e9ff98231b9a998f9090df59d69f6d1f5380137f27286782b8ca81e323f25e0d43538b4f5dbf5577f38a449cadf84f578e0ab1422ebf2969dcf3b6193c3b7ac48508024909c8ebb4881d9c4305abd948aa9d1df6e5a5023baf51fbef3732713c11028dbff9d4459573e66307a9688694f7c780a282786a24052a1a174b255aa1046c82d3febb7d6787b671472c29918a594c3f9865ddf484932814c614324afb83423acf9402d678a3411cd8cac6cfba73f0c83c0024db9923c80ff4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19}, 0x42) 23:13:03 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:13:03 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x8, 0x6000) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) [ 398.736800][T15705] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 398.761265][T15705] device team0 left promiscuous mode [ 398.796332][T15705] device team_slave_0 left promiscuous mode [ 398.856048][T15705] device team_slave_1 left promiscuous mode 23:13:04 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) sendto$inet(r1, &(0x7f0000000200)="b0e3", 0x2, 0x4000800, &(0x7f00000000c0)={0x2, 0x0, @private=0xa010102}, 0x10) [ 398.906172][T15705] bridge0: port 3(team0) entered disabled state 23:13:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) chdir(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) 23:13:04 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x8, 0x6000) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) 23:13:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 399.045699][T15705] team0: Cannot enslave team device to itself [ 399.086634][T15714] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 399.135796][T15714] bridge0: port 3(team0) entered blocking state [ 399.183799][T15714] bridge0: port 3(team0) entered disabled state 23:13:04 executing program 2: timer_create(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000500)={{0x0, r0+10000000}, {0x0, 0x989680}}, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, &(0x7f0000001880), 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000001980)={{0x0, 0x989680}}, &(0x7f00000019c0)) 23:13:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 399.425168][T15714] device team0 entered promiscuous mode 23:13:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 399.469144][T15714] device team_slave_0 entered promiscuous mode 23:13:04 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrlimit(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x8, 0x6000) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) [ 399.521637][T15714] device team_slave_1 entered promiscuous mode [ 399.562098][T15714] bridge0: port 3(team0) entered blocking state [ 399.568494][T15714] bridge0: port 3(team0) entered forwarding state 23:13:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000010c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000160600000ee60000bf050000000000001f650000000000006507000002000000460700004c0000000f75000000000000bf5400000000000007040000f0fff8ffad420100000000009500000000000000050000000000000095000000000000001c0a7900009d3c2792432a4fa650c512aee994a56462712cb064ecce5e7a9ce0a575a4f7952cb768637e60bd5d2e4b5992de991371274fdf535e001022e25659a7c85615c1b88bc894123c090014e8fb87efecdcb7385847954016ad119126222b22ff81971ef4932cb0dcebea6d90e9c1677fbefd35893d883a2c559b7a34db8b2d89fcc8af461b2a74af360eace66cec40d927006bd666c8122217c2792d03070806d0cc5bf6fec345ae9606c3c1a3000c94df67ae6083062ba2f49ec035883e27b1a9e9dff3e8bfc7d1be00f1a0820102b19000000000000000009095601e090012086dee84efd375f0642ed261765d3b9efdfbed9b430bcf04060000bdff1c8bcfc00300000000000000ab997c8bef9aa55841caa57eddff9220c67c9e17bee524c3dc747445763ecb0a7c2cd12bc34b0fc0271124cf9e4e2d23f7062351edf77c7129eb89085967722da6cb884d1afe82f7f722e38397996271700241094d272dd8b754b2dd36d44f9299c8fd1a7817450bc7921dd372e621dd447b86e7ffd1bdc198deb495cac0995ca3ef6c1affb693ae366b0f11db6ee4830db4713e5ce6cac6a27e29f171b8e9f172c3db24558d77b8bf18be45c50b3fc005fa7b5e45a209d48d6dc2389d7f34cb9c02cf517c8ed7a9b6159ce895101c2ccff2bde95aa860ed9b836d6b8fcab7663d9bd8415e6f90fdb007b8f3e078e3a638c4fd88d20d235173720c1df1147c9f5013c82fc98604bd70cd56609a6b73943748a900e1d8cf81bcb1d262845762f6b0a284040000005cc3ba8bf0b5e0fc018463d03a73fa85429725545128b0e9b550a13d0dd35092250b7d00ff03d5314fa8d37932055bb6bce4f618cad2375a34c7f15c3096f31e6aa6887864f62760ae35214552982bba84d92b1261251330dde4cf97b7cc6b2349e4f7a576c931941f787327fceb5091d9e347056003f7303d210fccd2efe6cda2595aacc36db66ff83af576b56dfbd40b15d569244dbfed73ab9ef37705f9d2734801899e248e1a7155e28f000000000000000fce52263e3953a6f8560f852602ca901b58a9e2dbf16dd0322d0bb3ceb1b01752340bcbbf731701b2b1768aabb9a002090c09ab606e91ad9d88e7205464594add8691b62d55127cd891b8abe4358697e1b5f038753c0aa220cdce78b9346adbd72b293e66ef1a04905aaf6bd31e8d40d425d21232956ee45935d7adb2bf9fb37ff145472c58dbc8db58d0cde99df7070000000000006d5cf98e2341fae759fb84c9f8ec46ec9af324d13d1bd85d57f598c00eb7bb8b6b4ff5875a50e2ea3287cf0f838bffdbf985fdce1fb66979b51cc6d6d6661354f33986f7acee499e25e3b70db6f15d7f2bfcbf89eaf55a292a55c9c9ac899eeb78c3d2e83f5e0eaf5cec82f45884cb0394271826ac2d5cc0afa6e784b515c659901c5c6a8573436be7b0f64c6176ef37db239a1ee9839436e951aef4196798d518a4820a241cec1b3e4923dae46db36fe1416229b49b647fb893c87d466d7eb9c505e74120de7b13645fc6921a759e2c23153f432a3e5167628a94aacd0f40543049d8ef9787b56006227f143ce5554837675b83eeced66fe71bbe2c055660d23af1c9a83b78d0fde1f9dd526858a320563807a1ef41829913ce0b280010dca0cb3a98a8986e8e656dcaa6ae4ee6717a29e50450688763f1b17c156b860ba0d5a121d00ceac30ef5e104c43d76074c3884cb8fa504ebc94f7c83e90b6cad8d2a027bd585f4472cfb004cd9f099950000000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) chdir(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) 23:13:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) chdir(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) 23:13:05 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:13:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:05 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',ro,t']) 23:13:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 400.064176][T15763] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 23:13:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000010c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000160600000ee60000bf050000000000001f650000000000006507000002000000460700004c0000000f75000000000000bf5400000000000007040000f0fff8ffad420100000000009500000000000000050000000000000095000000000000001c0a7900009d3c2792432a4fa650c512aee994a56462712cb064ecce5e7a9ce0a575a4f7952cb768637e60bd5d2e4b5992de991371274fdf535e001022e25659a7c85615c1b88bc894123c090014e8fb87efecdcb7385847954016ad119126222b22ff81971ef4932cb0dcebea6d90e9c1677fbefd35893d883a2c559b7a34db8b2d89fcc8af461b2a74af360eace66cec40d927006bd666c8122217c2792d03070806d0cc5bf6fec345ae9606c3c1a3000c94df67ae6083062ba2f49ec035883e27b1a9e9dff3e8bfc7d1be00f1a0820102b19000000000000000009095601e090012086dee84efd375f0642ed261765d3b9efdfbed9b430bcf04060000bdff1c8bcfc00300000000000000ab997c8bef9aa55841caa57eddff9220c67c9e17bee524c3dc747445763ecb0a7c2cd12bc34b0fc0271124cf9e4e2d23f7062351edf77c7129eb89085967722da6cb884d1afe82f7f722e38397996271700241094d272dd8b754b2dd36d44f9299c8fd1a7817450bc7921dd372e621dd447b86e7ffd1bdc198deb495cac0995ca3ef6c1affb693ae366b0f11db6ee4830db4713e5ce6cac6a27e29f171b8e9f172c3db24558d77b8bf18be45c50b3fc005fa7b5e45a209d48d6dc2389d7f34cb9c02cf517c8ed7a9b6159ce895101c2ccff2bde95aa860ed9b836d6b8fcab7663d9bd8415e6f90fdb007b8f3e078e3a638c4fd88d20d235173720c1df1147c9f5013c82fc98604bd70cd56609a6b73943748a900e1d8cf81bcb1d262845762f6b0a284040000005cc3ba8bf0b5e0fc018463d03a73fa85429725545128b0e9b550a13d0dd35092250b7d00ff03d5314fa8d37932055bb6bce4f618cad2375a34c7f15c3096f31e6aa6887864f62760ae35214552982bba84d92b1261251330dde4cf97b7cc6b2349e4f7a576c931941f787327fceb5091d9e347056003f7303d210fccd2efe6cda2595aacc36db66ff83af576b56dfbd40b15d569244dbfed73ab9ef37705f9d2734801899e248e1a7155e28f000000000000000fce52263e3953a6f8560f852602ca901b58a9e2dbf16dd0322d0bb3ceb1b01752340bcbbf731701b2b1768aabb9a002090c09ab606e91ad9d88e7205464594add8691b62d55127cd891b8abe4358697e1b5f038753c0aa220cdce78b9346adbd72b293e66ef1a04905aaf6bd31e8d40d425d21232956ee45935d7adb2bf9fb37ff145472c58dbc8db58d0cde99df7070000000000006d5cf98e2341fae759fb84c9f8ec46ec9af324d13d1bd85d57f598c00eb7bb8b6b4ff5875a50e2ea3287cf0f838bffdbf985fdce1fb66979b51cc6d6d6661354f33986f7acee499e25e3b70db6f15d7f2bfcbf89eaf55a292a55c9c9ac899eeb78c3d2e83f5e0eaf5cec82f45884cb0394271826ac2d5cc0afa6e784b515c659901c5c6a8573436be7b0f64c6176ef37db239a1ee9839436e951aef4196798d518a4820a241cec1b3e4923dae46db36fe1416229b49b647fb893c87d466d7eb9c505e74120de7b13645fc6921a759e2c23153f432a3e5167628a94aacd0f40543049d8ef9787b56006227f143ce5554837675b83eeced66fe71bbe2c055660d23af1c9a83b78d0fde1f9dd526858a320563807a1ef41829913ce0b280010dca0cb3a98a8986e8e656dcaa6ae4ee6717a29e50450688763f1b17c156b860ba0d5a121d00ceac30ef5e104c43d76074c3884cb8fa504ebc94f7c83e90b6cad8d2a027bd585f4472cfb004cd9f099950000000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) chdir(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) [ 400.133814][T15763] device team0 left promiscuous mode [ 400.199014][T15763] device team_slave_0 left promiscuous mode 23:13:05 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x22, {'group_id'}}) 23:13:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 400.265475][T15763] device team_slave_1 left promiscuous mode 23:13:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000010c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000160600000ee60000bf050000000000001f650000000000006507000002000000460700004c0000000f75000000000000bf5400000000000007040000f0fff8ffad420100000000009500000000000000050000000000000095000000000000001c0a7900009d3c2792432a4fa650c512aee994a56462712cb064ecce5e7a9ce0a575a4f7952cb768637e60bd5d2e4b5992de991371274fdf535e001022e25659a7c85615c1b88bc894123c090014e8fb87efecdcb7385847954016ad119126222b22ff81971ef4932cb0dcebea6d90e9c1677fbefd35893d883a2c559b7a34db8b2d89fcc8af461b2a74af360eace66cec40d927006bd666c8122217c2792d03070806d0cc5bf6fec345ae9606c3c1a3000c94df67ae6083062ba2f49ec035883e27b1a9e9dff3e8bfc7d1be00f1a0820102b19000000000000000009095601e090012086dee84efd375f0642ed261765d3b9efdfbed9b430bcf04060000bdff1c8bcfc00300000000000000ab997c8bef9aa55841caa57eddff9220c67c9e17bee524c3dc747445763ecb0a7c2cd12bc34b0fc0271124cf9e4e2d23f7062351edf77c7129eb89085967722da6cb884d1afe82f7f722e38397996271700241094d272dd8b754b2dd36d44f9299c8fd1a7817450bc7921dd372e621dd447b86e7ffd1bdc198deb495cac0995ca3ef6c1affb693ae366b0f11db6ee4830db4713e5ce6cac6a27e29f171b8e9f172c3db24558d77b8bf18be45c50b3fc005fa7b5e45a209d48d6dc2389d7f34cb9c02cf517c8ed7a9b6159ce895101c2ccff2bde95aa860ed9b836d6b8fcab7663d9bd8415e6f90fdb007b8f3e078e3a638c4fd88d20d235173720c1df1147c9f5013c82fc98604bd70cd56609a6b73943748a900e1d8cf81bcb1d262845762f6b0a284040000005cc3ba8bf0b5e0fc018463d03a73fa85429725545128b0e9b550a13d0dd35092250b7d00ff03d5314fa8d37932055bb6bce4f618cad2375a34c7f15c3096f31e6aa6887864f62760ae35214552982bba84d92b1261251330dde4cf97b7cc6b2349e4f7a576c931941f787327fceb5091d9e347056003f7303d210fccd2efe6cda2595aacc36db66ff83af576b56dfbd40b15d569244dbfed73ab9ef37705f9d2734801899e248e1a7155e28f000000000000000fce52263e3953a6f8560f852602ca901b58a9e2dbf16dd0322d0bb3ceb1b01752340bcbbf731701b2b1768aabb9a002090c09ab606e91ad9d88e7205464594add8691b62d55127cd891b8abe4358697e1b5f038753c0aa220cdce78b9346adbd72b293e66ef1a04905aaf6bd31e8d40d425d21232956ee45935d7adb2bf9fb37ff145472c58dbc8db58d0cde99df7070000000000006d5cf98e2341fae759fb84c9f8ec46ec9af324d13d1bd85d57f598c00eb7bb8b6b4ff5875a50e2ea3287cf0f838bffdbf985fdce1fb66979b51cc6d6d6661354f33986f7acee499e25e3b70db6f15d7f2bfcbf89eaf55a292a55c9c9ac899eeb78c3d2e83f5e0eaf5cec82f45884cb0394271826ac2d5cc0afa6e784b515c659901c5c6a8573436be7b0f64c6176ef37db239a1ee9839436e951aef4196798d518a4820a241cec1b3e4923dae46db36fe1416229b49b647fb893c87d466d7eb9c505e74120de7b13645fc6921a759e2c23153f432a3e5167628a94aacd0f40543049d8ef9787b56006227f143ce5554837675b83eeced66fe71bbe2c055660d23af1c9a83b78d0fde1f9dd526858a320563807a1ef41829913ce0b280010dca0cb3a98a8986e8e656dcaa6ae4ee6717a29e50450688763f1b17c156b860ba0d5a121d00ceac30ef5e104c43d76074c3884cb8fa504ebc94f7c83e90b6cad8d2a027bd585f4472cfb004cd9f099950000000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) chdir(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) [ 400.324523][T15763] bridge0: port 3(team0) entered disabled state [ 400.507619][T15763] team0: Cannot enslave team device to itself [ 400.543339][T15765] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 400.574427][T15780] fuse: Bad value for 'user_id' [ 400.604265][T15765] bridge0: port 3(team0) entered blocking state 23:13:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) chdir(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) [ 400.677595][T15765] bridge0: port 3(team0) entered disabled state 23:13:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb20e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) creat(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x8, 0x6000) fallocate(0xffffffffffffffff, 0x0, 0x8003, 0x8020001) open(0x0, 0x141142, 0x0) creat(0x0, 0x0) [ 400.859814][T15765] device team0 entered promiscuous mode [ 400.865441][T15765] device team_slave_0 entered promiscuous mode [ 400.915734][T15765] device team_slave_1 entered promiscuous mode [ 400.937706][T15765] bridge0: port 3(team0) entered blocking state [ 400.944153][T15765] bridge0: port 3(team0) entered forwarding state 23:13:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) chdir(0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) [ 401.125558][ T36] audit: type=1804 audit(1610493186.394:129): pid=15772 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/221/cgroup.controllers" dev="sda1" ino=15842 res=1 errno=0 23:13:06 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:13:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 401.318863][ T36] audit: type=1800 audit(1610493186.394:130): pid=15772 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=15842 res=0 errno=0 23:13:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb20e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) creat(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x8, 0x6000) fallocate(0xffffffffffffffff, 0x0, 0x8003, 0x8020001) open(0x0, 0x141142, 0x0) creat(0x0, 0x0) 23:13:06 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) [ 401.411345][T15805] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 401.493804][T15805] device team0 left promiscuous mode [ 401.556381][T15805] device team_slave_0 left promiscuous mode [ 401.600369][T15805] device team_slave_1 left promiscuous mode [ 401.637178][T15812] fuse: Bad value for 'user_id' 23:13:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:06 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x6, 0x0, 0x0) [ 401.707879][T15805] bridge0: port 3(team0) entered disabled state 23:13:07 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x0, 0x0, 0x0, 0x8}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000500)={0x48, &(0x7f0000000240)}) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004640)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/51, 0x33}, 0x7}, {{0x0, 0x0, &(0x7f0000000c80)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003440)=""/76, 0x4c}}], 0x5, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$getsig(0x4202, r0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3b7}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000680)=0x36a) mount$fuse(0x0, 0x0, 0x0, 0x80, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYBLOB, @ANYRESDEC, @ANYBLOB=',group_id', @ANYRESDEC=0xee00, @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 401.828130][T15805] team0: Cannot enslave team device to itself 23:13:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb20e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) creat(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x8, 0x6000) fallocate(0xffffffffffffffff, 0x0, 0x8003, 0x8020001) open(0x0, 0x141142, 0x0) creat(0x0, 0x0) [ 401.885275][T15807] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 401.921996][T15807] bridge0: port 3(team0) entered blocking state 23:13:07 executing program 2: r0 = open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb20e}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x8, 0x6000) [ 401.982641][T15807] bridge0: port 3(team0) entered disabled state 23:13:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 402.126956][T15807] device team0 entered promiscuous mode [ 402.148902][T15807] device team_slave_0 entered promiscuous mode [ 402.209368][T15807] device team_slave_1 entered promiscuous mode 23:13:07 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x0, 0x0, 0x0, 0x8}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000500)={0x48, &(0x7f0000000240)}) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004640)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/51, 0x33}, 0x7}, {{0x0, 0x0, &(0x7f0000000c80)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003440)=""/76, 0x4c}}], 0x5, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$getsig(0x4202, r0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3b7}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000680)=0x36a) mount$fuse(0x0, 0x0, 0x0, 0x80, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYBLOB, @ANYRESDEC, @ANYBLOB=',group_id', @ANYRESDEC=0xee00, @ANYRESDEC=0xee00, @ANYBLOB, @ANYRESDEC=0x0]) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 402.264824][T15807] bridge0: port 3(team0) entered blocking state [ 402.271305][T15807] bridge0: port 3(team0) entered forwarding state 23:13:07 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 402.731266][T15848] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 402.750824][ T36] audit: type=1804 audit(1610493188.024:131): pid=15827 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/222/cgroup.controllers" dev="sda1" ino=16225 res=1 errno=0 [ 402.775345][T15848] device team0 left promiscuous mode [ 402.813260][T15848] device team_slave_0 left promiscuous mode [ 402.860989][T15848] device team_slave_1 left promiscuous mode 23:13:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:08 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb20e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) creat(0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x8, 0x6000) fallocate(0xffffffffffffffff, 0x0, 0x8003, 0x8020001) open(0x0, 0x141142, 0x0) creat(0x0, 0x0) 23:13:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fdatasync(0xffffffffffffffff) 23:13:08 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sys_exit\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r1}, 0xc) [ 402.905068][T15848] bridge0: port 3(team0) entered disabled state [ 402.991856][T15848] team0: Cannot enslave team device to itself [ 403.034697][T15849] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 403.068169][T15849] bridge0: port 3(team0) entered blocking state [ 403.113613][T15849] bridge0: port 3(team0) entered disabled state 23:13:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:08 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=09']) [ 403.238434][T15849] device team0 entered promiscuous mode [ 403.278015][T15849] device team_slave_0 entered promiscuous mode [ 403.300944][T15849] device team_slave_1 entered promiscuous mode 23:13:08 executing program 1: r0 = open$dir(&(0x7f0000000800)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) unlinkat(r0, &(0x7f00000002c0)='./file0\x00', 0x0) [ 403.400564][T15849] bridge0: port 3(team0) entered blocking state [ 403.407737][T15849] bridge0: port 3(team0) entered forwarding state [ 403.418955][ T36] audit: type=1804 audit(1610493188.684:132): pid=15868 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/243/cgroup.controllers" dev="sda1" ino=16258 res=1 errno=0 [ 403.499153][T15870] fuse: Bad value for 'rootmode' 23:13:08 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:13:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000010c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x0) chdir(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) [ 403.625153][ T36] audit: type=1804 audit(1610493188.724:133): pid=15866 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/243/cgroup.controllers" dev="sda1" ino=16258 res=1 errno=0 23:13:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000140)=""/168, 0x26, 0xa8, 0x1}, 0x20) 23:13:09 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0xed}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 403.905897][T15890] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 403.976620][T15890] device team0 left promiscuous mode [ 404.021255][T15890] device team_slave_0 left promiscuous mode [ 404.065627][T15890] device team_slave_1 left promiscuous mode [ 404.113910][T15901] ptrace attach of "/root/syz-executor.1"[15900] was attempted by "/root/syz-executor.1"[15901] [ 404.121524][T15890] bridge0: port 3(team0) entered disabled state [ 404.215718][T15890] team0: Cannot enslave team device to itself [ 404.231361][T15895] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 404.259818][T15895] bridge0: port 3(team0) entered blocking state [ 404.280389][ T36] audit: type=1804 audit(1610493189.554:134): pid=15874 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/223/cgroup.controllers" dev="sda1" ino=16384 res=1 errno=0 [ 404.287628][T15895] bridge0: port 3(team0) entered disabled state [ 404.334488][ T36] audit: type=1800 audit(1610493189.554:135): pid=15874 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=16384 res=0 errno=0 23:13:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacf27e32fe507de3975101020231368b5cc3f9e50412c8fb3778945165ee42788e36777fe7c9f1f6c515b0e1a38d8650522be18bd10a48b043ccc42646d25dfd73dc67515fb265a0e3ccae66ab15da69dc9e173a649c1cfd6587d452d64e7cc957d775c35da860e8efbc6f2b52c46619d5fb961e1096efa9464a43306628ca52e8d96f62afefc7efef2adfa7dfc58523554464705eecd88cd9587147d11a01f56a1452287777a923c93605cb0a1426f5102dc5ed29243013565de5639031ad24edb59f7a3e942209542e185661889116239e33ec179cd455e700e83c562908d40000000000000000000026076b2a667b3b1e452fa9b42a98450ac8620378c91b5594bda113bfb705eaaceb09cda72a78582aefb40e9fb3398fb0818e99b75d5842a0b941e6ae0fd62f0ae88ffc4581c4bbe4a86caa93f876bd25e32734f0df34179c134f8f31012e864d4ceff79015452b801e1c85c8e2bbb8bfaa1a7d05589c5ebf62d4d1832d5a654d0738e7ce74e26d4e6c436b532183fce1af3a942f4013c59ad7a6920b96ac"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x80000001}, 0x8) 23:13:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:09 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x2c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:13:09 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f0000000940), 0x8, 0xc0000) [ 404.485727][T15895] device team0 entered promiscuous mode [ 404.502661][T15895] device team_slave_0 entered promiscuous mode [ 404.533463][T15895] device team_slave_1 entered promiscuous mode [ 404.545340][T15907] fuse: Bad value for 'rootmode' 23:13:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"/2623], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'syz_tun\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7944080594e5d04e0d86187933b474b6122b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 404.603701][T15895] bridge0: port 3(team0) entered blocking state [ 404.611581][T15895] bridge0: port 3(team0) entered forwarding state 23:13:09 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x2c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:13:09 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x1c}, 0x10) 23:13:10 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r3, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:13:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x3, &(0x7f0000000080), 0x0) timerfd_settime(r2, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) 23:13:10 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x2c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 405.385145][ T36] audit: type=1800 audit(1610493190.654:136): pid=15915 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16372 res=0 errno=0 23:13:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 405.486323][T15931] fuse: Bad value for 'rootmode' [ 405.564663][T15937] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 405.601301][T15937] device team0 left promiscuous mode [ 405.623365][T15937] device team_slave_0 left promiscuous mode [ 405.646306][T15937] device team_slave_1 left promiscuous mode [ 405.679041][T15937] bridge0: port 3(team0) entered disabled state [ 405.753641][T15937] team0: Cannot enslave team device to itself [ 405.814366][T15939] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 405.858261][T15939] bridge0: port 3(team0) entered blocking state [ 405.880548][T15939] bridge0: port 3(team0) entered disabled state [ 405.962523][T15939] device team0 entered promiscuous mode [ 405.989685][ T8] Bluetooth: hci1: command 0x0406 tx timeout [ 405.999165][T15939] device team_slave_0 entered promiscuous mode [ 406.039768][T15939] device team_slave_1 entered promiscuous mode [ 406.085761][T15939] bridge0: port 3(team0) entered blocking state [ 406.093276][T15939] bridge0: port 3(team0) entered forwarding state [ 406.379153][ T36] audit: type=1804 audit(1610493191.644:137): pid=15940 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/224/cgroup.controllers" dev="sda1" ino=16371 res=1 errno=0 23:13:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:11 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x2c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:13:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"/2623], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'syz_tun\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7944080594e5d04e0d86187933b474b6122b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:13:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1f}, 0x3}, 0x1c) 23:13:11 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r2, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 406.557964][T15961] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 406.621367][T15961] device team0 left promiscuous mode [ 406.655759][T15961] device team_slave_0 left promiscuous mode 23:13:11 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, 0x0, 0x0) 23:13:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000200)=@buf) [ 406.701510][T15961] device team_slave_1 left promiscuous mode [ 406.736857][T15961] bridge0: port 3(team0) entered disabled state [ 406.807876][ T36] audit: type=1804 audit(1610493192.074:138): pid=15950 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/245/cgroup.controllers" dev="sda1" ino=16382 res=1 errno=0 23:13:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"/2623], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'syz_tun\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7944080594e5d04e0d86187933b474b6122b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 407.368322][T15961] team0: Cannot enslave team device to itself [ 407.412031][T15965] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 407.434478][T15965] bridge0: port 3(team0) entered blocking state [ 407.454964][T15965] bridge0: port 3(team0) entered disabled state [ 407.496358][T15965] device team0 entered promiscuous mode [ 407.519663][T15965] device team_slave_0 entered promiscuous mode [ 407.526002][T15965] device team_slave_1 entered promiscuous mode [ 407.584442][T15965] bridge0: port 3(team0) entered blocking state [ 407.590878][T15965] bridge0: port 3(team0) entered forwarding state 23:13:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000010000104"], 0x44}}, 0x0) sendfile(r2, r1, 0x0, 0x100000005) 23:13:13 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000004240)={0x2020}, 0x2020) 23:13:13 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r2, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 408.380133][ T36] audit: type=1804 audit(1610493193.654:139): pid=15981 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/225/cgroup.controllers" dev="sda1" ino=16381 res=1 errno=0 23:13:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"/2623], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'syz_tun\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0x0, &(0x7f00000000c0)="b9ff0300600d698cff9e14f008004de7f9c764362ae28eff070003e0000000a08b7944080594e5d04e0d86187933b474b6122b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0x200, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 408.564716][T15997] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 408.610914][ T36] audit: type=1804 audit(1610493193.684:140): pid=15983 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/246/cgroup.controllers" dev="sda1" ino=16367 res=1 errno=0 [ 408.642516][T15997] device team0 left promiscuous mode [ 408.647996][T15997] device team_slave_0 left promiscuous mode 23:13:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @remote, 0x3}, 0x80) sendmmsg$inet(r0, &(0x7f0000008780)=[{{&(0x7f0000000000)={0x2, 0x4e24}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 408.711828][T15997] device team_slave_1 left promiscuous mode [ 408.724169][T15997] bridge0: port 3(team0) entered disabled state [ 408.736333][ T36] audit: type=1800 audit(1610493193.684:141): pid=15983 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16367 res=0 errno=0 [ 408.815181][T15997] team0: Cannot enslave team device to itself [ 408.840933][T15999] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 408.866324][T15999] bridge0: port 3(team0) entered blocking state [ 408.890730][ T36] audit: type=1804 audit(1610493193.914:142): pid=15998 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir553000135/syzkaller.4yY7QN/210/cgroup.controllers" dev="sda1" ino=16376 res=1 errno=0 [ 408.941341][T15999] bridge0: port 3(team0) entered disabled state 23:13:14 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) mount$9p_fd(0x0, &(0x7f0000000200)='.\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 409.103615][T15999] device team0 entered promiscuous mode [ 409.135696][T15999] device team_slave_0 entered promiscuous mode [ 409.186316][T15999] device team_slave_1 entered promiscuous mode [ 409.278221][T15999] bridge0: port 3(team0) entered blocking state [ 409.286464][T15999] bridge0: port 3(team0) entered forwarding state [ 409.320978][T15996] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 409.369290][ T36] audit: type=1804 audit(1610493194.634:143): pid=15998 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir553000135/syzkaller.4yY7QN/210/cgroup.controllers" dev="sda1" ino=16376 res=1 errno=0 23:13:14 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r2, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:13:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="280000001c00070c000000200000000007000000fa"], 0x28}}, 0x0) [ 409.733388][ T95] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 409.767853][T16016] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 409.830385][T16016] device team0 left promiscuous mode [ 409.865938][T16016] device team_slave_0 left promiscuous mode 23:13:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sys_exit\x00', r0}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x1c}, 0x10) [ 409.917889][T16016] device team_slave_1 left promiscuous mode [ 409.976571][T16016] bridge0: port 3(team0) entered disabled state [ 410.107023][T16016] team0: Cannot enslave team device to itself [ 410.157453][T16020] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 410.188397][T16021] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 410.236555][T16021] bridge0: port 3(team0) entered blocking state [ 410.297675][T16021] bridge0: port 3(team0) entered disabled state 23:13:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x29, 0xfffffffffffffffe, 0x44b3ef32) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 23:13:15 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) [ 410.457015][T16021] device team0 entered promiscuous mode [ 410.476703][T16021] device team_slave_0 entered promiscuous mode [ 410.514455][T16021] device team_slave_1 entered promiscuous mode [ 410.583947][T16021] bridge0: port 3(team0) entered blocking state [ 410.590347][T16021] bridge0: port 3(team0) entered forwarding state [ 410.605302][ T36] audit: type=1804 audit(1610493195.874:144): pid=16022 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir173706697/syzkaller.YY1TOI/226/cgroup.controllers" dev="sda1" ino=16363 res=1 errno=0 23:13:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x13, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) 23:13:16 executing program 2: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) 23:13:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001240)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000005c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) r2 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x71, &(0x7f0000000040), &(0x7f0000000100)=0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r1, 0x0, 0x100000002) [ 410.742853][ T36] audit: type=1800 audit(1610493195.904:145): pid=16024 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=16362 res=0 errno=0 23:13:16 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680), 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r2, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 23:13:16 executing program 1: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x88) [ 410.989055][T16051] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 411.018854][T16051] device team0 left promiscuous mode [ 411.034878][T16051] device team_slave_0 left promiscuous mode [ 411.061811][T16051] device team_slave_1 left promiscuous mode [ 411.082586][T16051] bridge0: port 3(team0) entered disabled state [ 411.166313][T16051] team0: Cannot enslave team device to itself [ 411.192069][T16055] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 411.215994][T16055] bridge0: port 3(team0) entered blocking state [ 411.235563][T16055] bridge0: port 3(team0) entered disabled state [ 411.353228][T16055] device team0 entered promiscuous mode [ 411.366847][T16055] device team_slave_0 entered promiscuous mode [ 411.395339][T16055] device team_slave_1 entered promiscuous mode [ 411.469733][T16055] bridge0: port 3(team0) entered blocking state [ 411.478342][T16055] bridge0: port 3(team0) entered forwarding state 23:13:16 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x40001) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0xc4, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x12000044, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x50252) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000680), 0x4) socket$kcm(0x29, 0x7, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x70, 0x20, 0x7, 0x0, 0x3, 0x0, 0x20000000000001, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x400, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000180)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/59, 0x3b}], 0x3}, 0x2001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) sendmsg$kcm(r2, &(0x7f0000000500)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @private=0xa010101}, 0x0, 0x2, 0x0, 0x4}}, 0x80, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000480)="ebc578ad49659fc1d173059f4467e55e7390133678cad7e94e57083e6936564397c10368ef8db8a0e11995deb5f851a20b4954eb304c917cf0a95bb0f3ab6326c9c911867c423aa85d0bb2be33", 0x4d}, {&(0x7f00000006c0)}, {&(0x7f0000000840)}, {&(0x7f00000008c0)="07655af642e4fa21e317e8c8500d32d03099be0fa865be9d03e0c1451a7189c2be92882a02833a4a2f3dd886234e0586b1bfc4f90bdedd444fdcf792c985cf504470e6a54a76b75e66e037429dc11802019a365848437722d843c4a8ea8ecf7d97da6055f3aa1aa57983e373781bb7c26ada2cce6846805850f3c19b14c8837612f84a7bf8c788bed1ffb53ce55cb0e4f8c5e0b2df3a05ff7e89e6654d6cde5347b3834476f179b404", 0xa9}, {&(0x7f0000000980)="8016bb301edc04e5e4992321f1c4df96891ea8adb82adb305e4f64583fab998821fd0cb782cdd487dc5ecca5501ac4e045443296b915a78f77b0263696922b1590a88271ec8cd9e80b16f3", 0x4b}, {&(0x7f0000000a00)="89c97c02871cc487b37f2b8c9e16386ee0a938fa58dc028a1f4fb31998973fa35df24b8075d5905a6cc52a26e5e044f38cc9ad7f21cb346be62713ce2ea7b5c3e60078f2a0aecbce0cda3f67260abe32e67d77cfae63601e27f289f448df1fbadec912b1c18479118e60f44e96c8f2c6b18fdcb76963a8c570b57b2d626b2e9ab8090ffe661e84b5d375b771fa0b04b8bcce03aed7aed2d2b02cdc1906f7955e067f65b591f6e28e6fa26326c515a6d66067b2e0b4b2d2055dd7a6524f59faf39d91a65849050fa4f8dc32a259682ecd65e67ac0e2c87bfc71f08b2a1736874020d82eb7e32685b4c53efb806ffa05ec69", 0xf1}], 0x7, &(0x7f0000000e80)=ANY=[], 0x288}, 0x40000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 411.773135][T16071] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 411.813181][T16071] device team0 left promiscuous mode [ 411.818691][T16071] device team_slave_0 left promiscuous mode [ 411.875652][T16071] device team_slave_1 left promiscuous mode [ 411.923104][T16071] bridge0: port 3(team0) entered disabled state [ 411.943241][ T36] audit: type=1804 audit(1610493197.214:146): pid=16060 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir937882376/syzkaller.BEpBBf/248/cgroup.controllers" dev="sda1" ino=16382 res=1 errno=0 [ 412.014100][T16071] team0: Cannot enslave team device to itself [ 412.036200][T16073] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 412.064586][T16073] bridge0: port 3(team0) entered blocking state [ 412.084031][T16073] bridge0: port 3(team0) entered disabled state [ 412.169080][T16073] device team0 entered promiscuous mode [ 412.182517][T16073] device team_slave_0 entered promiscuous mode [ 412.202322][T16073] device team_slave_1 entered promiscuous mode [ 412.269132][T16073] bridge0: port 3(team0) entered blocking state [ 412.276961][T16073] bridge0: port 3(team0) entered forwarding state [ 413.569473][ T9] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 419.610720][ T3247] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 425.550276][ T3247] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 440.705350][T12524] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 444.493418][ T95] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 450.535485][ T9] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 456.576772][ T3247] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 471.731430][ T9] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 475.519564][ T95] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 481.456791][ T3247] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 487.496781][T11192] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 502.751632][T12524] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 506.538765][T12524] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 512.476878][ T95] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 518.517211][T11192] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 533.771947][ T9] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 537.559939][T12524] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 543.395874][T12524] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 549.436193][ T95] wlan1: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) [ 560.689675][ T1656] INFO: task syz-executor.4:16023 can't die for more than 143 seconds. [ 560.698491][ T1656] task:syz-executor.4 state:D stack:27888 pid:16023 ppid: 8495 flags:0x00004004 [ 560.708633][ T1656] Call Trace: [ 560.712546][ T1656] __schedule+0x90c/0x21a0 [ 560.718633][ T1656] ? io_schedule_timeout+0x140/0x140 [ 560.724417][ T1656] schedule+0xcf/0x270 [ 560.728570][ T1656] schedule_timeout+0x1d8/0x250 [ 560.734273][ T1656] ? usleep_range+0x170/0x170 [ 560.738990][ T1656] ? wait_for_completion+0x15b/0x260 [ 560.744678][ T1656] ? lock_downgrade+0x6d0/0x6d0 [ 560.750910][ T1656] ? do_raw_spin_lock+0x120/0x2b0 [ 560.756013][ T1656] ? rwlock_bug.part.0+0x90/0x90 [ 560.761365][ T1656] ? _raw_spin_unlock_irq+0x1f/0x40 [ 560.766622][ T1656] wait_for_completion+0x163/0x260 [ 560.773015][ T1656] ? __flush_work+0x4f1/0xac0 [ 560.777830][ T1656] ? bit_wait_io_timeout+0x160/0x160 [ 560.783212][ T1656] ? _raw_spin_unlock_irq+0x1f/0x40 [ 560.788419][ T1656] __flush_work+0x51f/0xac0 [ 560.792994][ T1656] ? queue_delayed_work_on+0xe0/0xe0 [ 560.798436][ T1656] ? __flush_work+0x83b/0xac0 [ 560.804595][ T1656] ? flush_workqueue_prep_pwqs+0x510/0x510 [ 560.810558][ T1656] ? try_to_grab_pending+0xbd/0xd0 [ 560.815694][ T1656] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 560.822047][ T1656] __cancel_work_timer+0x3b3/0x520 [ 560.827169][ T1656] ? try_to_grab_pending+0xd0/0xd0 [ 560.832411][ T1656] ? p9_fd_close+0x280/0x520 [ 560.837073][ T1656] ? lock_downgrade+0x6d0/0x6d0 [ 560.842042][ T1656] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 560.847867][ T1656] p9_fd_close+0x305/0x520 [ 560.852373][ T1656] ? p9_client_create+0xa46/0x1110 [ 560.857510][ T1656] p9_client_create+0x95a/0x1110 [ 560.864978][ T1656] ? p9_client_flush+0x430/0x430 [ 560.870139][ T1656] ? lockdep_init_map_waits+0x26a/0x720 [ 560.875703][ T1656] ? __raw_spin_lock_init+0x34/0x100 [ 560.881322][ T1656] v9fs_session_init+0x1dd/0x1770 [ 560.886463][ T1656] ? v9fs_show_options+0x780/0x780 [ 560.891762][ T1656] ? unpoison_range+0x2c/0x50 [ 560.896525][ T1656] v9fs_mount+0x79/0x9c0 [ 560.900864][ T1656] ? v9fs_write_inode+0x60/0x60 [ 560.908967][ T1656] legacy_get_tree+0x105/0x220 [ 560.913964][ T1656] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 560.920372][ T1656] vfs_get_tree+0x89/0x2f0 [ 560.924852][ T1656] path_mount+0x12ae/0x1e70 [ 560.929682][ T1656] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 560.935935][ T1656] ? strncpy_from_user+0x2a0/0x3e0 [ 560.941182][ T1656] ? finish_automount+0xac0/0xac0 [ 560.946214][ T1656] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 560.952582][ T1656] ? getname_flags.part.0+0x1dd/0x4f0 [ 560.958023][ T1656] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 560.964392][ T1656] __x64_sys_mount+0x27f/0x300 [ 560.969165][ T1656] ? copy_mnt_ns+0xae0/0xae0 [ 560.973862][ T1656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 560.981472][ T1656] do_syscall_64+0x2d/0x70 [ 560.985964][ T1656] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 560.992025][ T1656] RIP: 0033:0x45e219 [ 560.995928][ T1656] RSP: 002b:00007f18ed211c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 561.004476][ T1656] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e219 [ 561.014853][ T1656] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 0000000000000000 [ 561.023019][ T1656] RBP: 000000000119c078 R08: 0000000020000580 R09: 0000000000000000 [ 561.031123][ T1656] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119c034 [ 561.039101][ T1656] R13: 00007fff8bd3760f R14: 00007f18ed2129c0 R15: 000000000119c034 [ 561.047190][ T1656] INFO: task syz-executor.4:16023 blocked for more than 143 seconds. [ 561.055355][ T1656] Not tainted 5.11.0-rc3-next-20210112-syzkaller #0 [ 561.062574][ T1656] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 561.071314][ T1656] task:syz-executor.4 state:D stack:27888 pid:16023 ppid: 8495 flags:0x00004004 [ 561.080632][ T1656] Call Trace: [ 561.083912][ T1656] __schedule+0x90c/0x21a0 [ 561.088347][ T1656] ? io_schedule_timeout+0x140/0x140 [ 561.095458][ T1656] schedule+0xcf/0x270 [ 561.099660][ T1656] schedule_timeout+0x1d8/0x250 [ 561.104541][ T1656] ? usleep_range+0x170/0x170 [ 561.109546][ T1656] ? wait_for_completion+0x15b/0x260 [ 561.114860][ T1656] ? lock_downgrade+0x6d0/0x6d0 [ 561.120067][ T1656] ? do_raw_spin_lock+0x120/0x2b0 [ 561.125128][ T1656] ? rwlock_bug.part.0+0x90/0x90 [ 561.130145][ T1656] ? _raw_spin_unlock_irq+0x1f/0x40 [ 561.135360][ T1656] wait_for_completion+0x163/0x260 [ 561.141923][ T1656] ? __flush_work+0x4f1/0xac0 [ 561.146627][ T1656] ? bit_wait_io_timeout+0x160/0x160 [ 561.151996][ T1656] ? _raw_spin_unlock_irq+0x1f/0x40 [ 561.157209][ T1656] __flush_work+0x51f/0xac0 [ 561.161821][ T1656] ? queue_delayed_work_on+0xe0/0xe0 [ 561.167122][ T1656] ? __flush_work+0x83b/0xac0 [ 561.171918][ T1656] ? flush_workqueue_prep_pwqs+0x510/0x510 [ 561.177765][ T1656] ? try_to_grab_pending+0xbd/0xd0 [ 561.182988][ T1656] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 561.189243][ T1656] __cancel_work_timer+0x3b3/0x520 [ 561.194486][ T1656] ? try_to_grab_pending+0xd0/0xd0 [ 561.201305][ T1656] ? p9_fd_close+0x280/0x520 [ 561.205915][ T1656] ? lock_downgrade+0x6d0/0x6d0 [ 561.211047][ T1656] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 561.216877][ T1656] p9_fd_close+0x305/0x520 [ 561.221401][ T1656] ? p9_client_create+0xa46/0x1110 [ 561.226531][ T1656] p9_client_create+0x95a/0x1110 [ 561.231571][ T1656] ? p9_client_flush+0x430/0x430 [ 561.236533][ T1656] ? lockdep_init_map_waits+0x26a/0x720 [ 561.242205][ T1656] ? __raw_spin_lock_init+0x34/0x100 [ 561.247505][ T1656] v9fs_session_init+0x1dd/0x1770 [ 561.253148][ T1656] ? v9fs_show_options+0x780/0x780 [ 561.258299][ T1656] ? unpoison_range+0x2c/0x50 [ 561.263117][ T1656] v9fs_mount+0x79/0x9c0 [ 561.267384][ T1656] ? v9fs_write_inode+0x60/0x60 [ 561.273154][ T1656] legacy_get_tree+0x105/0x220 [ 561.277950][ T1656] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 561.285493][ T1656] vfs_get_tree+0x89/0x2f0 [ 561.290811][ T1656] path_mount+0x12ae/0x1e70 [ 561.295335][ T1656] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 561.301772][ T1656] ? strncpy_from_user+0x2a0/0x3e0 [ 561.306906][ T1656] ? finish_automount+0xac0/0xac0 [ 561.313038][ T1656] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 561.320799][ T1656] ? getname_flags.part.0+0x1dd/0x4f0 [ 561.326197][ T1656] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 561.333645][ T1656] __x64_sys_mount+0x27f/0x300 [ 561.338429][ T1656] ? copy_mnt_ns+0xae0/0xae0 [ 561.344260][ T1656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 561.350906][ T1656] do_syscall_64+0x2d/0x70 [ 561.355345][ T1656] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 561.362023][ T1656] RIP: 0033:0x45e219 [ 561.365943][ T1656] RSP: 002b:00007f18ed211c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 561.375499][ T1656] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e219 [ 561.383714][ T1656] RDX: 0000000020000240 RSI: 0000000020000200 RDI: 0000000000000000 [ 561.392077][ T1656] RBP: 000000000119c078 R08: 0000000020000580 R09: 0000000000000000 [ 561.400248][ T1656] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000119c034 [ 561.408300][ T1656] R13: 00007fff8bd3760f R14: 00007f18ed2129c0 R15: 000000000119c034 [ 561.417319][ T1656] [ 561.417319][ T1656] Showing all locks held in the system: [ 561.425191][ T1656] 1 lock held by khungtaskd/1656: [ 561.430940][ T1656] #0: ffffffff8b373ea0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 561.441868][ T1656] 1 lock held by in:imklog/8172: [ 561.446818][ T1656] #0: ffff88801db6c5f0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 561.456209][ T1656] 2 locks held by kworker/1:8/12557: [ 561.462097][ T1656] #0: ffff888010062d38 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x871/0x15f0 [ 561.472680][ T1656] #1: ffffc90002557da8 ((work_completion)(&m->wq)){+.+.}-{0:0}, at: process_one_work+0x8a5/0x15f0 [ 561.483996][ T1656] [ 561.486336][ T1656] ============================================= [ 561.486336][ T1656] [ 561.496733][ T1656] NMI backtrace for cpu 1 [ 561.501428][ T1656] CPU: 1 PID: 1656 Comm: khungtaskd Not tainted 5.11.0-rc3-next-20210112-syzkaller #0 [ 561.510987][ T1656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.521049][ T1656] Call Trace: [ 561.524331][ T1656] dump_stack+0x107/0x163 [ 561.528816][ T1656] nmi_cpu_backtrace.cold+0x44/0xd7 [ 561.534009][ T1656] ? lapic_can_unplug_cpu+0x80/0x80 [ 561.539285][ T1656] nmi_trigger_cpumask_backtrace+0x1b3/0x230 [ 561.545304][ T1656] watchdog+0xd89/0xf30 [ 561.549454][ T1656] ? trace_sched_process_hang+0x280/0x280 [ 561.555180][ T1656] kthread+0x3b1/0x4a0 [ 561.559274][ T1656] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 561.565171][ T1656] ret_from_fork+0x1f/0x30 [ 561.569698][ T1656] Sending NMI from CPU 1 to CPUs 0: [ 561.575522][ C0] NMI backtrace for cpu 0 [ 561.575531][ C0] CPU: 0 PID: 4893 Comm: systemd-journal Not tainted 5.11.0-rc3-next-20210112-syzkaller #0 [ 561.575542][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.575551][ C0] RIP: 0010:lock_is_held_type+0x25/0x100 [ 561.575561][ C0] Code: 00 00 00 00 00 41 57 41 56 41 89 f6 41 55 41 54 55 48 89 fd 53 48 83 ec 08 e8 f7 cc 5b f8 84 c0 0f 84 b8 00 00 00 9c 8f 04 24 48 c7 c7 20 ac 4b 89 31 db e8 bc 0b 00 00 65 4c 8b 24 25 00 f0 [ 561.575577][ C0] RSP: 0018:ffffc90000effbe8 EFLAGS: 00000002 [ 561.575589][ C0] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 1ffffffff1a084db [ 561.575597][ C0] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: ffff888011c1c18c [ 561.575606][ C0] RBP: ffffffff8b373de0 R08: 0000000000000000 R09: ffffffff8d03f50f [ 561.575614][ C0] R10: fffffbfff1a07ea1 R11: 000000000000003f R12: 0000000000000001 [ 561.575623][ C0] R13: 0000000000000021 R14: 00000000ffffffff R15: dffffc0000000000 [ 561.575632][ C0] FS: 00007f79886b68c0(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 [ 561.575641][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 561.575648][ C0] CR2: 00007f7985bc2000 CR3: 0000000011718000 CR4: 00000000001506f0 [ 561.575657][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 561.575666][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 561.575673][ C0] Call Trace: [ 561.575677][ C0] rcu_read_lock_sched_held+0x3a/0x70 [ 561.575683][ C0] lock_release+0x5b7/0x710 [ 561.575689][ C0] ? debug_check_no_obj_freed+0x20c/0x420 [ 561.575694][ C0] ? lock_downgrade+0x6d0/0x6d0 [ 561.575700][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 561.575706][ C0] ? _raw_spin_lock_irqsave+0x4e/0x50 [ 561.575712][ C0] _raw_spin_unlock_irqrestore+0x16/0x50 [ 561.575718][ C0] debug_check_no_obj_freed+0x20c/0x420 [ 561.575725][ C0] ? slab_free_freelist_hook+0xdd/0x1d0 [ 561.575731][ C0] slab_free_freelist_hook+0x12b/0x1d0 [ 561.575737][ C0] kmem_cache_free+0x8b/0x740 [ 561.575742][ C0] ? security_file_free+0xa4/0xd0 [ 561.575748][ C0] security_file_free+0xa4/0xd0 [ 561.575753][ C0] __fput+0x3d5/0x920 [ 561.575758][ C0] ? _raw_spin_unlock_irq+0x1f/0x40 [ 561.575763][ C0] task_work_run+0xdd/0x190 [ 561.575769][ C0] exit_to_user_mode_prepare+0x249/0x250 [ 561.575775][ C0] syscall_exit_to_user_mode+0x19/0x50 [ 561.575781][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 561.575787][ C0] RIP: 0033:0x7f7987c46840 [ 561.575797][ C0] Code: 73 01 c3 48 8b 0d 68 77 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 bb 20 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 1e f6 ff ff 48 89 04 24 [ 561.575813][ C0] RSP: 002b:00007ffddef44298 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 561.575826][ C0] RAX: fffffffffffffffe RBX: 00007ffddef445a0 RCX: 00007f7987c46840 [ 561.575834][ C0] RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 0000559b87073240 [ 561.575843][ C0] RBP: 000000000000000d R08: 000000000000c0ff R09: 00000000ffffffff [ 561.575852][ C0] R10: 0000000000000069 R11: 0000000000000246 R12: 00000000ffffffff [ 561.575860][ C0] R13: 0000559b87066040 R14: 00007ffddef44560 R15: 0000559b87071f60 [ 561.579387][ T1656] Kernel panic - not syncing: hung_task: blocked tasks [ 561.890352][ T1656] CPU: 1 PID: 1656 Comm: khungtaskd Not tainted 5.11.0-rc3-next-20210112-syzkaller #0 [ 561.899881][ T1656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.910013][ T1656] Call Trace: [ 561.913283][ T1656] dump_stack+0x107/0x163 [ 561.917609][ T1656] panic+0x306/0x73d [ 561.921630][ T1656] ? __warn_printk+0xf3/0xf3 [ 561.926213][ T1656] ? lapic_can_unplug_cpu+0x80/0x80 [ 561.931402][ T1656] ? preempt_schedule_thunk+0x16/0x18 [ 561.936763][ T1656] ? nmi_trigger_cpumask_backtrace+0x196/0x230 [ 561.942911][ T1656] ? watchdog.cold+0x22d/0x248 [ 561.947691][ T1656] watchdog.cold+0x23e/0x248 [ 561.952273][ T1656] ? trace_sched_process_hang+0x280/0x280 [ 561.957982][ T1656] kthread+0x3b1/0x4a0 [ 561.962041][ T1656] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 561.967954][ T1656] ret_from_fork+0x1f/0x30 [ 561.973182][ T1656] Kernel Offset: disabled [ 561.977512][ T1656] Rebooting in 86400 seconds..