[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.50' (ECDSA) to the list of known hosts. 2020/07/28 14:31:34 fuzzer started 2020/07/28 14:31:34 dialing manager at 10.128.0.105:41283 2020/07/28 14:31:34 syscalls: 3084 2020/07/28 14:31:34 code coverage: enabled 2020/07/28 14:31:34 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2020/07/28 14:31:34 extra coverage: extra coverage is not supported by the kernel 2020/07/28 14:31:34 setuid sandbox: enabled 2020/07/28 14:31:34 namespace sandbox: enabled 2020/07/28 14:31:34 Android sandbox: enabled 2020/07/28 14:31:34 fault injection: enabled 2020/07/28 14:31:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/07/28 14:31:34 net packet injection: enabled 2020/07/28 14:31:34 net device setup: enabled 2020/07/28 14:31:34 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/07/28 14:31:34 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/07/28 14:31:34 USB emulation: /dev/raw-gadget does not exist syzkaller login: [ 35.990286] random: crng init done [ 35.993938] random: 7 urandom warning(s) missed due to ratelimiting 14:33:48 executing program 2: ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000080)={0x980000, 0x0, 0x4c83, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9c0904, 0xfffffd94, [], @string=&(0x7f0000000000)=0xf9}}) r1 = getpgrp(0xffffffffffffffff) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x8001, 0x8, 0x2, 0x5, 0x0, r1}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140)=0x8, 0x4) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000180), 0x2, &(0x7f0000000200)) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x42000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f00000004c0)={'tunl0\x00', &(0x7f0000000440)={'ip_vti0\x00', r3, 0x8, 0x20, 0xffff, 0x8, {{0xc, 0x4, 0x3, 0x3, 0x30, 0x66, 0x0, 0x0, 0x2f, 0x0, @rand_addr=0x64010102, @private=0xa010100, {[@timestamp_prespec={0x44, 0x14, 0x4d, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0xb}, 0x80}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x51a3}]}, @lsrr={0x83, 0x7, 0xe1, [@local]}]}}}}}) r4 = accept4(0xffffffffffffffff, &(0x7f0000000500)=@generic, &(0x7f0000000580)=0x80, 0x40400) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f00000005c0)=0x3, 0x4) r5 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8982, &(0x7f0000000600)={0x7, 'veth0_to_batadv\x00', {0x8}, 0x8}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000640)='/dev/bsg\x00', 0x80602, 0x0) write$FUSE_STATFS(r6, &(0x7f0000000680)={0x60, 0x0, 0x7, {{0x3, 0x3, 0x3f, 0x101, 0x4, 0x80000000, 0x101, 0x9}}}, 0x60) dup3(0xffffffffffffffff, r2, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e24, 0x80, @remote, 0xbd}}, 0x6, 0x7ff}, &(0x7f00000007c0)=0x90) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000800)=@sack_info={r7, 0xfffff478, 0x4053}, 0xc) close(r5) r8 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000840)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000880)=0x1c, 0x800) getsockopt$inet_sctp6_SCTP_INITMSG(r8, 0x84, 0x2, &(0x7f00000008c0), &(0x7f0000000900)=0x8) 14:33:48 executing program 1: syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x4, 0x80) r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) fsync(r0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x20) write$midi(0xffffffffffffffff, &(0x7f00000000c0)="1a1a0b2b4b05cd0ff8297773d7d2322fca9633af50117553ec7477d5c1093f237dc19b6a5ebca2e1f5473d2d64c0b18c085d53609c1ebf6abd4b982180327ccf9f8e45298cee330c052af9ed99d2b621c37008170ca9b0ce90547a6f8dd392bdb16a0c81bdf1db293ccc22e1c50173e22427599691c0e19f6ef78fbd7b1749c028d6522fcdd4755f691320ca13ea0d2a79f6568faa85ca4715af503f9414bdf24b1ba17d8dc1ca4062cdce250ae26bd6af852f9e52", 0xb5) r2 = open(&(0x7f0000000180)='./file0\x00', 0x14100, 0x60) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$SIOCPNGETOBJECT(r3, 0x89e0, &(0x7f0000000200)=0x6) dup2(r3, r1) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000002c0)={0xa0, 0x19, 0x2, {0x900, {0x1, 0x0, 0x3}, 0x40, 0xffffffffffffffff, r4, 0x1, 0x0, 0x0, 0x10000, 0x3, 0x5, 0x5, 0xfffffffffffffffa, 0xfffffffffffffffe, 0x8, 0x42, 0xffffffff, 0x401, 0x4, 0x10001}}, 0xa0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/sequencer\x00', 0x400080, 0x0) ioctl$SIOCPNDELRESOURCE(r5, 0x89ef, &(0x7f0000000b80)=0x1) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f0000000bc0)={0x7c, 0x0, 0xbfc, 0x7, 0x1d, 0xfffffffffffffffd}) r6 = dup(0xffffffffffffffff) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000c00)=0x2) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/self/net/pfkey\x00', 0x90000, 0x0) read$char_raw(r7, &(0x7f0000000e00)={""/47554}, 0xba00) r8 = syz_open_dev$mouse(&(0x7f0000000c80)='/dev/input/mouse#\x00', 0x6, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r8, 0xc0845657, &(0x7f0000000cc0)={0x0, @reserved}) 14:33:48 executing program 3: ioctl$RFKILL_IOCTL_NOINPUT(0xffffffffffffffff, 0x5201) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000000)={0x11, 0xc, 0x0, 0x9, 0x0, [@private2={0xfc, 0x2, [], 0x1}, @dev={0xfe, 0x80, [], 0x42}, @mcast2, @loopback, @mcast1, @local]}, 0x68) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x4, 0x2, 0x2, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9b0953, 0x7f, [], @p_u32=&(0x7f0000000080)=0x70e1}}) ioctl$mixer_OSS_ALSAEMULVER(r1, 0x80044df9, &(0x7f0000000140)) r2 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0xffff, 0x1) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f00000001c0)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x40840, 0x0) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000240)={0x18, 0x0, {0x3, @dev={[], 0x29}, 'bridge0\x00'}}) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x2, 0x8, 0x201, 0x0, 0x0, {0xc, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x9e35cc8ae8b3b590}, 0x1) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x181400, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x36, &(0x7f0000000400)={0x4d, 0x2, [], [@hao={0xc9, 0x10, @remote}]}, 0x20) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x103, 0x0) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000480)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000005c0)=0x6, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000600)={{0x0, 0x0, @reserved="466e8a8067e818a76416f88373a6e6bcc6b8de3eb70cf5cc2fb88cb1a223d038"}}) sendfile(r0, r2, &(0x7f0000000640)=0x1, 0x1) r7 = pkey_alloc(0x0, 0x3) pkey_free(r7) 14:33:48 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x6e2e, 0x7fffffff, 0x100}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @broadcast}, 0x3541b8726a13e730, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)='vcan0\x00', 0x0, 0x2}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x400002, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x501200, 0x51) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U-', 0x5}, 0x16, 0x2) ioctl$SNDCTL_DSP_GETBLKSIZE(0xffffffffffffffff, 0xc0045004, &(0x7f0000000280)) r3 = socket$isdn(0x22, 0x3, 0x22) r4 = getpgrp(0x0) fcntl$setownex(r3, 0xf, &(0x7f00000002c0)={0x2, r4}) r5 = accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x80000) shutdown(r5, 0x1) r6 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x24000, 0x8) ioctl$VIDIOC_ENCODER_CMD(r6, 0xc028564d, &(0x7f0000000380)={0x1, 0x0, [0x8, 0x6872, 0xc, 0x1c, 0x1ff, 0x1, 0x4, 0x80000001]}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f00000003c0)) mmap$perf(&(0x7f0000ff2000/0xb000)=nil, 0xb000, 0x2000008, 0x810, r0, 0x7f) openat$cgroup_int(r0, &(0x7f0000000400)='cpuset.sched_load_balance\x00', 0x2, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x100, 0x600041) r8 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x7, 0x0, 0x100, 0x9, 'syz0\x00', 0x2}, 0x3, 0x10, 0x2, r8, 0x5, 0x9, 'syz0\x00', &(0x7f0000000480)=['\x00', ']O\x91\\[\x00', 'trusted.overlay.nlink\x00', 'trusted.overlay.nlink\x00', 'cpuset.sched_load_balance\x00'], 0x4d, [], [0x81, 0x7, 0xaead, 0x8]}) 14:33:48 executing program 0: socket$rxrpc(0x21, 0x2, 0xa) r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r0, 0x20, 0x70bd2a, 0xfffffffa, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private2}]}, 0x28}}, 0x11) r1 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000140)={@rand_addr=0x64010100, @rand_addr=0x64010102}, 0x8) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x30a) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x240, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, 0x1402, 0x400, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x48080}, 0x8000) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000380)={r4, 0x4}) setxattr$trusted_overlay_redirect(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = socket$l2tp6(0xa, 0x2, 0x73) getpeername(r5, &(0x7f0000000480)=@qipcrtr, &(0x7f0000000500)=0x80) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e23, @local}}, 0x2, 0x400, 0x1, 0xc504, 0x4, 0x3, 0x2}, &(0x7f0000000600)=0x9c) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000640)={r6, @in6={{0xa, 0x4e24, 0x10001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}, [0x9, 0x3, 0x9, 0xffff, 0x3a07, 0x1, 0xebd, 0x7f, 0x7, 0x75, 0x4, 0x9, 0x0, 0x6, 0x80000000000000]}, &(0x7f0000000740)=0x100) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vcs\x00', 0x6c0480, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(r7, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x40000002}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x54, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @private=0xa010100}}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, '\xf3(\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x10) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000940)={0x448, 0x3f3, 0x400, 0x70bd26, 0x25dfdbfc, {0x5, 0x855fe4a15c32a4a7, 0x5, [0x16, 0x7, 0x7, 0x1, 0x1, 0x7, 0x7, 0x0, 0x5, 0x327, 0x48, 0x5, 0x7, 0xfff, 0xfff, 0x0, 0x10000, 0x160, 0x4, 0x3, 0x9, 0x5, 0x5, 0x5, 0x9, 0x8, 0x417f, 0x92f, 0x0, 0x3, 0x505, 0x7, 0x8, 0x200, 0x7ff, 0x3, 0x800, 0xd757, 0x8, 0xfffffff9, 0x9, 0x80000001, 0xfffffffd, 0xffff, 0x2, 0x2, 0xffff16b0, 0xffff8001, 0x8, 0x200, 0x5, 0x2, 0x7, 0x1, 0x2, 0x538b, 0x3, 0x5, 0x4, 0x16, 0x3, 0x6, 0x6e, 0x9], [0x3, 0x8, 0x0, 0x1, 0xd8, 0x2, 0xfffffffb, 0x6b, 0x7ff, 0x52c, 0x8, 0x10001, 0x0, 0x0, 0x9, 0x4, 0x24, 0xf9fb, 0x7, 0x9230, 0x9, 0x3, 0x5, 0x101, 0x5, 0x43017eee, 0x9, 0x1, 0x9, 0x8, 0x0, 0x3, 0x401, 0x0, 0xffffff90, 0x10001, 0x81, 0xc065, 0x5, 0x20, 0x3, 0x2, 0x8001, 0x3ff, 0x8, 0x20, 0xada5, 0xffffff01, 0x538c, 0x5, 0xfff0, 0x3, 0x5897, 0x7, 0xffff, 0x4, 0x6, 0x9, 0x5, 0xff, 0x6, 0x200, 0x865a, 0x5], [0x100, 0x5, 0x4, 0x6, 0xffffffff, 0x1, 0x9150cb7, 0x0, 0x4, 0x7, 0x4, 0x84b5, 0x9b6, 0x3, 0x3, 0x7, 0x7, 0xfff, 0x1, 0x1000, 0x9, 0xfffffff7, 0x401d, 0x3, 0x6, 0x23, 0x9872fd96, 0x800, 0x1000, 0x6c, 0x14e8, 0x9, 0xffffffff, 0x400, 0xfffffff8, 0x1, 0x3f, 0x39, 0x3, 0x8000, 0x3, 0x457, 0xffffffff, 0xc9, 0x6, 0x80000000, 0x7ff, 0xfffffff1, 0x7, 0x4cef, 0x1, 0x7fff, 0x2, 0x5, 0x7, 0x1, 0x3, 0xffffffff, 0x3, 0xfffff800, 0x9, 0x7fff, 0xf2d], [0x3, 0x6, 0x3, 0x40, 0x1, 0x4, 0x6, 0x2, 0x2, 0x990, 0x4, 0xe6e8, 0x5, 0x543, 0x9, 0x3a63, 0x4, 0x5, 0x40, 0x639, 0x9d, 0x1, 0x2, 0x7, 0x337, 0x81, 0x2, 0x8, 0x5, 0x5, 0xff, 0x800, 0x2, 0x6, 0x81, 0x5, 0x83, 0x6, 0x1, 0x2, 0x2, 0x1, 0x7fffffff, 0x4, 0x7fff, 0x800, 0x1, 0x6, 0x7f, 0xf39b4fb, 0xfffffffb, 0x5, 0x7, 0x80, 0x7ff, 0x1000000, 0x80, 0x3, 0x9, 0x6, 0xaaae, 0x8000, 0x1a4, 0x5], 0x27, ['/dev/dlm-control\x00', '/$:\'!/\x00', '$\x00', 'fou\x00', '}^@{)%\x00', '$\x00']}, ["", "", "", "", ""]}, 0x448}, 0x1, 0x0, 0x0, 0x4080}, 0x4000050) 14:33:48 executing program 4: [ 168.482617] audit: type=1400 audit(1595946828.323:8): avc: denied { execmem } for pid=6375 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 168.813070] IPVS: ftp: loaded support on port[0] = 21 [ 169.587283] IPVS: ftp: loaded support on port[0] = 21 [ 169.665558] chnl_net:caif_netlink_parms(): no params data found [ 169.742912] IPVS: ftp: loaded support on port[0] = 21 [ 169.756431] chnl_net:caif_netlink_parms(): no params data found [ 169.834085] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.840674] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.849506] device bridge_slave_0 entered promiscuous mode [ 169.875936] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.882451] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.889447] device bridge_slave_1 entered promiscuous mode [ 169.905591] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.912020] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.918901] device bridge_slave_0 entered promiscuous mode [ 169.931415] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.938419] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.946284] device bridge_slave_1 entered promiscuous mode [ 169.976013] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 169.993458] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.006372] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 170.025516] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 170.051087] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 170.059916] team0: Port device team_slave_0 added [ 170.069636] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 170.077821] team0: Port device team_slave_1 added [ 170.095692] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 170.103439] team0: Port device team_slave_0 added [ 170.116044] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 170.123697] team0: Port device team_slave_1 added [ 170.139014] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 170.147704] IPVS: ftp: loaded support on port[0] = 21 [ 170.151495] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 170.179667] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 170.204160] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 170.210439] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 170.242133] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 170.266964] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 170.275583] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 170.282551] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 170.308124] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 170.327493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 170.335431] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 170.342886] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 170.368374] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 170.426531] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 170.463533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 170.514119] device hsr_slave_0 entered promiscuous mode [ 170.561806] device hsr_slave_1 entered promiscuous mode [ 170.615294] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 170.637275] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 170.649884] chnl_net:caif_netlink_parms(): no params data found [ 170.695550] device hsr_slave_0 entered promiscuous mode [ 170.741748] device hsr_slave_1 entered promiscuous mode [ 170.809662] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 170.811040] IPVS: ftp: loaded support on port[0] = 21 [ 170.844658] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 171.040866] IPVS: ftp: loaded support on port[0] = 21 [ 171.159672] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.166331] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.174341] device bridge_slave_0 entered promiscuous mode [ 171.185431] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.193881] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.201729] device bridge_slave_1 entered promiscuous mode [ 171.208163] chnl_net:caif_netlink_parms(): no params data found [ 171.271405] chnl_net:caif_netlink_parms(): no params data found [ 171.338893] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 171.349030] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 171.396189] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 171.421637] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 171.428290] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 171.436090] team0: Port device team_slave_0 added [ 171.465230] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 171.472492] team0: Port device team_slave_1 added [ 171.557961] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 171.567614] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.595449] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 171.646365] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 171.652911] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.678315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 171.706860] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 171.715365] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 171.725543] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.732580] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.739787] device bridge_slave_0 entered promiscuous mode [ 171.748606] chnl_net:caif_netlink_parms(): no params data found [ 171.783281] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.789796] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.798119] device bridge_slave_1 entered promiscuous mode [ 171.876101] device hsr_slave_0 entered promiscuous mode [ 171.941650] device hsr_slave_1 entered promiscuous mode [ 171.982083] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 171.989196] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 172.023519] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.030054] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.037904] device bridge_slave_0 entered promiscuous mode [ 172.063991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.070246] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.078718] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.086938] device bridge_slave_1 entered promiscuous mode [ 172.120197] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.143284] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.150926] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.161163] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 172.169456] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.185041] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 172.197173] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.255735] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 172.265598] team0: Port device team_slave_0 added [ 172.271870] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 172.279075] team0: Port device team_slave_1 added [ 172.289994] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 172.297853] team0: Port device team_slave_0 added [ 172.313396] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 172.320431] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 172.344290] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 172.352869] team0: Port device team_slave_1 added [ 172.358883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.368328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.376166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.383309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.390425] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.398174] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.406479] device bridge_slave_0 entered promiscuous mode [ 172.417047] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 172.424476] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.453486] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 172.459583] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.466836] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.474236] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.481847] device bridge_slave_1 entered promiscuous mode [ 172.497314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 172.503963] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.530567] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 172.543400] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 172.549645] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.576088] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 172.602162] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 172.608424] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.635300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 172.653706] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 172.663878] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 172.677909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 172.686017] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 172.693065] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.719021] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 172.730257] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 172.746174] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 172.755252] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 172.775697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.783623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.791658] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.798145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.805511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.814386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.822183] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.828544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.837932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 172.845851] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 172.886047] device hsr_slave_0 entered promiscuous mode [ 172.931811] device hsr_slave_1 entered promiscuous mode [ 172.979480] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 172.987179] team0: Port device team_slave_0 added [ 172.996084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.003474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.010929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.018983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.027153] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.033573] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.042159] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 173.051617] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 173.060398] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 173.068349] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 173.076212] team0: Port device team_slave_1 added [ 173.105752] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 173.120803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.130432] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.138174] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.144612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.153570] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 173.170761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.224821] device hsr_slave_0 entered promiscuous mode [ 173.261567] device hsr_slave_1 entered promiscuous mode [ 173.302703] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 173.309324] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 173.317848] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 173.325043] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 173.350918] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 173.363279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 173.373427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 173.382634] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 173.407411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.416017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.424954] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 173.431336] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 173.456908] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 173.474366] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 173.484171] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 173.491711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.499685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.515194] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.535066] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 173.544829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 173.583714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.645842] device hsr_slave_0 entered promiscuous mode [ 173.681672] device hsr_slave_1 entered promiscuous mode [ 173.722590] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 173.729693] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 173.754056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.762759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.775798] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 173.795478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 173.846205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.855030] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.865454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 173.882541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 173.912404] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 173.918755] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.926289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.935131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.942868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.950614] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.965120] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 173.980161] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 174.003894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.012679] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.020208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.029412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.041500] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 174.056134] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 174.062625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.077101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.085010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.097822] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 174.105364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.135082] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.145421] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 174.156275] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 174.196979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.205715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.217771] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 174.224646] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.242921] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 174.256120] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 174.266074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.274277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.282335] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.288695] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.296684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.305812] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 174.316391] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 174.331144] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 174.341731] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 174.348505] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 174.357612] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 174.370413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 174.387641] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.397128] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 174.414997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.424447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.433534] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.439871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.447286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.455774] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 174.462644] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 174.472787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 174.487411] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.495467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.511089] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 174.524640] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 174.536794] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 174.545641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.556433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.573818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.588425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 174.608572] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.616350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.624257] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.633330] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 174.654670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 174.666500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.675786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.684792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.696239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.716984] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 174.723367] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.738082] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 174.747173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.759570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.768800] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.775243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.783344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.794454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 174.804037] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 174.815464] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 174.823844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.846194] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 174.854044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.863207] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.872479] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 174.879690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.890538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.898536] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.904947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.919442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.929614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.942411] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 174.950450] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 174.961839] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 174.968911] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 174.975731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 174.984072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 174.992445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.005027] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 175.015259] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 175.026881] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 175.035034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.046163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.054078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.063460] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 175.076166] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 175.091674] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 175.097777] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.105147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.114836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.122005] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 175.128726] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 175.137987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 175.147331] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 175.153814] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.161131] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 175.173124] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 175.184663] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 175.202170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.210866] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.223641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 175.233589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.241897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.249737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.257960] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.264434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.274335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 175.285164] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 175.298977] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 175.308028] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 175.315597] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 175.324120] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.332305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.339465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.347588] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.355742] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.364433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.372185] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.378541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.387561] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.402673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 175.417103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 175.429019] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 175.446072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.454675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.462702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.470296] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.476707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.484544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.493289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.500897] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.507289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.514566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.522283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.531434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 175.540642] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 175.552117] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 175.561806] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 175.572121] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 175.582307] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 175.590261] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 175.598127] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 175.605691] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 175.612503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.620266] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.628417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 175.636204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.644028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 175.652096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.659856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.668173] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.680138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 175.697728] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 175.707769] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 175.716400] device veth0_vlan entered promiscuous mode [ 175.724262] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.735753] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.743254] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.751095] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.761033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.769346] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 175.777449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 175.785671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.793681] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.802974] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.810080] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.817848] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.828110] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 175.837112] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 175.847143] device veth0_vlan entered promiscuous mode [ 175.858552] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 175.864971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.874694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.884684] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.892635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.900261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.910640] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 175.924365] device veth1_vlan entered promiscuous mode [ 175.930503] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 175.944521] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 175.954985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.965049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.975718] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 175.984700] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 175.994909] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 176.006754] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 176.014921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.023988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.032791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.040556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.048725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.057531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.066005] device veth1_vlan entered promiscuous mode [ 176.072351] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 176.081670] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 176.087737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.104957] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 176.113566] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 176.124775] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 176.132963] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 176.140916] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 176.150149] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 176.156486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.165821] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 176.174153] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 176.181641] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 176.188852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 176.196896] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 176.205518] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 176.220775] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 176.230260] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 176.241510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 176.249575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.258916] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 176.266281] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 176.276961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.290840] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 176.308812] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.328310] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 176.341548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.349350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.360765] device veth0_macvtap entered promiscuous mode [ 176.368802] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 176.378819] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 176.389305] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 176.397495] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 176.405686] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 176.452477] device veth1_macvtap entered promiscuous mode [ 176.458866] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 176.470160] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 176.481929] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 176.490799] device veth0_vlan entered promiscuous mode [ 176.502063] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 176.509328] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.518099] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 176.525562] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 176.533592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.540964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.549206] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.556320] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.566771] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 176.586370] device veth1_vlan entered promiscuous mode [ 176.593550] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 176.602779] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 176.618471] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 176.626067] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.633882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.653835] device veth0_macvtap entered promiscuous mode [ 176.660161] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 176.670469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 176.681507] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.690755] device veth1_macvtap entered promiscuous mode [ 176.702456] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 176.715638] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 176.728245] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 176.738162] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 176.749019] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 176.757201] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 176.769389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.776610] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.784512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.794336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 176.814469] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 176.827257] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 176.838017] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 176.848405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 176.856657] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.867126] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.889121] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 176.898970] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 176.909649] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 176.920609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 176.932346] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 176.939344] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 176.948916] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 176.960420] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 176.969380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 176.977671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.985743] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.993797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.002134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.009779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.020484] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 177.032997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.043740] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.067181] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 177.074992] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 177.084170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 177.093335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.101162] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.109116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.124395] device veth0_macvtap entered promiscuous mode [ 177.130855] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 177.168738] device veth1_macvtap entered promiscuous mode [ 177.188653] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 177.197056] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 177.205083] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.214648] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 177.221869] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 177.228351] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 177.239295] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 177.258014] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 177.273279] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 177.280356] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 177.290901] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 177.297375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 177.305550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.313389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.320399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.332111] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 177.345555] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 177.360672] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 177.372143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 177.372602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.390698] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 177.401057] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.410650] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 177.420846] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.430913] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 177.438433] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 177.446142] device veth0_vlan entered promiscuous mode [ 177.453530] device veth0_vlan entered promiscuous mode [ 177.459378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.467120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.475351] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.483863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.494423] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 177.511123] device veth1_vlan entered promiscuous mode [ 177.517915] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 177.527259] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 177.540000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 177.548971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.557756] device veth1_vlan entered promiscuous mode [ 177.571801] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 177.585665] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.595920] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.608885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 177.618707] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 177.629180] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 177.636279] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 177.644671] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 177.659671] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 177.676343] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 177.684703] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.694815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.710547] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 177.726596] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 177.744270] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 177.760566] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 177.776917] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 177.784902] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 177.794250] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 177.809000] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 177.823845] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 177.839390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.853985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.863121] QAT: Invalid ioctl [ 177.867210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.876407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.887755] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 177.897516] device veth0_macvtap entered promiscuous mode [ 177.904445] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 177.914261] device veth1_macvtap entered promiscuous mode [ 177.920782] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 177.920960] QAT: Invalid ioctl [ 177.931310] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 177.942087] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.949703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 177.959712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.968878] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 14:33:57 executing program 2: [ 177.976452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.984719] device veth0_macvtap entered promiscuous mode [ 177.990993] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 178.001614] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 178.010649] device veth0_vlan entered promiscuous mode [ 178.026058] device veth1_vlan entered promiscuous mode [ 178.049572] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 178.077246] device veth1_macvtap entered promiscuous mode [ 178.088636] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready 14:33:57 executing program 2: 14:33:57 executing program 2: [ 178.100435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 178.118203] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 178.133776] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready 14:33:58 executing program 2: [ 178.150931] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.179203] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.189290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 14:33:58 executing program 2: 14:33:58 executing program 2: [ 178.210794] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.228494] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.238341] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.250144] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 178.259855] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 178.272952] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 178.280368] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 14:33:58 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000001380)=[{&(0x7f0000001100)="d2", 0x123}], 0x1000000000000158) recvmmsg(r0, &(0x7f0000000300), 0x40000000000049e, 0x1000000000fe, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 14:33:58 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0xab9535e9a6578fc1, 0x0, 0x0, {0x32, 0x0, 0x6000}}, 0x1c}}, 0x0) [ 178.319114] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 178.339013] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 178.365339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 178.380381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 178.422302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 178.443528] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.467803] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 178.484251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.497774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 178.508299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.525350] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 178.535478] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 178.546102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 178.557049] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 178.570941] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 178.594539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 178.611949] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.630576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.644404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.654895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.668530] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.678986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.693538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.704750] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.719081] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 178.728420] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 178.743652] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 178.750834] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 178.774278] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 178.786796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 178.820862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 178.838944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.849720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 178.865998] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.875885] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 178.890886] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.900808] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 178.915404] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.927050] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 178.943344] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 178.955090] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 178.969054] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 178.978883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 178.993847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 179.009220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.029116] device veth0_macvtap entered promiscuous mode [ 179.036874] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 179.078055] device veth1_macvtap entered promiscuous mode [ 179.093102] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 179.113889] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 179.136535] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 179.149355] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.161116] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.178023] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.194992] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.204594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.214612] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.223821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.233969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.243849] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.253824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.264533] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 179.272105] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 179.282273] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 179.289594] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 179.307346] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 179.331995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.342519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.353314] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.363378] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.373756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.384080] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.397694] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.408736] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.422663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.433955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.446131] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.458752] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 179.467914] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 179.499209] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.508066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.286489] NOHZ: local_softirq_pending 08 14:34:00 executing program 3: 14:34:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x101182) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r1, r0, 0x0, 0x200000024002e00) 14:34:00 executing program 5: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x0) r1 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/158, 0x9e}], 0x1, 0x0, 0x0) tkill(r1, 0x800000015) 14:34:00 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0f85403, &(0x7f0000000180)={{0x1}}) 14:34:00 executing program 4: timerfd_create(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000180)=ANY=[], 0x18) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) syz_genetlink_get_family_id$batadv(0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) 14:34:00 executing program 3: 14:34:00 executing program 1: 14:34:00 executing program 3: 14:34:00 executing program 5: 14:34:01 executing program 0: 14:34:03 executing program 2: 14:34:03 executing program 1: 14:34:03 executing program 5: 14:34:03 executing program 3: 14:34:03 executing program 0: 14:34:03 executing program 4: 14:34:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)="eb3c906d6b66732e666174000210010002000270fff8dd", 0x17}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000300)=""/174) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "5bd8c3d2556a7d8b6f2072b601c31474"}, 0x11, 0x1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x1f, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000001940)=ANY=[@ANYBLOB="d0850000", @ANYRES16=0x0, @ANYBLOB="10012dbd70bc01005e1719c212266c3f756d10b4263d4f0abc2046022cf40f15ca25377c904a440c0060610b56397a74219b0523ac4a678bd1220926", @ANYRES32=0x0, @ANYBLOB="3002028038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300030000000800040004000100400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000600000008000600", @ANYRES16, @ANYRESDEC, @ANYRES16=r1, @ANYBLOB="4c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e67000000003c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000500000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000800000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000110004006163746976656261636b75700000000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400080000", @ANYRES32=0x0, @ANYBLOB="c40002804000010024000173685f746f5f706f7c745f6d617070696e67000000000000050003000300003c1e5b57d2", @ANYRES32=0x0, @ANYBLOB="080007000000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e0000000800040081000000", @ANYRES64, @ANYBLOB="08000100433ffdf4000000bc36b7659351eb04e0c56af84531f8d8d0d89ff11793c9ecc168ffb97c99ad719da07a1a8bf7f92433d008cb7299b2ddbd0f9456ff3074b91c7df678f461bc3fc6a0aa90374872ff529d49b411d4e7b79500aa03e37db66033da46623028aa1fa5c733277c148d59dee321bd67c228142666bd4b2c2e1cb2544fed6532de51e28511a6ec8564736135c2d472ed6e3983e4bcd379bcb14941136da29a06299d9fa95c209fab592364e0d9a8f9bb0fd32248e74ee7d49bebfaf39582fa2be2d8e652a3c07913d76f0c17525e", @ANYRESOCT=r0, @ANYBLOB="400002803c000102000001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400028fd076543b8caef868617350ae4389602d01b67570444a567b38ec3873474ee7c4ce439a62d7a0dbb0aba3c76848216a875459dea7c4d90f86fd85becf30b1ec7c5e01a3d5181e25dc3ddfed977239e3af57600975635c43a7eb6299cf1f007b197854bef16adaca1adf59c91c45e87f972e82eda9a1b0f295d7df82874f641bfe7b3e7c2e9f5d95857d19d6e90b1494f50f03e49e399b0824243ceaa3abfff64ba8a6ea683b88b2e975115657b2a033bb1abeb8a9d4", @ANYRES32=0x0, @ANYRES32=r1, @ANYRESHEX=r2, @ANYBLOB="38000300240001006e6f746966795f70656572335f696e74657276616c0000000000000000000040050003000300000008000400000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f740500795f70656572735f696e74657276616c0000000000000000730000050003000300000008000400450e000038000100240001006d636173745f7265ea6f696e5f636f756e7400000000000000000000000000000500030003000000080004000000000008000100", @ANYRES32, @ANYBLOB="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"], 0x5d0}, 0x1, 0x0, 0x0, 0x40004}, 0x34000044) chdir(&(0x7f0000000140)='./file0\x00') prctl$PR_GET_SECUREBITS(0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) rmdir(&(0x7f0000000100)='./file0\x00') ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000280)={@mcast1, 0x64}) socket$inet_icmp_raw(0x2, 0x3, 0x1) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)=""/4096) pipe(&(0x7f0000000040)={0xffffffffffffffff}) read$alg(r3, 0x0, 0x0) unlinkat(r3, 0x0, 0x0) 14:34:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0) perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 14:34:03 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 14:34:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', 0x0, 0xfffffffffffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)="eb3c906d6b66732e666174000210010002000270fff8dd", 0x17}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, &(0x7f0000000300)=""/174) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "5bd8c3d2556a7d8b6f2072b601c31474"}, 0x11, 0x1) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x1f, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003000)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000001940)=ANY=[@ANYBLOB="d0850000", @ANYRES16=0x0, @ANYBLOB="10012dbd70bc01005e1719c212266c3f756d10b4263d4f0abc2046022cf40f15ca25377c904a440c0060610b56397a74219b0523ac4a678bd1220926", @ANYRESOCT, @ANYBLOB="3002028038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000005000300030000000800040004000100400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000600000008000600", @ANYRES16, @ANYRESDEC, @ANYRES16=r1, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="c40002804000010024000173685f746f5f706f7c745f6d617070696e67000000000000050003000300003c1e5b57d2", @ANYRES32=0x0, @ANYBLOB="080007000000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e0000000800040081000000", @ANYRES64, @ANYBLOB="08000100433ffdf4000000bc36b7659351eb04e0c56af84531f8d8d0d89ff11793c9ecc168ffb97c99ad719da07a1a8bf7f92433d008cb7299b2ddbd0f9456ff3074b91c7df678f461bc3fc6a0aa90374872ff529d49b411d4e7b79500aa03e37db66033da46623028aa1fa5c733277c148d59dee321bd67c228142666bd4b2c2e1cb2544fed6532de51e28511a6ec8564736135c2d472ed6e3983e4bcd379bcb14941136da29a06299d9fa95c209fab592364e0d9a8f9bb0fd32248e74ee7d49bebfaf39582fa2be2d8e652a3c07913d76f0c17525e", @ANYRESOCT=r0, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYRES32=r1, @ANYRESHEX=r2, @ANYBLOB="38000300240001006e6f746966795f70656572335f696e74657276616c0000000000000000000040050003000300000008000400000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38001b00240001006e6f740500795f70656572735f696e74657276616c0000000000000000730000050003000300000008000400452e000038000100240001006d636173745f7265ea6f696e5f636f756e7400000000000000000000000000000500030003000000080004000000000008000100e8b4f3a0d0968e0e6d4fd729414aa847f2a6da83b64df5d7258204914c677aff0c9421f9e97d54f293a45be9fcfa8a20d30044aaf219a3d083b8cf5f91b4267c7ad22710fffc727808dabf482aaad83ed144ba0eda2aa8b9c21ac9081fc0628cdae394fc768418746734fa258f2447d30992932a84c2cc9bec17864794e72df802a4529cf9a6a2846469d9cc65866726d76260957246a3858140379331b6562b12f27e011a4d802f40886f2db42f3c73494619eb5e013a949c3e7765ceedfa759d9d0eebd9d4306bd462defd4439a5a08694f34543243bf075f29715b6688f4caba56e11bc0701e56866e9ec7ea9d86175a236b27312c288f368124c003380fa6d7d02ed7e008c57fbf78062373949ad5c", @ANYRES32, @ANYBLOB="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"], 0x5d0}, 0x1, 0x0, 0x0, 0x40004}, 0x34000044) chdir(&(0x7f0000000140)='./file0\x00') prctl$PR_GET_SECUREBITS(0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) rmdir(&(0x7f0000000100)='./file0\x00') statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)=""/4096) pipe(&(0x7f0000000040)={0xffffffffffffffff}) unlinkat(r3, 0x0, 0x0) 14:34:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e00000027f00ff020000000002000000ac"], 0x34) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000100)={@multicast2, @loopback}, 0xc) 14:34:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) [ 183.928750] hrtimer: interrupt took 40362 ns 14:34:03 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0xfb13, 0x0, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e00000027f00ff020000000002000000ac"], 0x34) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000100)={@multicast2, @loopback}, 0xc) 14:34:03 executing program 3: accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100), 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, &(0x7f0000000500)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x24, r1, 0xc15, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 14:34:03 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:04 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:04 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0xfe13, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x3}, 0x40) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x1, r0}, 0x38) 14:34:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0) perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 14:34:05 executing program 4: prlimit64(0x0, 0x7, &(0x7f0000000280)={0x9, 0x8d}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000180)) socket(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) 14:34:05 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/wireless\x00') futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000000f40)=[{&(0x7f00000013c0), 0x2}, {&(0x7f0000000180)}, {0x0, 0x2}, {&(0x7f0000000200)=0x1}, {0x0, 0x1}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=0x1, 0x1}, {&(0x7f0000000300), 0x1}, {&(0x7f0000000340)}, {0x0, 0x2}, {&(0x7f0000000400)=0x2}, {&(0x7f0000001340)=0x2}, {&(0x7f0000000480)}, {0x0}, {&(0x7f0000000540), 0xfffffffd}, {&(0x7f0000000580)=0x2}, {&(0x7f00000005c0)}, {0x0}, {&(0x7f0000000640), 0x2}, {&(0x7f0000000680)}, {&(0x7f00000006c0), 0x2}, {&(0x7f0000000740)=0xffffffff, 0x1}, {&(0x7f0000000780)=0x2}, {&(0x7f0000000880)=0x1, 0x2}, {0x0}, {&(0x7f0000000900)=0x2, 0x1}, {&(0x7f0000000940)=0x2}, {&(0x7f0000000980)=0x2}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=0x2}, {0x0}, {&(0x7f0000000b40)=0x2, 0x1}, {0x0, 0x2}, {&(0x7f0000000bc0)=0x2}, {&(0x7f0000001380)}, {0x0}, {&(0x7f0000000d40)=0x1}, {&(0x7f0000000dc0)=0x2, 0x2}, {&(0x7f0000000e00)=0x1}, {0x0, 0x2}, {0x0}, {&(0x7f0000000f00)}], 0xd, 0x2a, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x32}, @mcast1, @empty, 0x0, 0x0, 0x480, 0x400, 0x1576, 0x2020007}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0x320f) syz_genetlink_get_family_id$netlbl_calipso(0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 14:34:05 executing program 5: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 14:34:05 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:05 executing program 0: r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xbd00) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[], 0xfa38) 14:34:05 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x38}}, 0x0) 14:34:05 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0x0, 0x0, {}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x38}}, 0x0) 14:34:05 executing program 0: 14:34:05 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xf0, &(0x7f0000000380)="f7f249b9740c9e02007f00000000000032a5b60a00008024c30e478947d190ac00000000000000000000000097ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a4bf38a9aad9c9ba4c998db2f7155d302a7be122bb1609f8b0164eb12c07af20200169c864e1d5f8179cba2e431126de0594ce1487e311e84395a80adbe3e7f3622703c353de8e6928bfd5a5f2cc05e4b942d6ed155b67a555f4b2e2b0cd0e93e41c330f70401c1d96f546e65fab4fae51bb32a6f3ca61632d15b0c1cec89839cd7fe16d03af16efd5295d2eea42f3e25765b72b9727176c1966620ada4a27b28739a2eed558cee393ecaa3df0045"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 14:34:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00000000c0)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@empty, @in6=@remote}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 14:34:06 executing program 1: syz_emit_ethernet(0x8e, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00\b\x00', 0x58, 0x6, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x16, 0xc2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @md5sig={0x13, 0x12, "0700000022cec62fe81ff5ff0b735d15"}, @exp_fastopen={0xfe, 0x14, 0xf989, "963f0dd85a1cf80d2309434bcf03c5e9"}, @exp_smc={0xfe, 0x6}, @md5sig={0x13, 0x12, "a96ea6639276454e7a732f62765c487b"}]}}}}}}}}, 0x0) 14:34:06 executing program 4: write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x4}}, 0x30) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x42441) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue1\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a35704000000b6215dd33459"}}], 0xffffff01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x33f}) 14:34:06 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x0, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 14:34:06 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:06 executing program 5: clone(0x200000008890d100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getgroups(0x0, &(0x7f0000000000)) setregid(0x0, 0x0) r0 = gettid() tkill(r0, 0x3c) creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200036150, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 14:34:07 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x14f, &(0x7f0000000380)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 14:34:07 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000004e000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="66b87f008ee8c442b1987f10420f38ca9df8ff0000360f23e0ec400f01df6566430fe4060f0948b89e000000000000000f23d00f21f8351000000f0f23f8262e450f07", 0x43}], 0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1b, &(0x7f00000000c0)={0x0, 0x0}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setregid(0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0xa4, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:34:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000200)={0x2}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 187.230556] syz-executor.1 (7974) used greatest stack depth: 24568 bytes left [ 187.295352] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 14:34:08 executing program 0: 14:34:08 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:08 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/wireless\x00') futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000000f40)=[{&(0x7f00000013c0), 0x2}, {0x0}, {0x0, 0x2}, {&(0x7f0000000200)=0x1}, {&(0x7f0000000240)=0x1, 0x1}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=0x1, 0x1}, {&(0x7f0000000300), 0x1}, {&(0x7f0000000340)}, {0x0, 0x2}, {&(0x7f0000000400)=0x2}, {&(0x7f0000001340)=0x2}, {&(0x7f0000000480)}, {0x0}, {&(0x7f0000000540), 0xfffffffd}, {&(0x7f0000000580)=0x2}, {&(0x7f00000005c0)}, {&(0x7f0000000600)}, {&(0x7f0000000640), 0x2}, {&(0x7f0000000680)}, {&(0x7f00000006c0), 0x2}, {&(0x7f0000000740)=0xffffffff, 0x1}, {&(0x7f0000000780)=0x2}, {&(0x7f0000000880)=0x1, 0x2}, {0x0}, {&(0x7f0000000900)=0x2, 0x1}, {&(0x7f0000000940)=0x2}, {&(0x7f0000000980)}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=0x2}, {0x0}, {&(0x7f0000000b40)=0x2, 0x1}, {0x0, 0x2}, {&(0x7f0000000bc0)=0x2}, {&(0x7f0000001380)}, {0x0}, {&(0x7f0000000d40)=0x1}, {&(0x7f0000000d80)=0x2, 0x2}, {&(0x7f0000000dc0)=0x2, 0x2}, {&(0x7f0000000e00)=0x1}, {0x0, 0x2}, {&(0x7f0000000e80)=0x2}, {0x0}, {&(0x7f0000000f00)}], 0xd, 0x2c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x32}, @mcast1, @empty, 0x0, 0x0, 0x480, 0x400, 0x1576, 0x2020007}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r2, r3, 0x0, 0x320f) syz_genetlink_get_family_id$netlbl_calipso(0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 14:34:08 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000b76a000001000000e4ff00"}) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) 14:34:08 executing program 5: 14:34:08 executing program 5: 14:34:08 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:08 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/wireless\x00') futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000000f40)=[{0x0}, {0x0, 0x2}, {&(0x7f0000000200)=0x1}, {&(0x7f0000000240)=0x1, 0x1}, {0x0}, {&(0x7f00000002c0)=0x1, 0x1}, {&(0x7f0000000300), 0x1}, {&(0x7f0000000340)}, {0x0}, {&(0x7f0000000400)=0x2}, {&(0x7f0000001340)=0x2}, {&(0x7f0000000480)}, {0x0}, {&(0x7f0000000540), 0xfffffffd}, {&(0x7f0000000580)=0x2}, {&(0x7f00000005c0)}, {&(0x7f0000000600)}, {&(0x7f0000000640), 0x2}, {&(0x7f0000000680)}, {&(0x7f00000006c0), 0x2}, {&(0x7f0000000740)=0xffffffff, 0x1}, {&(0x7f0000000780)=0x2}, {&(0x7f0000000880)=0x1, 0x2}, {0x0}, {&(0x7f0000000900)=0x2, 0x1}, {&(0x7f0000000940)=0x2}, {&(0x7f0000000980)=0x2}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=0x2}, {0x0}, {&(0x7f0000000b40)=0x2, 0x1}, {0x0, 0x2}, {&(0x7f0000000bc0)=0x2}, {&(0x7f0000001380)}, {0x0}, {&(0x7f0000000d40)=0x1}, {&(0x7f0000000d80)=0x2, 0x2}, {0x0, 0x2}, {0x0}, {0x0, 0x2}, {&(0x7f0000000e80)=0x2}, {0x0}, {&(0x7f0000000f00)}], 0xd, 0x2b, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@dev, @mcast1, @empty, 0x0, 0x0, 0x480, 0x400, 0x1576, 0x2020007}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r2, r3, 0x0, 0x320f) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) 14:34:10 executing program 4: 14:34:10 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000980)={0x0, 0x0, {0x1}}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) 14:34:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x103, &(0x7f0000000380)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 14:34:10 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:10 executing program 1: 14:34:10 executing program 0: 14:34:10 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:10 executing program 0: 14:34:10 executing program 4: 14:34:10 executing program 1: 14:34:10 executing program 5: 14:34:10 executing program 0: 14:34:10 executing program 4: 14:34:10 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, r0}, 0x80) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:13 executing program 3: 14:34:13 executing program 5: 14:34:13 executing program 1: 14:34:13 executing program 0: 14:34:13 executing program 4: 14:34:13 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, r0}, 0x80) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:13 executing program 4: 14:34:13 executing program 0: 14:34:13 executing program 5: 14:34:13 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, r0}, 0x80) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:13 executing program 1: 14:34:13 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/wireless\x00') futex$FUTEX_WAIT_MULTIPLE(&(0x7f0000000f40)=[{&(0x7f00000013c0), 0x2}, {&(0x7f0000000180)}, {0x0, 0x2}, {&(0x7f0000000200)=0x1}, {&(0x7f0000000240)=0x1, 0x1}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=0x1, 0x1}, {&(0x7f0000000300)}, {&(0x7f0000000340)}, {0x0, 0x2}, {&(0x7f0000000400)=0x2}, {&(0x7f0000001340)=0x2}, {&(0x7f0000000480)}, {&(0x7f0000000540), 0xfffffffd}, {&(0x7f0000000580)=0x2}, {&(0x7f00000005c0)}, {&(0x7f0000000600)}, {&(0x7f0000000640), 0x2}, {&(0x7f0000000680)}, {&(0x7f00000006c0), 0x2}, {&(0x7f0000000740)=0xffffffff, 0x1}, {&(0x7f0000000780)=0x2}, {&(0x7f0000000880)=0x1, 0x2}, {0x0}, {&(0x7f0000000900)=0x2, 0x1}, {&(0x7f0000000940)=0x2}, {&(0x7f0000000980)=0x2}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=0x2}, {0x0}, {&(0x7f0000000b40)=0x2, 0x1}, {0x0, 0x2}, {&(0x7f0000000bc0)=0x2}, {&(0x7f0000001380)}, {&(0x7f0000000d40)=0x1}, {&(0x7f0000000d80)=0x2, 0x2}, {&(0x7f0000000dc0)=0x2, 0x2}, {0x0}, {0x0}, {&(0x7f0000000e80)=0x2}, {0x0}, {&(0x7f0000000f00)}], 0xd, 0x2a, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r1, r2, 0x0, 0x320f) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) 14:34:13 executing program 0: 14:34:13 executing program 4: 14:34:13 executing program 5: 14:34:13 executing program 0: 14:34:13 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0xdf) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[], 0x1a0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x100000003, 0x0, 0x80019c) 14:34:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r4 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGID(r4, 0x80084502, &(0x7f00000002c0)=""/209) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) dup3(r1, r4, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) r5 = gettid() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000140)="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"/297, 0x3accf8d5) tkill(r5, 0x800000009) 14:34:13 executing program 0: r0 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) r1 = accept(r0, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000100)=0x80) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) clone(0xa9e0b1b51a9887ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() tkill(r2, 0x37) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2010000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r0) r5 = socket(0x10, 0x80002, 0x0) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x1, 0x0) ioctl$SIOCAX25GETINFOOLD(r5, 0x89e9, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, r4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 14:34:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x50354, 0xde}, 0xffffffffffffffff, 0x2, r1, 0x0) set_mempolicy(0x2, &(0x7f00000000c0)=0x3, 0x9) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x8) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r2, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x1) 14:34:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x1, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8001, 0x0, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) read$snapshot(0xffffffffffffffff, &(0x7f0000000180)=""/174, 0xae) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2ca400, 0x0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x145442, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f0000000240)=""/157) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xffff, 0x0, @loopback}, {0xa, 0x1, 0x0, @local}}}, 0x48) 14:34:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:13 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000300)='/dev/input/mice\x00', 0x428880) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) r1 = socket(0x0, 0x803, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000140)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000740)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}], 0x5, &(0x7f0000000600)=""/191, 0xbf, 0x8}}], 0x1, 0x100000000000000, &(0x7f0000003700)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x1001, 0x101, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) mlockall(0x1) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) bind$rds(r1, &(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) fallocate(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000180)='NLBL_CIPSOv4\x00') r3 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000400)=ANY=[@ANYBLOB="010054000d4992bff6af337337da2eccaf24627bbb66c8154d84da89c1ff5abb0eeb3f736a30695b6d335801fd316aff219b6b8b43fb8b197e36b77eb14b2bf50d5a7b139cc74a21277d467abbba1b8df7f3d20542e9a7f24c7725cc1841"]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ADDR(r5, 0x4028af11, &(0x7f00000002c0)={0x2, 0x1, &(0x7f00000000c0)=""/1, &(0x7f00000001c0)=""/8, &(0x7f00000007c0)=""/224, 0x6000}) [ 193.729181] audit: type=1800 audit(1595946853.563:9): pid=8145 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=15853 res=0 14:34:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:13 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r5, r7}}, 0x18) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0)=0x2159, 0xfdb3) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r8 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r8, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) ioctl$sock_inet_SIOCSIFBRDADDR(r8, 0x891a, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}}) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0xfec0, 0x0) 14:34:13 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) [ 194.065266] audit: type=1800 audit(1595946853.903:10): pid=8145 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="bus" dev="sda1" ino=15853 res=0 14:34:13 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000080)="660f010aa81bd604d604d1c4c38d0a970400000000f6b9817411833ef32e360f09260f01c5f30f090f3226f33e0f32c4c16df37300", 0x35}], 0x1, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x14bd42, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x1, 0x201}, 0x14}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x84, r4, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xefe}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x1}, 0x81) recvmmsg(0xffffffffffffffff, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/zero\x00', 0x0, 0x0) readv(r5, &(0x7f0000000ac0)=[{0x0}, {0x0}, {&(0x7f0000000380)=""/74, 0x200003ca}], 0x3) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) 14:34:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r0) socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) finit_module(r0, &(0x7f0000000000)='.^/.\\/-\x00', 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0xbb, &(0x7f0000000040)="65f87b1397a45ceb790ae5362b872b2012ea35c91bdb6a587c0f4039a0684601537ce63b808200b9c74fefa8d1d0f5651cad1c540375ee9f4b25a7de49fd194b754e2f4868a06f8df1f8d5168bea08c1721513d24d9df087a2523fd96d77710a9a7f2c548bf381a5972d41e3391f5283491f19102efd17b1fce01e3b1fefc1eb60a193d8fc8b3a3d58fbd2366a5655491e106f1225104f4ee3413f8e86cc8a3295b39ad40a3c195bb5d7f47270ca2633fe6bd0d2622c51c776ca17"}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x6c, 0x0, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xede}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x6997}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x3}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x20}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0xc094}, 0x8002) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000440)='drr\x00') r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000940)=""/4096, &(0x7f0000000140)=0x1000) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="4800000010000507000000000000000000000000abeb7cee9f1621310e08ce2f1a4480c8c179a6502b176d", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0xb}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) ioctl$SIOCPNENABLEPIPE(r5, 0x89ed, 0x0) 14:34:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) connect(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) [ 194.329131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8177 comm=syz-executor.3 14:34:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) connect(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) [ 194.389356] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. [ 194.441964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8177 comm=syz-executor.3 [ 194.457290] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) connect(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800c0001006d616376746170000400028008000500", @ANYRES32], 0x3c}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair(0xa, 0x5, 0x80000001, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r5, 0x8912, &(0x7f00000002c0)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x9, &(0x7f0000000000)=0x400, 0x4) [ 194.609960] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 194.766059] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 14:34:14 executing program 1: creat(&(0x7f0000000200)='./file0\x00', 0x1) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000000), &(0x7f00000000c0)=0x4) sendfile(r0, r0, 0x0, 0x8800000) 14:34:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) prctl$PR_GET_FPEXC(0xb, &(0x7f00000000c0)) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x10) fallocate(r4, 0x0, 0x0, 0x8020001) pipe(&(0x7f0000000080)) 14:34:14 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) [ 195.138802] audit: type=1800 audit(1595946854.973:11): pid=8220 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=15853 res=0 [ 195.444588] audit: type=1800 audit(1595946855.283:12): pid=8220 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=15853 res=0 14:34:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001100)=@newtfilter={0x40, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x8}, {0xffe0}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x10, 0x2, [@TCA_BASIC_POLICE={0x7, 0x4, [@TCA_POLICE_AVRATE={0x8}]}]}}]}, 0x40}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000180), 0x4000000000002bc, 0x0) 14:34:18 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) connect(r0, &(0x7f0000000140)=@ll, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup2(r0, r1) setsockopt$inet_mtu(r2, 0x0, 0x4, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="38000000dd9ae50a6a7376010000000000000000b86622c84bd678f571ad67bb87879e58b2ce330d79efbbc0ecf365cc86ec0a892fb413ed2ae87a0045", @ANYRES32=r6, @ANYBLOB="000000000000ffff000000000800010075333200040002000600050000000000"], 0x38}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0xa0, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x59f7fd72353169b1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}]}, @ETHTOOL_A_EEE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_EEE_MODES_OURS={0x4}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x4}, @ETHTOOL_A_EEE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20008001}, 0x4000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 14:34:18 executing program 1: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lchown(0x0, 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(0xffffffffffffffff, 0xc02064a5, &(0x7f0000000880)={0x80000001, 0x3, &(0x7f00000007c0)=[0x3, 0x5, 0xff], &(0x7f0000000800)=[0x40, 0x808, 0x85, 0x8001, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYBLOB="1c1526e49bc1942ecee0ea3f2a58344803229b5be5a33c7b07ca0d06e689429010c8a71f747309000000c0"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) mount$overlay(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='overlay\x00', 0x2802804, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]) r0 = socket(0x10, 0x80002, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000180)={0x2c, r2, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004800}, 0x814) setuid(0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)={0x48, 0x0, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x2}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000300)={0x5, "9b700a5bf9f14e68078cf157fbcba9c9f38dc8f4134750c494b3fbabf01dc82ae8170b2953404c03a30436ca37d1ed419a0c91a32b96d0826e4baff4f046033126374b442125d118fad27b1feb3920bb377c94271bc970bcf1e6bab019b33376f981f86331f4b7036b04fc0c57f0f8a97acfc0a105eefa472b3bd42c1ac7c7f671c614ca4408c542ca0afaa101dbc6031ac97182016f9e69d82264aa3df5d93e97ff39c9fc467f11aa32d605f5b5e79f50b6e8d8bce083e7992e5a6ef98419903282551e91187f7d1154ac08dd852caa2125f86bf48b335d44670f4afaafddc04b442ac9be819040de46835b4a581c386f53e939d5c45efa236adfb5cdc99f04a87ca77f8359e9c4a5b67dc7cb887a8183e769f934cc8ae3676bae51fb14dc53348ea18f89a4ee661131239c360c68d52708c3bc5ffe19d12fdf50b1dafee769473ebf283eb758c9fc1f2e90c712f98d32adbbb6216eb94e3100d09e3e2b4c8d5924940bee67115aea3c9592754cec93b48af391d693af0f2b80be04c9a8c07da7e57a0ffe68b9820f9eaa34c036305f7e58050f9ef11148564a855097c9fd0ec735a375596ced7dab9f3a5455832d37aa2f7698207065eb3712cb13fd854b5a51ad7799335939c9ec1fbe25dab60e3cddd85d275822f6641ff509f6fbd62d46f46b088b7c046329226ebcff3388fa512915d5839a25bc02ad51731211746550"}) r4 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000080)={0x81, 0x7}) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 14:34:18 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) [ 198.552110] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 198.589157] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 198.676286] device vxlan0 entered promiscuous mode [ 198.740358] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39645 sclass=netlink_route_socket pid=8271 comm=syz-executor.3 14:34:18 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) [ 198.810799] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 198.821084] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 198.837713] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 14:34:18 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') open(&(0x7f00000000c0)='./bus\x00', 0x1851fc, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180), 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000280)='./bus\x00') r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000100)=[{{0x3, 0x1, 0x0, 0x1}, {0x3, 0x0, 0x1, 0x1}}, {{0x1, 0x0, 0x1, 0x1}, {0x4, 0x1, 0x0, 0x1}}, {{0x3, 0x0, 0x1}, {0x1, 0x0, 0x1}}, {{0x4, 0x0, 0x1}, {0x0, 0x0, 0x1}}], 0x20) 14:34:18 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:18 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, 0x0, 0x0) [ 199.004057] audit: type=1800 audit(1595946858.843:13): pid=8280 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="loop5" ino=3 res=0 [ 199.016890] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 14:34:18 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, 0x0, 0x0) [ 199.108939] audit: type=1800 audit(1595946858.943:14): pid=8288 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="loop5" ino=4 res=0 14:34:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000003000000280012000900010076657468"], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010000d0700a47f0405000000ff030000", @ANYRES32=r8, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c000200080006"], 0x3c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x44}}, 0x0) 14:34:19 executing program 1: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lchown(0x0, 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(0xffffffffffffffff, 0xc02064a5, &(0x7f0000000880)={0x80000001, 0x3, &(0x7f00000007c0)=[0x3, 0x5, 0xff], &(0x7f0000000800)=[0x40, 0x808, 0x85, 0x8001, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYBLOB="1c1526e49bc1942ecee0ea3f2a58344803229b5be5a33c7b07ca0d06e689429010c8a71f747309000000c0"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) mount$overlay(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='overlay\x00', 0x2802804, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]) r0 = socket(0x10, 0x80002, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000180)={0x2c, r2, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004800}, 0x814) setuid(0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)={0x48, 0x0, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x2}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000300)={0x5, "9b700a5bf9f14e68078cf157fbcba9c9f38dc8f4134750c494b3fbabf01dc82ae8170b2953404c03a30436ca37d1ed419a0c91a32b96d0826e4baff4f046033126374b442125d118fad27b1feb3920bb377c94271bc970bcf1e6bab019b33376f981f86331f4b7036b04fc0c57f0f8a97acfc0a105eefa472b3bd42c1ac7c7f671c614ca4408c542ca0afaa101dbc6031ac97182016f9e69d82264aa3df5d93e97ff39c9fc467f11aa32d605f5b5e79f50b6e8d8bce083e7992e5a6ef98419903282551e91187f7d1154ac08dd852caa2125f86bf48b335d44670f4afaafddc04b442ac9be819040de46835b4a581c386f53e939d5c45efa236adfb5cdc99f04a87ca77f8359e9c4a5b67dc7cb887a8183e769f934cc8ae3676bae51fb14dc53348ea18f89a4ee661131239c360c68d52708c3bc5ffe19d12fdf50b1dafee769473ebf283eb758c9fc1f2e90c712f98d32adbbb6216eb94e3100d09e3e2b4c8d5924940bee67115aea3c9592754cec93b48af391d693af0f2b80be04c9a8c07da7e57a0ffe68b9820f9eaa34c036305f7e58050f9ef11148564a855097c9fd0ec735a375596ced7dab9f3a5455832d37aa2f7698207065eb3712cb13fd854b5a51ad7799335939c9ec1fbe25dab60e3cddd85d275822f6641ff509f6fbd62d46f46b088b7c046329226ebcff3388fa512915d5839a25bc02ad51731211746550"}) r4 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000080)={0x81, 0x7}) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 14:34:19 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, 0x0, 0x0) 14:34:19 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f00000000c0)={0x2, 0x7, {0x57, 0x69f3, 0x0, {0x6, 0xf9}, {0x400, 0x8}, @cond=[{0x71, 0x1, 0x19a, 0x7, 0x0, 0x20}, {0x0, 0x7, 0xffff, 0x7f, 0x8, 0x5a}]}, {0x54, 0x6, 0x0, {0x9, 0x5}, {0x0, 0x6}, @ramp={0xfff7, 0x0, {0x9, 0x4b37, 0x8000, 0xff}}}}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)=0x10000, 0x4) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000080)) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r5 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000180)=0x1c) listen(r5, 0x7) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0xf17) unshare(0x40040400) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) [ 199.483761] device vxlan0 entered promiscuous mode 14:34:19 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 199.687110] IPVS: ftp: loaded support on port[0] = 21 14:34:19 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) [ 199.800001] nla_parse: 2 callbacks suppressed [ 199.800010] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 14:34:19 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 14:34:19 executing program 5: msgctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f0000000200)=""/62) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0xb, &(0x7f0000000240)="e263d4de8abc50c2d6c3ebf1402b516a73737a0c2960f3d1c141cdc8d16413ad277f442bbd64d3a1ccd7961ad359d6080a0c71f7d6f64e50a46ae02f2074305fb736e73cbbc1d478d9c6761a0010694c7edad3ac8638296d132ed82aeef097068d141d9b576219fbe4169e1e8cd31b11b8eded4109d313ad73becdcec747bfdb83e9d610355cb3943c968cd24a0b4c71b619929b533a2c4afda2a91958b17b126efa49b9dfce9d6e4bb458580c7c4b7cb9eedeafa9dc9538c128f62eae6088b9377fb55f6bf723f2ccef43cfdcc81bfaa55b9fae186652716d3f21cf4b48022ce7920e", 0xe3) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x1, 0x0, 0x9, 0x79}, 0x10) 14:34:19 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 14:34:20 executing program 1: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lchown(0x0, 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(0xffffffffffffffff, 0xc02064a5, &(0x7f0000000880)={0x80000001, 0x3, &(0x7f00000007c0)=[0x3, 0x5, 0xff], &(0x7f0000000800)=[0x40, 0x808, 0x85, 0x8001, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYBLOB="1c1526e49bc1942ecee0ea3f2a58344803229b5be5a33c7b07ca0d06e689429010c8a71f747309000000c0"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) mount$overlay(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='overlay\x00', 0x2802804, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]) r0 = socket(0x10, 0x80002, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000180)={0x2c, r2, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004800}, 0x814) setuid(0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)={0x48, 0x0, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x2}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000300)={0x5, "9b700a5bf9f14e68078cf157fbcba9c9f38dc8f4134750c494b3fbabf01dc82ae8170b2953404c03a30436ca37d1ed419a0c91a32b96d0826e4baff4f046033126374b442125d118fad27b1feb3920bb377c94271bc970bcf1e6bab019b33376f981f86331f4b7036b04fc0c57f0f8a97acfc0a105eefa472b3bd42c1ac7c7f671c614ca4408c542ca0afaa101dbc6031ac97182016f9e69d82264aa3df5d93e97ff39c9fc467f11aa32d605f5b5e79f50b6e8d8bce083e7992e5a6ef98419903282551e91187f7d1154ac08dd852caa2125f86bf48b335d44670f4afaafddc04b442ac9be819040de46835b4a581c386f53e939d5c45efa236adfb5cdc99f04a87ca77f8359e9c4a5b67dc7cb887a8183e769f934cc8ae3676bae51fb14dc53348ea18f89a4ee661131239c360c68d52708c3bc5ffe19d12fdf50b1dafee769473ebf283eb758c9fc1f2e90c712f98d32adbbb6216eb94e3100d09e3e2b4c8d5924940bee67115aea3c9592754cec93b48af391d693af0f2b80be04c9a8c07da7e57a0ffe68b9820f9eaa34c036305f7e58050f9ef11148564a855097c9fd0ec735a375596ced7dab9f3a5455832d37aa2f7698207065eb3712cb13fd854b5a51ad7799335939c9ec1fbe25dab60e3cddd85d275822f6641ff509f6fbd62d46f46b088b7c046329226ebcff3388fa512915d5839a25bc02ad51731211746550"}) r4 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000080)={0x81, 0x7}) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 14:34:20 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 200.154476] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 200.321584] IPVS: ftp: loaded support on port[0] = 21 14:34:20 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000000)={0x0, 0x7, 0x1, 0x434, 0x9, 0xdc9, 0xffff, 0x0, 0x0, 0x4, 0x41a1ae3b, 0xfe0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x38) 14:34:20 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f0000000000)={0x0, 0x7, 0x1, 0x434, 0x9, 0xdc9, 0xffff, 0x0, 0x0, 0x4, 0x41a1ae3b, 0xfe0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x38) 14:34:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={r0, 0x3, 0xfffffffffffffffd, 0x9e8}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca2740a0000002734fa0095e0612687ecb86a548802a902000000020000000a00000079a782d2250000000206e73ba8f4952bedc6760253ef", 0x3a, 0x401}], 0x10006, &(0x7f0000000100)={[{@test_dummy_encryption='test_dummy_encryption'}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000300)={0x0, @adiantum}) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r3, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x2d, 0x7, 'system_u:object_r:hald_sonypic_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}]}, 0x64}, 0x1, 0x0, 0x0, 0x44000}, 0x24000004) 14:34:20 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 200.886939] device vxlan0 entered promiscuous mode [ 200.936931] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 201.013136] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 14:34:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xd) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000340)) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x1f, &(0x7f0000000080)=0x1) r2 = dup(0xffffffffffffffff) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) 14:34:21 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r2, 0x0, 0x208e24b) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x41, 0x0, 0x80000000, 0x0, &(0x7f0000000040)=[0xc, 0x6, 0xffffffff, 0x3]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000080)={r3, 0x2}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)={{0x107, 0xde, 0xdf, 0x34e, 0x2, 0x8, 0xc3, 0x3}, "cf0e6edae0929d57567e55873854469f9b1ef8ca77724b2ff63eca48f1ff64b2d5c95a5fdf2f10dffddc8daf8e49b32ee45e71ce46d71749fdf2f7c162d5c95bc0278c34b37f90ac4de3cd434de200e8b579c275475a62b466decdc2fcb7635d52d93d627683ccd029e290caf9", [[], [], [], [], []]}, 0x58d) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001000000000000000ffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c001a80090001004d6f6e64000000000c00028006000b"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010b181ce35176b4714d665e7d934bbfc6bdc86a7f2ce37b7a4", @ANYRES32, @ANYRESHEX], 0x3}}, 0x0) socket(0x10, 0x803, 0x0) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6573, 0x140) splice(r4, 0x0, r6, 0x0, 0x4ffe6, 0x0) 14:34:21 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x3b0, 0xd0, 0x1c0, 0xd0, 0xd0, 0xd0, 0x2c0, 0x2e0, 0x2e0, 0x2e0, 0x2c0, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0xfffa}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @local}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@local, 'wg1\x00'}}}, {{@ipv6={@local, @dev, [], [], 'bridge_slave_1\x00', 'ipvlan0\x00', {}, {}, 0x11, 0x0, 0x5}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}, {0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe]}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x410) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = getpid() sched_setattr(r2, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) getpriority(0x2, r2) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000040)={0x0, 0x9, 0xe49a, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9e0904, 0x898, [], @value=0x6b800000}}) mq_getsetattr(r4, &(0x7f0000000080)={0x52, 0x5, 0x6, 0x80000000}, &(0x7f0000000540)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r6 = getpid() sched_setattr(r6, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x6, 0x5, 0x81, 0x8, 0x0, 0x81, 0x0, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6a0, 0x4, @perf_config_ext={0x401, 0x10000}, 0x2c2f, 0x2, 0x5, 0x6, 0xfffffffffffffff7, 0x4, 0x8}, r6, 0x0, r8, 0x1) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) 14:34:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$cifs(&(0x7f0000000140)='cifs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000001c0), 0x0, 0x57e}], 0x0, &(0x7f0000000300)='\\\x00') r2 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) fcntl$getflags(r2, 0x1) r3 = shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x0) shmdt(r3) 14:34:21 executing program 1: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lchown(0x0, 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, 0x0) ioctl$DRM_IOCTL_MODE_SETGAMMA(0xffffffffffffffff, 0xc02064a5, &(0x7f0000000880)={0x80000001, 0x3, &(0x7f00000007c0)=[0x3, 0x5, 0xff], &(0x7f0000000800)=[0x40, 0x808, 0x85, 0x8001, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000980)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa08f9985503f8f45bfb4e9240b9f2a30d1bde27881f17233d3ad01f2177b1b53e51397d581d1549a05c1955f5d2a27a54f154df040a4d6a66872683c18972c13e0685086872b082db85be8bcf0074dd91f31c0bc042060d000000000000000000b315d6bbae092e1827d43888fa07824e3a072b4dd404cee5ae5d61ce9b1bb0ceaef8adade790b8cd98e7111c191e8d447128b467ce2f3fc2434367b6ed0fa630618163ee714185419412e81e5a34c7cc86c38fd0b1c770a66e686f3e26e099f82b2c2764d3fe07a6e4d556e38ec04f1c082d9ed4e7fedf497e7cd0c3410360ce7dc58a9ac3d724a4982acd054d1a14b03d", @ANYBLOB="1c1526e49bc1942ecee0ea3f2a58344803229b5be5a33c7b07ca0d06e689429010c8a71f747309000000c0"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) mount$overlay(0x0, &(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='overlay\x00', 0x2802804, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]) r0 = socket(0x10, 0x80002, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000180)={0x2c, r2, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004800}, 0x814) setuid(0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)={0x48, 0x0, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x2}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000004}, 0x40) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000300)={0x5, "9b700a5bf9f14e68078cf157fbcba9c9f38dc8f4134750c494b3fbabf01dc82ae8170b2953404c03a30436ca37d1ed419a0c91a32b96d0826e4baff4f046033126374b442125d118fad27b1feb3920bb377c94271bc970bcf1e6bab019b33376f981f86331f4b7036b04fc0c57f0f8a97acfc0a105eefa472b3bd42c1ac7c7f671c614ca4408c542ca0afaa101dbc6031ac97182016f9e69d82264aa3df5d93e97ff39c9fc467f11aa32d605f5b5e79f50b6e8d8bce083e7992e5a6ef98419903282551e91187f7d1154ac08dd852caa2125f86bf48b335d44670f4afaafddc04b442ac9be819040de46835b4a581c386f53e939d5c45efa236adfb5cdc99f04a87ca77f8359e9c4a5b67dc7cb887a8183e769f934cc8ae3676bae51fb14dc53348ea18f89a4ee661131239c360c68d52708c3bc5ffe19d12fdf50b1dafee769473ebf283eb758c9fc1f2e90c712f98d32adbbb6216eb94e3100d09e3e2b4c8d5924940bee67115aea3c9592754cec93b48af391d693af0f2b80be04c9a8c07da7e57a0ffe68b9820f9eaa34c036305f7e58050f9ef11148564a855097c9fd0ec735a375596ced7dab9f3a5455832d37aa2f7698207065eb3712cb13fd854b5a51ad7799335939c9ec1fbe25dab60e3cddd85d275822f6641ff509f6fbd62d46f46b088b7c046329226ebcff3388fa512915d5839a25bc02ad51731211746550"}) r4 = dup(0xffffffffffffffff) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000080)={0x81, 0x7}) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 201.385754] ip6_tables: ip6tables: counters copy to user failed while replacing table [ 201.414760] CIFS VFS: Malformed UNC in devname. 14:34:21 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x47088, 0x6e9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) r1 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) r2 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000000)={r2, 0x40, 0x5, 0x2f10}) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000040)=""/179) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) [ 201.520640] CIFS VFS: Malformed UNC in devname. 14:34:21 executing program 4: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000300), &(0x7f0000000080)=0x68) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0xfffffeec, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x4}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0xc, 0x2, [@TCA_FLOWER_FLAGS={0x8}]}}]}, 0x3c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) [ 201.715303] device vxlan0 entered promiscuous mode 14:34:21 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:21 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0x0, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) [ 201.794984] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 201.805920] ip6_tables: ip6tables: counters copy to user failed while replacing table 14:34:21 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@mcast2, r4}, 0x14) setuid(r2) stat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000001340)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB=',cachetag=b']) [ 201.857879] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 14:34:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030007000500154001008178a800160008000100e558110000000100000e006f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee48100000000000000d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d08fad95667e04adcdf634c1f215ce3bb53b409d5e1ca4e81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) fsetxattr$security_ima(r3, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "c4c46adc6c365bdd808e12585fb541d311534b54"}, 0x15, 0x3) write$P9_RMKNOD(r2, &(0x7f0000000000)={0x14, 0x13, 0x1, {0x43, 0x2, 0x1}}, 0x14) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f0000000080)) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f00000000c0)={'erspan0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 14:34:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$sndseq(r1, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x200, 0x20000) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) [ 201.947671] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.5'. [ 202.022571] netlink: 156 bytes leftover after parsing attributes in process `syz-executor.5'. 14:34:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x12, r0, 0x0) ioctl$SNDRV_PCM_IOCTL_TTSTAMP(r0, 0x40044103, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$vhost_msg(r2, &(0x7f00000010c0)={0x1, {&(0x7f0000000040)=""/4096, 0x1000, &(0x7f0000001040)=""/90, 0x3, 0x4}}, 0x48) 14:34:22 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0x0, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) inotify_init() signalfd4(0xffffffffffffffff, &(0x7f0000000480), 0x8, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) socket$inet_udp(0x2, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0xc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0x8, 0x0, 0x14, 0x8, 0x0, 0x0, 0x7, 0xb, 0x7, 0xb, 0x3, 0x0, 0x8]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r6}) fstat(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="3c49b9da318d3a603e6736313ad93e20c5bcd09aa7a718a389c92746c4d10942585a8182b425ac7cdc73ce", @ANYRES32, @ANYBLOB="00020000e1df185ea2796b000000", @ANYRES32=r2, @ANYBLOB='\b', @ANYRES32=r6, @ANYBLOB="08000b000300000008", @ANYRES32=r7, @ANYBLOB="08000b0029c9f3911738bec55e92be", @ANYRES64, @ANYBLOB], 0x70}}, 0x20000001) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xa4, 0x0, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xc1}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x8}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x1}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40040}, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) 14:34:22 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000380)=""/246) ioctl$PPPIOCSPASS(r0, 0x4010744d, &(0x7f0000000040)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @remote}, @dev={0xfe, 0x80, [0x8, 0x0, 0x14, 0x8, 0x0, 0x0, 0x7, 0xb, 0x7, 0xb, 0x3, 0x0, 0x8]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) fstat(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="00020000e1df185ea2796b000000", @ANYRES32=r1, @ANYBLOB='\b', @ANYRES32=r5, @ANYBLOB="08000b000300000008", @ANYRES32=r6, @ANYBLOB="08000b0029c9f3911738bec55e92be", @ANYRES64, @ANYBLOB], 0x70}}, 0x20000001) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r8) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000, &(0x7f00000000c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r8}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@subj_role={'subj_role', 0x3d, '\'^'}}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}]}}) 14:34:22 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='GPLppp1%\x00', 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x4, 0x7f}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e20, 0x1000, @mcast1, 0xfffffffe}}, 0xb0f1, 0xdf79, 0x3, 0x7f, 0x2}, &(0x7f0000000140)=0x98) close(r0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 202.284043] audit: type=1400 audit(1595946862.123:15): avc: denied { create } for pid=8589 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 14:34:22 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0x0, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:22 executing program 0: openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000100)={0xb, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000c80), 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) poll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x20}, {r1, 0x2}, {r2}], 0x4, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[@ANYBLOB='0\n'], 0xb) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x4) splice(r3, 0x0, r6, 0x0, 0xb, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f000000a000)) 14:34:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$sndseq(r1, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x200, 0x20000) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) 14:34:22 executing program 0: openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000100)={0xb, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000c80), 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) poll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x20}, {r1, 0x2}, {r2}], 0x4, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[@ANYBLOB='0\n'], 0xb) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x4) splice(r3, 0x0, r6, 0x0, 0xb, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f000000a000)) 14:34:22 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x0, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:22 executing program 3: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0xfe96}], 0x1, 0x81003, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000080)='./file0\x00', 0x204041, 0x4c) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f00000000c0)) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x408e0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb95, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2003f00) r3 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000000)={{0x2, 0x0, @identifier="c79e1b7bfee8655fc745eb737858ff31"}}) 14:34:22 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x6, 0x26, 0x0, 0x5, 0x0, 0x4, 0x180, 0x0, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002440)=[{{&(0x7f0000000340)=@generic, 0x80, 0x0, 0x0, &(0x7f00000004c0)=""/131, 0x83}, 0xfff}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000000c40)=@caif=@dbg, 0x80, &(0x7f0000002340)=[{&(0x7f0000000cc0)=""/181, 0xb5}, {0x0}, {&(0x7f0000001e40)=""/165, 0xa5}, {0x0}], 0x4, &(0x7f0000002400)=""/56, 0x38}}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4e8a289d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x4, 0xd, 0x400, 0x8, 0x8, 0x0, 0x3, 0x800002, 0x9}, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x12}, 0x1, 0x0, 0x0, 0x24040854}, 0x0) 14:34:22 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x0, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:22 executing program 0: openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000100)={0xb, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000c80), 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) poll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x20}, {r1, 0x2}, {r2}], 0x4, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[@ANYBLOB='0\n'], 0xb) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x4) splice(r3, 0x0, r6, 0x0, 0xb, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f000000a000)) 14:34:22 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x0, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:22 executing program 3: socket$inet6(0xa, 0x2, 0x80000000) r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x1) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0xa, &(0x7f00000001c0)={0x77359400}) 14:34:22 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x8d, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x1, 0x0, 0x0, 0x8, 0x0, 0xfffffffffffffffd}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000480)=[{{&(0x7f0000000780)=@xdp, 0x80, 0x0}, 0x4}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000680)={{0x0, 0xa}, {0x86, 0x81}, 0xfffffe01, 0x4, 0x3}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000003c0), 0xc, &(0x7f0000000500)={&(0x7f0000000540)=ANY=[@ANYBLOB="0ddf5cbb3a305946d4efd5afb44808271700513a53b042a1cf6f9833b9f74dd6c040baa47b29f57eda7160e328ccbbc9fd8ac6", @ANYRES16=0x0, @ANYBLOB="10002cbd700002dcdf251c0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00ff0100000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b003f0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00080000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b00040000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000b0000000000"], 0xdc}}, 0x24000000) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x3cb) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000340)={0x6, 0x0, 0x0, 0x204f}) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, 0x0) ioctl$SNDRV_PCM_IOCTL_RESUME(r3, 0x4147, 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000100172,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 14:34:22 executing program 0: openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000100)={0xb, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000c80), 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) poll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x400}, {0xffffffffffffffff, 0x20}, {r1, 0x2}, {r2}], 0x4, 0x3) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r4, &(0x7f0000000180)=ANY=[@ANYBLOB='0\n'], 0xb) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r5, 0x5452, &(0x7f0000000000)=0x4) splice(r3, 0x0, r6, 0x0, 0xb, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='rpc_pipefs\x00', 0x0, &(0x7f000000a000)) 14:34:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$sndseq(r1, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x200, 0x20000) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) 14:34:22 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) [ 203.090035] FAULT_INJECTION: forcing a failure. [ 203.090035] name failslab, interval 1, probability 0, space 0, times 1 14:34:23 executing program 0: socket$inet6(0xa, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x2c) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) openat$vcsa(0xffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) pipe(&(0x7f0000000200)) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="4757070000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r2, @ANYBLOB="e5b6ada9dee6310db89ed2ea7de106000000ad7faf51e293d2cb4c905b2c631afa424458652a9ebbb476877f246a462bac5c78ea45fe3c4eb0b3b6ddff8b7aac85b0a9cc5be6994f94c715b19168c5751b57149ec1589dbc83c08d6dee91688ce84d03a06cece6b7f954ad8bef43571914748fbee4c203d983ca32120afd5693"], 0x3c}}, 0x0) [ 203.301340] CPU: 0 PID: 8677 Comm: syz-executor.2 Not tainted 4.14.189-syzkaller #0 [ 203.309168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.319001] Call Trace: [ 203.321625] dump_stack+0x1b2/0x283 [ 203.325265] should_fail.cold+0x10a/0x154 [ 203.329453] should_failslab+0xd6/0x130 [ 203.333429] kmem_cache_alloc_trace+0x29a/0x3d0 [ 203.338102] bcm_sendmsg+0x2029/0x3a10 [ 203.341993] ? dup_iter+0x240/0x240 [ 203.345631] ? bcm_read_op+0x400/0x400 [ 203.349528] ? bcm_read_op+0x400/0x400 [ 203.353418] sock_sendmsg+0xb5/0x100 [ 203.357131] ___sys_sendmsg+0x6c8/0x800 [ 203.361107] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 203.365867] ? perf_trace_lock_acquire+0x510/0x510 [ 203.370822] ? check_preemption_disabled+0x35/0x240 [ 203.375847] ? __fget+0x1fe/0x360 [ 203.379317] ? lock_acquire+0x170/0x3f0 [ 203.383319] ? lock_downgrade+0x740/0x740 [ 203.387475] ? __fget+0x225/0x360 [ 203.390932] ? __fdget+0x196/0x1f0 [ 203.394477] ? sockfd_lookup_light+0xb2/0x160 [ 203.398975] __sys_sendmsg+0xa3/0x120 [ 203.402775] ? SyS_shutdown+0x160/0x160 [ 203.406749] ? wait_for_completion_io+0x10/0x10 [ 203.411429] ? SyS_read+0x210/0x210 [ 203.415056] ? SyS_clock_settime+0x1a0/0x1a0 [ 203.419468] SyS_sendmsg+0x27/0x40 [ 203.423009] ? __sys_sendmsg+0x120/0x120 [ 203.427071] do_syscall_64+0x1d5/0x640 [ 203.430967] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 203.436151] RIP: 0033:0x45c369 [ 203.439333] RSP: 002b:00007fca26cf3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 14:34:23 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x1c9440, 0x8) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x101406, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000332bb7d18b8b9200"}) syz_open_pts(r1, 0x0) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0xffa8) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)={0x9, 0x3, 0x8}) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) madvise(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) madvise(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/177) [ 203.447040] RAX: ffffffffffffffda RBX: 000000000002b3c0 RCX: 000000000045c369 [ 203.454306] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 203.461576] RBP: 00007fca26cf3ca0 R08: 0000000000000000 R09: 0000000000000000 [ 203.468850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 203.476118] R13: 00007ffe2203128f R14: 00007fca26cf49c0 R15: 000000000078bf0c 14:34:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$sndseq(r1, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x200, 0x20000) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) 14:34:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x4000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000140)=ANY=[@ANYBLOB="b75eaac27b4ce4335970c680a2a7bdff732c61b4a821f00a748f809286a14f4ddf03b5eaefb3e0c4d2215552c42de24f74fdd09f28155d1e5ff2b18c4f8ce552de22254692b59ebcb9e6044f0cd4fb53cd5690"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) r7 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x124, r7, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xff}, {0x6, 0x11, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6, 0x11, 0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8}, {0x6, 0x11, 0x20}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffffa}, {0x6, 0x11, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x11, 0x2}}]}, 0x124}, 0x1, 0x0, 0x0, 0x4044091}, 0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r8, 0x0) 14:34:23 executing program 3: socket$inet6(0xa, 0x2, 0x80000000) r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x1) write(r0, &(0x7f0000000280)="1c0000001a009b8a140000003b9b301f00"/28, 0x32) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0xa, &(0x7f00000001c0)={0x77359400}) [ 203.890305] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 204.047806] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 14:34:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$sndseq(r1, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x200, 0x20000) 14:34:24 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x77, 0x101001) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000380)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x100010, r0, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(0xffffffffffffffff, 0x4038564f, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) tkill(r1, 0x2) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2b}, 0x0) ptrace$cont(0x20, r2, 0x0, 0x0) 14:34:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x9b35ce2a08222538, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6572726f72733d636f6e74876e75652c71756965742c00"]) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0xfffffde2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x20000084) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='0\x00 \x00', @ANYRES16=r2, @ANYBLOB="000209000000ffdbdf250c00000011000700b65bed728ae7f5fb09ccd5d162000000080009002edd327a"], 0x30}, 0x1, 0x0, 0x0, 0x44000}, 0x4000010) 14:34:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$sndseq(r1, 0x0, 0x0) [ 204.506893] FAT-fs (loop5): Unrecognized mount option "errors=cont‡nue" or missing value 14:34:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f0000000140)={0x2, 0x0, "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"}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6d706f6c3d6c6f63616c3a739378af66a49481d73cc81a7ca93009"]) [ 204.743715] tmpfs: Bad value 'local:s“x¯f¤”×<È|©0 ' for mount option 'mpol' 14:34:24 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, 0x1402, 0x500, 0x70bd29, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r6}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0xc800}, 0x4000080) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r9, 0xc0845658, &(0x7f00000002c0)={0x0, @reserved}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r7}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:24 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000d50104000000000100000000000025bd4286be9084baa5b5db0700000068000a01000020763f0362391c57bc2475cc6474c7469fee863a839c92ad97786d22730a7c4b891a5f9b1395cacd8f2a9a8cb0e290476c85f3da616da2f4b8c2ee7aafe1b27231c2a9996fae2b8483a09844916d76155f006dd051eac8af031f98e08ad58f03cf8fb1bc78ffb92fb476f701076749d57ddc37ca91ff06e0f9f0f8d14f69eb80dc87145c723d5ecbe556bb39ad383c83dedcff639bb9a84e70ab0e2f075fe8f6333ee4e7e980b7fc8dbb7dcf9cc40c9428a2120f2330f74791a20cde9f37d4068616b45d55666449c974cb453fe350fac63b661e6b6356b80e197ddc37467d"], 0x92) r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @local}, 0x10, 0x0) accept4(r2, 0x0, &(0x7f0000000040), 0x80000) mkdirat$cgroup_root(0xffffff9c, 0x0, 0x1ff) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) readv(r1, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) write$P9_ROPEN(r3, &(0x7f0000000080)={0x18, 0x71, 0x2, {{0x2, 0x2, 0x1}, 0x9}}, 0x18) add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000480), 0x0, 0xfffffffffffffffd) 14:34:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:34:24 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) write$tun(0xffffffffffffffff, 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x1) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x45c) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x77, 0x101001) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x200, 0x0) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000003c0)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380), 0xc, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="24000000b45a7aac3126caebf695dea8d38cd158a391244e38738dd649e31070d329b8e53b97371b7412ff01d30602702c9089cd0b7bf168b34b", @ANYRES16=r3, @ANYBLOB="040000000000fedbdf250300000008000100000000000800020002000000"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)=0x0) tgkill(0x0, r4, 0x3e) sendmsg$NLBL_CALIPSO_C_LIST(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0xc054) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000380)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r5, 0x0) 14:34:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="bd", 0x1, 0x0, &(0x7f0000bb6000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000c00)='j', 0x1, 0x0, 0x0, 0x0) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FBIOGET_FSCREENINFO(r2, 0x4602, &(0x7f0000000000)) [ 204.958047] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 204.983572] sg_write: data in/out 262577/104 bytes for SCSI command 0x1-- guessing data in; [ 204.983572] program syz-executor.3 not setting count and/or reply_len properly [ 205.046152] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 205.082473] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5122 sclass=netlink_route_socket pid=8770 comm=syz-executor.2 [ 205.135267] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 205.158189] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 14:34:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$sndseq(r1, 0x0, 0x0) [ 205.231975] sg_write: data in/out 262577/104 bytes for SCSI command 0x1-- guessing data in; [ 205.231975] program syz-executor.3 not setting count and/or reply_len properly [ 205.277274] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 205.279871] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5122 sclass=netlink_route_socket pid=8786 comm=syz-executor.2 14:34:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) [ 205.320859] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 14:34:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) creat(&(0x7f0000000140)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) setxattr(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='user.o'], 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8000, 0x0) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000380)={0x0, 0x85, "d759fb196fcbc950b6e71940fc96caf7b3636cfcc6b881229e9e57e8e9005ba7e472833e4d14e68a847f5c3d7ea722b06270358882ebe3bc0d05462c0a9a8400cc81d0742fe4152a431e3ef303e09e6b8d15b2ac14a0ef96e66418a8b61a300981788ef089e855fcde0dd6aec8eca41e09de86012f3dda37e2f19b50f8b29e3d104048418e"}) rename(&(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000100)='./bus/file1\x00') 14:34:25 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x92) r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @local}, 0x10, 0x0) accept4(r2, 0x0, &(0x7f0000000040), 0x80000) mkdirat$cgroup_root(0xffffff9c, 0x0, 0x1ff) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) readv(r1, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) write$P9_ROPEN(r3, &(0x7f0000000080)={0x18, 0x71, 0x2, {{0x2, 0x2, 0x1}, 0x9}}, 0x18) add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000480), 0x0, 0xfffffffffffffffd) [ 205.517058] sg_write: data in/out 262577/104 bytes for SCSI command 0x1-- guessing data in; [ 205.517058] program syz-executor.3 not setting count and/or reply_len properly [ 205.571082] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 205.605332] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 14:34:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) [ 205.639729] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. 14:34:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000002c0)) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x24157399c53f58d3}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x38, 0x2, 0x3, 0x401, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x24}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x33}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x2a}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x2, 0x1}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20008004}, 0x40) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000024001d00"/20, @ANYRES32=r7, @ANYBLOB="00000000f1ffffff000000000800010064727200"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) connect(r2, &(0x7f0000000140)=@ll={0x11, 0x0, r3}, 0x80) sendmsg$can_bcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$sndseq(r1, 0x0, 0x0) 14:34:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) 14:34:25 executing program 0: mkdir(&(0x7f0000000100)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x5) epoll_wait(r1, &(0x7f0000000140)=[{}], 0x1, 0x80) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) r2 = inotify_add_watch(r0, &(0x7f0000000000)='./control\x00', 0xa2000ac0) inotify_rm_watch(r0, r2) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0xf8f5d2d1df6eca76, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r3, 0x80184153, &(0x7f00000026c0)={0x0, &(0x7f0000002640)=[&(0x7f0000000180)="536a8419e0d0548308314e883ef31947643c909e64314bfc89a793680e22f2e81adfa0b8069fa1001ec853da92b5ee660c9fd34f67bcdbebee7e40a713bff38b7d3b44a979e2ededa68fbe765b128fd93261d14e59b7e09f36a16c1efa1b910aede6b6933af33f7cc5ff809eba13ba83b8c17283cf2d514b4f6033e61d9b82dbd147", &(0x7f00000000c0)="b62126a5fda10e6a5ca42ba847650f398e1420d222e15ca3ac26ff34da18a22d474e31359629888b7af0d2e8329c", &(0x7f0000000240)="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", &(0x7f0000001240)="b714a24b069de224d75a7ddc46bd9f7e110d04aea3ae48c68e", &(0x7f0000001280)="cd495d31d2254fdfd5edbfd20f85bd3d79910f401871ed83e371afaa9806f87f5aebbd76846f75597f5a4d1af01f590617cff1a8d30627056ba747f29e8d4ff3dae003339a8c3d56f4b17e9d9de97ec087b6b24ace6b04a380ae398d849519524951f070564c49b5b1fb3045ef02e25be51d44fd37412a887642684e7bba26f8bddb964c530c586ccda3e21eeaec2f7de2da87d99d65623b71f63e70ae3d897250ab917272f839c59e515bf24d3354b5f2a4f609fafb89430a3a3647493fea5b22cf6a85988a4038461872ff7c63e11b5bc1060755f3319ec7db99f9c1530a62fb7078f028f9cb10602dee", &(0x7f0000001380), &(0x7f00000013c0)="bc734d4617ce49de05eff57af7f2f1f3bf80b32eb9dd8580a336580beb1a7603de38d0cf9ea912fad7e450731fc511504a6102cf2ab12ad38963861bc49055b123fe240de1a67762289e0b70844bdd8281db4976919fd8a1932e13b6a7f21391136dbe98916a0530712712cb067129d43afcc2375850ec624ecfa81aa9991a62f308f0520ef6ca9c841efd69b18953e35f733b2d57e2b5f154a89e18f3f1c43786cdd3fcb96214c7db2808fd2ed1a68742b03de8ed45d5bf3b354cddb4ef860fb517012c", &(0x7f00000014c0)="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", &(0x7f00000024c0)="599c4ae7b103a20dd458f0fd1b8a7df1a42d2c8ea1cde38ea46024a32315964d12bf10e833a909e5319b2c700496ab0c725546b5ee1737d6a1156c9cdde231b33f003f4c9d25853fe24b4839a402f889c3ee96fab817b544040796c3ed59149695f5e16047d0d525d5ca5754b81428227e4f5294cc00d103bbf6ef84f78289d9aa050b2b56918b488ee55240ed0fb7245434efbf62830d8b51b453f89871eca40bb4e1bff1bb4519b1b695c56a29831fd2cd5a835745cd068f03b50c", &(0x7f0000002580)="8893852e9b4ee31fd37d06c1fb897934a8384dab1d296ba61b1995d3f34b53c2ffa724ac56af6cf45075c9065e14a77c68ed3755c4c6d6923eb9641702af451bed033baa76d0fdede00f3a0462946dd8ce45bdea9624281938d26a10ebfdee7e778a458a36434689b4160b28b5cc960c5e1f35ee77e558820eb3e50d534e98cc5f271d118b68e5b7f87ea66c379507a5bb44"]}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0xa4000011}) [ 205.790121] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 14:34:25 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r2, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={&(0x7f0000000180)={0x14, r3, 0x27c6ffd0feb13cf7, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)={0xec, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x4}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x40}, {0x6, 0x11, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x6b6}, {0x6, 0x11, 0xfd}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x6000}, {0x6, 0x11, 0x6}}]}, 0xec}, 0x1, 0x0, 0x0, 0x840}, 0x929fe968484fbb3a) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010008506000000000000000000f6ff00", @ANYRES32, @ANYBLOB="fe2f0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=@newlink={0x78, 0x11, 0x40d, 0xfffffffc, 0x0, {0x10}, [@IFLA_LINKMODE={0x5, 0x11, 0x8}, @IFLA_MAP={0x24, 0xe, {0x2, 0x7, 0x100000000, 0x2, 0x3, 0xa6}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x5}, @IFLA_IFNAME={0x14, 0x3, 'macvlan0\x00'}]}, 0x78}}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 14:34:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x4b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x4000000000000000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x1) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'syz0', "f6634e2a9e001068114b95d301855eab7e1dfc57ba890930550e275596c521b0cf896a109d5f4656185619bc519c09f8f4f49d8f4b383af2825db190ed18df97dc8283586bd08d4fb17b653854ab1bb357bc9b7cb8c3012e90285df556a2b562c497dac835cc5cf68daa0d970d6d1a25efc24385ec"}, 0x79) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000680)='./bus/file1\x00', 0x0, r1) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000006c0)=ANY=[@ANYRESHEX, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) fchown(0xffffffffffffffff, 0x0, r1) r2 = syz_open_procfs(0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) inotify_init1(0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) ioctl$PPPIOCSFLAGS(r3, 0x40047459, &(0x7f0000000140)=0x10020102) lsetxattr(&(0x7f0000000000)='./bus/file1\x00', &(0x7f00000001c0)=@random={'security.', 'syz0'}, &(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x15, 0x2) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x0, &(0x7f0000000040), 0x4) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$VT_RELDISP(r2, 0x5605) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) [ 206.007218] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 14:34:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) [ 206.074851] audit: type=1400 audit(1595946865.913:16): avc: denied { block_suspend } for pid=8825 comm="syz-executor.0" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 14:34:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) [ 206.182899] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 206.191760] hub 9-0:1.0: USB hub found [ 206.233820] hub 9-0:1.0: 8 ports detected 14:34:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 206.465064] device bond1 entered promiscuous mode 14:34:26 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000180)=[{&(0x7f0000000000)="e3", 0x1}], 0x1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e28, 0x0, @remote}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x80) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000300)=0x5b11, 0x4) socket$netlink(0x10, 0x3, 0x13) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x48000) dup(0xffffffffffffffff) ptrace$cont(0x1f, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1) ftruncate(r3, 0x80006) sendfile(r2, r3, 0x0, 0x8000fffffffe) 14:34:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000000c0), 0x0) 14:34:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:26 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) flistxattr(r0, &(0x7f00000003c0)=""/238, 0xee) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) sendmsg$RDMA_NLDEV_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x50}, 0x1, 0x0, 0x0, 0xc840}, 0x0) r2 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/adsp1\x00', 0x80142, 0x0) ioctl$SNDCTL_DSP_STEREO(r2, 0xc0045003, &(0x7f0000000100)) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xfffffff4) 14:34:26 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADDIR(r2, &(0x7f0000000100)={0x2a, 0x29, 0x2, {0x480000, [{{0x10, 0x1, 0x1}, 0xf54e, 0x3, 0x7, './file0'}]}}, 0x2a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r4, 0x40086424, &(0x7f0000000380)={r5, 0x2}) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r9, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f00000001c0)={&(0x7f0000000200)={0x1c, r6, 0x711, 0x0, 0x0, {0x7}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r6, 0x100, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r6, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x380}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x70}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4800}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r10}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)={0x1, 0xfb13, 0x7fff7fff, {0x77359400}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 206.635757] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 206.674213] bond2 (uninitialized): Released all slaves [ 206.769946] audit: type=1800 audit(1595946866.603:17): pid=8907 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=15900 res=0 14:34:26 executing program 5: syz_emit_ethernet(0x62, &(0x7f0000000280)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0cfdff", 0x2c, 0x6, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x3, 0xa}, @fastopen={0x22, 0x2}, @timestamp={0x8, 0xa}]}}}}}}}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000040)={0x12ad1cbabec0c6e0, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x3909c5, 0x3, [], @value64=0x3}}) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x14c, r3, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x400000}, {0x6, 0x11, 0x100}, {0x8, 0x15, 0x176}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0xfffff000}, {0x6, 0x11, 0x2}, {0x8, 0x15, 0x10000}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8}, {0x6, 0x11, 0x5}, {0x8, 0x15, 0x10000}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x400}, {0x8, 0x15, 0x9}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x7fff}, {0x6, 0x11, 0x84}, {0x8, 0x15, 0x9}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x40}, 0x4) 14:34:26 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="0122000013fb0000ff7fff7f00000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="000000000100000000000000000000009372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"/80], 0x80}}, 0x0) 14:34:26 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 207.033646] syz-executor.5 (8919) used greatest stack depth: 23320 bytes left 14:34:27 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) prlimit64(r0, 0xe, &(0x7f0000000280)={0x8, 0x400000000000003}, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f00000006c0)=""/4096) write(r2, 0x0, 0x0) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./bus\x00'}, 0x10) sendfile(r3, r4, 0x0, 0x8400f7ffff16) creat(&(0x7f0000000680)='./bus\x00', 0x0) 14:34:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) r2 = getpid() sched_setattr(r2, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) timer_create(0x3, &(0x7f00000002c0)={0x0, 0x22, 0x1, @tid=r2}, &(0x7f0000000300)=0x0) timer_settime(r3, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x3938700}}, &(0x7f0000000380)) socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x84000, 0x0) ioctl$KVM_IOEVENTFD(r4, 0x4040ae79, &(0x7f0000000240)={0x5001, &(0x7f00000001c0), 0x1, r5, 0x8}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r6, &(0x7f0000000140)=@ll={0x11, 0x0, r7}, 0x80) sendmsg$can_bcm(r6, &(0x7f00000000c0)={0x0, 0x3a, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB="052d12ba87087ffa7f000081000000000000555ca0cc275eef4e7b00000000000000000000df1d841838cad3f2948693fb239350e80bd35d5495f5e144990ddbe808be920188b4541fd132d88cc48bed0f07f9e07100"/99, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="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"], 0x80}}, 0x0) r8 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r8, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$RDS_FREE_MR(r8, 0x114, 0x3, &(0x7f0000000280)={{0xd6e3, 0x80}, 0x40}, 0x10) 14:34:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:27 executing program 3: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000200)=0x4) clock_gettime(0x0, &(0x7f0000000140)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r3, 0x1, &(0x7f0000000240), &(0x7f0000000300)) timer_settime(r2, 0x1, &(0x7f0000000180)={{}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x9, 0x0, &(0x7f0000000280)={0x0, r4+10000000}, &(0x7f00000002c0)) [ 207.385785] audit: type=1800 audit(1595946867.223:18): pid=8936 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=15749 res=0 14:34:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:27 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockname$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) listen(r3, 0x81) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) sendmsg$can_bcm(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) [ 207.506443] audit: type=1800 audit(1595946867.323:19): pid=8936 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="bus" dev="sda1" ino=15749 res=0 14:34:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0xfffffffffffff1aa, 0xfffffffc, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3cusgrVex:De', 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x10001, 0x400) recvfrom$inet(r1, &(0x7f0000002480)=""/4096, 0x1000, 0x100, &(0x7f0000000140)={0x2, 0x4e24, @empty}, 0x10) r2 = gettid() tkill(r2, 0x31) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1ce) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r3, &(0x7f00000017c0), 0x218, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r4 = syz_open_dev$tty1(0xc, 0x4, 0x2) r5 = dup(r4) write$UHID_INPUT(r5, &(0x7f0000001440)={0x2400, {"a2e3ad21ed6b52f99cfbf4c087f719b4d026e7ff7fc6e553f836500e8b546a1b374b94370890e0878fdb1ac6e704e366b4956c409b3c2a5b67f3988f7ef31952a981ffe8d178708c523c921b1b5a4b0a169b5b9b36cd3b78130daa61d8e809ea882f5802b77f07227227b7ba67e0e78657a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179cef309f4cff7738596ecae8707ce065cd5b91cd0ae193973735b36d5b1b63e91c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c30900000000000000a85e89c46329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecd03aded6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b76383709d8f5c55432a909fda039aec54a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1f416e56c71b1931870262f5e801119242ca5b6bfc821e7e7daf2451138e645bb80c617669314e2fbe70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987a67399eac427d145d546a40b9f6ff14ac488ec130fb3850a27afc953854a642c57519544ae15a7e454dea05918b4124351601611c8f11baa500a3621c56cea8d20ff911a0c41db6ebe8cac64f17679141d54b34bbc9963ac4f4bb3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a867e1088334975e9f73483b6a62fa678ca14ffd9f9db2a7869d85864056526f889af43a60560a22f1fca567e65d5e880572286522449df466c632b3570243f989cce3803f465e41e610c20d80421d653a5120000008213b704c7fb082ff27590678ef9f19001800000bc7041d860420c5664ba7921b14dc1db8892fd32d0ad7bc946813591ad8deff4b05f60cea0da7710acf2e31caa04b2e286bea37ce0d0d4aa202fef5952a5391fd5615d429a04a689b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2f05dd3318271a1f5f8528f227e79c1388dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4fb8a48a76eefc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f146684078416d59fdee5325928974d12dad99dac44c3f0008047096a44060bebc2420aed92fa9b6578b4779415d97b9a6d6d5495c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2aed9e53803ed0ca4ae3a9737d214060005ea6f1783e287b3bee96e3a7288afe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f48fe4eae9ca1207e78283cd0b20ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e67d1d7232f17696294378ce716dacfc5e3e03cf7ab8e3902f1b0ff034ef655b253ca509383815b1b6fc6522d4e4fdc11a48cf42d48604675fde2b94cf02b98a269b891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efedfd71af9444e197f47e866101496f42355bc7872c827467cfa5c4e72730d56bd068ed211cf847535edecb7b373f78b095b68441a34cb51682a8ae4d24ad0465f7927f889b813076038e79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdcce04579b5561dc825ab829827945e020c1f67ee615f7084a607a7eceb6243378e0610060f02cca4051c2f001edb3d78fb4b55668dda93aec92a5de203717aa49c2d284acfabe262fccfcbb2b75a2183c4e15a7b6eb65ca8104e1b4da1fbb7dc7ab2fc043aead87c32ab875ee7c2e7b7019c902cd3b43eaeb1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e94265c803b35ee5f83a2b210520106b8a358b50ab7a1fa89af9c251fe5294b3d1802d5676d95f160ec97b1ad948741b2044642c37b4a6cc6c04effc1672db7e4b68d787d9a7a508ae54b3cd73643de50e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6f00cb11db4a5fade2a57c1023bf70cc77737c3b42aae501b20f7694a00f16e2d0174035a2c22656dc29880acebdbe8ddbd75c2f998d8ac2dfad2ba3a504767b6b45a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b59d7bcddff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c48b75c0f73c497579773767075428067e7f16f4dde374f8211fef42cb468e623daf60b3569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40426db6fe29068c0ca3d3414442e863a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071115c8982ba46af4d6adcc9f68a75b9397b035153faf46366e7205dd8d6f37525c1a0e94610dd9432971215d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae44369ddb4581c55925d0f6f1ba471eba281f259152f85a654fb39ddff3b484439ff158e7c5419e037f3e3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a39973132f02768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51097b40517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864ae090d81eaee5ee6cf1d0ab378dd4dd891e937c2ea5410e05130935e00785ec27e923911fab964c271556527697b52160687461602f88df165d884b36ec2b6c25a2f33c715687e9ddbfb96d6861aca47da73d6f3144345f48843dd014e5c5ad8fe995754bd9cf32fce1e7027132f2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6d594f88a4facfd4c735a20307c737afae5336651b1b9bd522d60399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1aa3a3766d5439020484f4113c4c859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee29165895ac4b008e595f437491d87abed02cefcd9db53d94d02dae17b118e5d6787463181f4b87c10772d2b13f7809959bc048850613d17ca51055f2f416a44fe180d2d50c312cca7cb14a2bdc331f57a9817139a206fc76d57227ffff2de20a4b8e3737fbb42913777c06376f799eba367e21f94ca598705f5dcb767d6f84fad6b0f6095e53c4c4234d0c1fbe434f6ab8f43c0013ee93b83946ee7759e89d7bdd1a32d7b3110b932a4d02da711b757fe43c06d21e35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7f96093530e76692839d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc238a081f758cefcce3fbf4625a7e7de40e42e07b34449e15eb0305626afb1dd179b8a065cc7348663a52190202c7af288a4510de03dab19d26285eda89156d50dd385a60333ba5bbf5d77cd7007ad1519ad5470de3dd6d6080cafccf8a97406bb6b68a1f0c4549820a73c880f475f732ae00398e8bd1f4908b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cb0b3e35cb80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c60edddab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d0687dc746b0827cbf652f406c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6528341b648cdd56fed7cdcbb1575912d5ecd36dea3bca0b7427d8392c6289455e8f8d2ab2242729251ae033a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c6f14c27693102a3cd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08758897fb411a94b3c2fc5d5f0db42c0456ec014508e5247d33ae6c962d35603ff8454c16f8342856935125102bb784ed714887071f3d998efdd9923c954ab6ce431b63ee356b0c785f2f47b90e29389f22fc5b59a70efaea2bd40595af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a12830052fcc460db043afe525629b40d7cee658e4cb5e930ed624806c43a006dc9336d07c2b8081c128ad2706f48261f7897084c297a1a6613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da3932ba5c04c24a560ad80a3ce654578376e599aff3565b1d531f30912b99e6619ebe93cc0b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2b9e935c5af3cf474bed79dfc248c1f5aea40686e730861e83d89d0fe662a46b7f71cd47744db86c50b704c971d90195c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e6491953264d2700c838fa2c7b34252600c9654e502dcea39cb6bc3eb69992e234b4ca7db2f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe36d7d3e5db21b094b8b77940b5f07722e47a08d367e5f84c96ec664b72934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1162dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1dfb1c68cc164b0a0780d971a96ea2c4d4ca0398c2235980a9307b3d5bd3b010a3ad0a5dbed2881a9700af561ac8c7e36bb2fc4c40e9cf96f06817fb903729a7d528ed15b97c9ede7885d94ff1aa70826ad01a9b03c37b0969be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c148cd2f9c55f4901203a9a8a283e90f3943dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d0fc5a752f90", 0x597}}, 0x1006) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'a', ' *:* ', 'wm\x00'}, 0x9) [ 207.552400] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 14:34:27 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 207.695435] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 14:34:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$fb(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000f, 0x2010, 0xffffffffffffffff, 0xa5000) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x10) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x17) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r5}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000300)={r5, 0x5}, 0x8) write(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010002508000000000000020000000000", @ANYRES32=r6, @ANYBLOB="000000000000000008000a0014"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x5, 0x0, 0x0, r6}}, 0x20}}, 0x0) 14:34:27 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r3, 0xab08) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff00c}, {0x80000006}]}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB='H'], 0x48}}, 0x0) [ 207.982357] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 208.106878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8981 comm=syz-executor.3 14:34:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:28 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000340)={'tunl0\x00', r7, 0x1, 0x8, 0xef51, 0x8bb4, {{0x2d, 0x4, 0x0, 0x35, 0xb4, 0x66, 0x0, 0x20, 0x29, 0x0, @private=0xa010100, @broadcast, {[@cipso={0x86, 0x50, 0x3, [{0x1, 0xd, "9da892e3640e57bd6b8618"}, {0x1, 0xc, "233a95b9c823454d2a83"}, {0x2, 0x9, "686ab61e02d98a"}, {0x6, 0x11, "b6dc21de7edd4bdcc20218a74f4d43"}, {0x7, 0x6, "3543341c"}, {0x0, 0x11, "72d401bac60187c89596d12b099c8d"}]}, @lsrr={0x83, 0x23, 0xf6, [@rand_addr=0x64010100, @multicast2, @local, @multicast2, @empty, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @rr={0x7, 0x7, 0x44, [@rand_addr=0x64010102]}, @timestamp={0x44, 0x14, 0x25, 0x0, 0x6, [0x2, 0x9, 0x7, 0x2b]}, @ssrr={0x89, 0xb, 0xbf, [@remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', r8}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001000000000000000ffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c001a80090001004d6f6e64000000000c00028006000b"], 0x3c}}, 0x0) close(r2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff000005000000000000000000", @ANYRES32, @ANYBLOB="0000000000401800280012800a00010076786c616e"], 0x3}}, 0x0) socket(0x10, 0x803, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) [ 208.329732] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 14:34:28 executing program 3: dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0x6) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket(0x10, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x11) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, 0x0, 0x880) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03068bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x134}}, 0x4000080) 14:34:28 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f00000000c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x101406, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r5, 0x0) write$binfmt_misc(r5, &(0x7f0000000100)=ANY=[], 0xffa8) ioctl$TIOCNXCL(r5, 0x540d) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x54, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='ocfs2\x00', 0x0, 0x0) 14:34:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:28 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) r1 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r0, 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000940)=@delchain={0x2698, 0x65, 0x100, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, {0x9, 0xfff3}, {0xd, 0xe}, {0xf, 0xfff2}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x2658, 0x2, [@TCA_TCINDEX_SHIFT={0x8, 0x3, 0x6}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xfff2, 0x1}}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xfff3}}, @TCA_TCINDEX_HASH={0x8, 0x1, 0x7db1}, @TCA_TCINDEX_ACT={0x2600, 0x7, [@m_nat={0x214, 0xd, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x16c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x1, 0xfff, 0x8, 0x4, 0x7}, @local, @multicast1, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x80000001, 0x20, 0x10000000, 0x4, 0x78c}, @dev={0xac, 0x14, 0x14, 0x30}, @broadcast, 0xff000000}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x0, 0x3, 0x1, 0x5b9f, 0x7}, @dev={0xac, 0x14, 0x14, 0x1e}, @broadcast, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xa47, 0x0, 0xffffffffffffffff, 0x10000, 0x6}, @multicast1, @multicast1, 0xffffffff, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x101, 0x6, 0xffffffffffffffff, 0x80, 0x7}, @empty, @empty, 0xffffff00, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x8, 0x400, 0x3, 0x3, 0xca4}, @local, @loopback, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x1, 0x80, 0x0, 0x2, 0xeae0}, @multicast2, @multicast2, 0xff000000, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0x2, 0x4, 0x6, 0x39b}, @rand_addr=0x64010100, @rand_addr=0x64010101, 0xffffffff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x7f, 0xe12, 0x10000000, 0x6, 0x4}, @remote, @rand_addr=0x64010102}}]}, {0x83, 0x6, "3df88a96de22ca2a48e477db7d3b9d7922293ab968487e2dbb168fc7a2eb35caabdaff550b0cea4d200b509364d336325f3edb9fcda10577420d8cfdb56df927fdb170ea862b0f7fc6d82d1e598b68e9893b7f6744618cb994979658a9c369f0c0640c0adc7db4d44a39f13b6aa559748382ec89ec0160886c09837c37b7fa"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_tunnel_key={0x15c, 0xc, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x54, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e23}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @dev={0xfe, 0x80, [], 0x35}}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @initdev={0xac, 0x1e, 0x1, 0x0}}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e21}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x6, 0xf2, 0x4, 0x0, 0x3}, 0x1}}, @TCA_TUNNEL_KEY_NO_CSUM={0x5, 0xa, 0x1}]}, {0xdc, 0x6, "ba5cba6960c814186a082f57657a8e73948abb5e4ef25223664616372f772efded226b2a63d4c2f6643d8bfd04a735805a2bf981fbd584b75a394b482259363ad20c94b417a27f08cdeb5c93a4caff6b5b6b13307ab235331a7c8cc1a02c34b67145a1f749e72eefaf1fe60e5334fcb46b5aaa840d491e91c61a5e64dcc3092bf51fb6ae232f4e7d4f47ab085a67f2c93bf37ff6efd15d9008eb7cb06f70575bcfcdfad131e96421ccd31df5078a368ada78082c29a750d25513d8d0053a1c04052bebe034aa546f9b7262f3148a4ee941a3050864b30769"}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}, @m_pedit={0x1fb4, 0x16, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x1f24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xef8, 0x4, {{{0xcf2be9, 0x8001, 0x4, 0x1, 0x2}, 0x7f, 0x4, [{0xe6, 0x4, 0x10000, 0x5, 0x1, 0x20}, {0x1ff, 0x6, 0x152, 0x9, 0x2c, 0x3ff}, {0x0, 0x0, 0x6, 0xff, 0x40, 0x4}, {0x1, 0x93, 0x8, 0x9, 0x2, 0x1f}, {0x2, 0x38, 0x2943, 0xffff, 0xffffffff, 0x9060}, {0x0, 0x2, 0x7fffffff, 0x100, 0x80000001, 0x1000}, {0x3, 0x138c, 0x3, 0x4, 0x7fffffff, 0x10001}, {0xffff, 0x5, 0x101, 0x8, 0x5, 0x7}, {0x1ff, 0x5, 0x8, 0xfffff800, 0x2, 0x10001}]}, [{0x39, 0x741bb32f, 0x8, 0x477, 0x7ff, 0x7fff}, {0x1, 0x3, 0x3e3, 0x80, 0xa, 0x9}, {0x5, 0x4, 0x80, 0xc, 0xdce, 0x2}, {0x7f, 0x6, 0x7, 0x9, 0x23, 0x3}, {0x4, 0x200, 0xfff, 0x10000, 0x401, 0xfffffffb}, {0x4, 0x8, 0x7, 0x400, 0x5, 0x4}, {0xd9a6, 0x0, 0x80, 0xffffffff, 0xb9, 0xbf28}, {0xe6b, 0xfffffff9, 0x5, 0x80000000, 0x0, 0x81}, {0x800, 0x2, 0x1, 0xe5f0, 0xd559, 0x7}, {0x6, 0x4, 0x0, 0x7, 0x1, 0x1}, {0x8, 0x101, 0x4, 0x3, 0x81, 0x9}, {0x6, 0x9, 0x7, 0x3, 0x6, 0x6}, {0x7, 0x7fffffff, 0x7, 0x6, 0x8001, 0x1}, {0xffff, 0x2, 0x8, 0x8, 0x3f, 0xffffff7f}, {0x0, 0x1, 0x5, 0x3, 0x6, 0x5}, {0x5, 0x7fff, 0x0, 0x20, 0x0, 0x7fff}, {0xfffffff8, 0x7fffffff, 0x81, 0x3, 0x33, 0x8}, {0xfff, 0x2, 0xa6d, 0x17a, 0x1, 0xf954}, {0x58, 0x7f, 0x6, 0x81, 0x2}, {0x3, 0x200, 0x6, 0x1, 0x2, 0x68}, {0x220, 0xb01a, 0x0, 0x8, 0x3ff, 0x7f}, {0x9, 0xfff, 0x3, 0x1, 0x4, 0xffff}, {0x9, 0x0, 0x1000, 0x10000, 0x5, 0x80}, {0x324, 0x8001, 0x1f, 0x1000, 0x5, 0x67b0}, {0x7fffffff, 0x0, 0x54, 0xf9f5, 0x6, 0x10001}, {0x8, 0x6, 0x5, 0x7, 0x40, 0x5}, {0x0, 0x6, 0x3, 0x3, 0x8, 0x7}, {0x8001, 0x10000, 0x9, 0x6, 0xce28, 0x7}, {0x79ed, 0x7fffffff, 0x9, 0x3, 0xffff, 0xff}, {0x8, 0x80000000, 0xfffffffc, 0x0, 0xfffffffa, 0x6}, {0x20, 0x3, 0x35ea, 0x200, 0x6, 0x45}, {0x7f, 0x3, 0x5511, 0x101, 0x2, 0x9}, {0x363, 0x8, 0x7, 0x65, 0x1, 0xffffffff}, {0x401, 0x1, 0x3f, 0xfffffff9, 0x5, 0x9}, {0xfffffffa, 0xfffffffb, 0x8, 0x1, 0x401, 0x5}, {0x8, 0x8001, 0x1, 0x8000, 0x7fff}, {0x7ff, 0x83e0, 0xe8, 0xffff, 0x0, 0x800}, {0xd700, 0x40, 0x101, 0x29655469, 0xfffffff9, 0x7}, {0xffffffc1, 0x1000, 0x3, 0x43, 0xff, 0x1}, {0x4, 0x9, 0x7ff, 0xfffffeff, 0x200, 0x3f}, {0xffff7fff, 0x70d3594c, 0x5, 0x5, 0x9, 0x8e}, {0x9, 0xfffffc01, 0xbd94, 0x5, 0x0, 0x1101cf7b}, {0x1, 0x1, 0x687, 0xffff, 0x80000001, 0xca}, {0x8000, 0xfffffff8, 0x4c0000, 0x20, 0x0, 0x100}, {0x7, 0x2879, 0xfff, 0x7, 0x1, 0x1}, {0x8, 0x4, 0x9, 0x81, 0x4, 0x42}, {0x650d, 0x2, 0x6, 0x267, 0x9, 0x93f6}, {0x3, 0x8001, 0x80000001, 0x7, 0x81, 0xa9c}, {0xdce, 0x5e, 0x0, 0x7ffe, 0xcd, 0x7}, {0x80000000, 0xa8e, 0xd4, 0x1ff, 0xa5800000, 0x1}, {0xeb2c, 0x7, 0x37e1, 0x800}, {0x7, 0x5, 0x0, 0x7, 0x101, 0x6}, {0x1, 0x5ce, 0xa7ea, 0x4, 0x9, 0xdf5}, {0x80, 0x40, 0x4, 0x5, 0x6}, {0x6, 0x1f, 0x5e5c3c30, 0x2, 0x7, 0xe4}, {0xfffffffe, 0x401, 0xd4, 0xf0d, 0x81, 0xffff}, {0x80000000, 0x94bc0000, 0x100, 0x2c, 0x40, 0x10001}, {0xff, 0x8, 0x7, 0x6, 0x8000000, 0x2}, {0x2, 0x40, 0x2e7, 0x8, 0x4, 0xfffffeff}, {0x6, 0x20, 0x63, 0x7955, 0x3ff, 0x81}, {0x0, 0x7, 0x75a, 0x7041ffc0, 0x400, 0x5}, {0x40, 0x6, 0x9, 0xf67, 0x1000, 0x4}, {0x9, 0xff, 0x401, 0x1ff, 0xffffffff, 0x3ff}, {0x1, 0x5548, 0x3bbd5fa8, 0x6, 0x0, 0x101}, {0x10000, 0x3, 0x1, 0xffff7a8b, 0xffffffac, 0x8}, {0x7fff, 0x0, 0x1, 0x48, 0x2, 0x10000}, {0xc8, 0x400, 0x7, 0xfff, 0x2, 0x4}, {0x7, 0x8, 0x7, 0xfffffffa, 0xfffffffc, 0x50144e5}, {0x8000, 0x34e, 0x6, 0x7, 0xea36, 0x10001}, {0x1, 0x16210e98, 0x2, 0x7fffffff, 0xa4e, 0x9}, {0x8, 0x1, 0x1000, 0x0, 0x2, 0x8}, {0x7fff, 0x80000001, 0xffffffff, 0x0, 0x80000001, 0x401}, {0x62bd5222, 0x1, 0x1000, 0x100, 0x3, 0x81}, {0x9, 0x4bc, 0x2, 0x7, 0x4, 0xc15d}, {0x8, 0x50, 0x1, 0x1, 0x5, 0x8000}, {0x4, 0x4, 0x80000000, 0x81, 0x40, 0xe92}, {0x3, 0x1, 0x1, 0x8, 0xfffffff8, 0x2}, {0x40, 0x30000000, 0x8001, 0x25d, 0x6, 0x7}, {0x10040000, 0x0, 0x1800000, 0x9, 0x7, 0x9}, {0x3, 0xf3, 0x200, 0x2, 0x2, 0xefcc}, {0x6, 0xdeb2, 0x7, 0x6, 0x4e, 0x9}, {0x9, 0x8001, 0xff, 0x7fac, 0x7, 0x1}, {0x88d7791e, 0x1ff, 0x4, 0x4, 0x6, 0x81}, {0x7ff, 0xe602, 0x4, 0x2, 0x7, 0x10001}, {0x9, 0x0, 0x401, 0x5, 0x6, 0x401}, {0x2, 0x4, 0x0, 0x0, 0x4}, {0x1, 0x9, 0x401, 0x2, 0x200, 0x6}, {0x200, 0x10001, 0x3, 0x3f, 0x10000, 0xf37e}, {0xc5, 0x8, 0x80, 0x6b8, 0x0, 0x8}, {0x7, 0xffffff6a, 0x1f, 0x7f, 0x2, 0x9}, {0x4, 0x4f5, 0x6, 0x1, 0x2, 0x1}, {0x0, 0x3, 0x400, 0x10001, 0x200000, 0x8001}, {0xffffa844, 0x80000001, 0x0, 0x1, 0x100, 0x1f}, {0xbc, 0xc96f, 0x4, 0x390, 0x3, 0xc3a}, {0x0, 0x2, 0x3, 0x9aed, 0xf01, 0xff}, {0x101, 0x200, 0xfff, 0xcb, 0x396d, 0x9}, {0x845, 0x7f, 0xfffffbff, 0x7, 0x3, 0x3}, {0x73, 0x800, 0x6d44, 0x400, 0x2, 0xc486}, {0x2, 0x3, 0x3ff, 0x8f, 0x29, 0x8001}, {0x9, 0x7, 0x9, 0x3, 0x100, 0x49}, {0x3, 0x400, 0x6, 0x8, 0x4, 0x68}, {0x6, 0x8, 0x4, 0x4, 0x3, 0x4}, {0xcb, 0x0, 0x4, 0xfff, 0x80000001, 0x80}, {0xfffffffc, 0x401, 0x100, 0x63f8, 0x5, 0x5}, {0x6, 0x400, 0x401, 0x5, 0xffffffff, 0x400}, {0xd5, 0x0, 0xd8, 0x0, 0x2, 0x5}, {0x38c, 0x5, 0x800, 0x3, 0x8, 0x804}, {0xfffffffb, 0x8, 0xba, 0xff7f81af, 0x10001, 0x39d1}, {0x5, 0x3, 0x8000, 0x7, 0x4, 0x402e}, {0x0, 0x7, 0x69, 0x5, 0x47, 0x5}, {0x8, 0x9, 0x1, 0x9, 0x1ff, 0x2ca8}, {0x5, 0x4, 0x1f, 0x1000, 0x7f, 0x2739}, {0x9f, 0x4bc, 0xd5c, 0x47, 0x0, 0x6}, {0xfffffffc, 0xa0e, 0xffffffff, 0x1, 0xb6be, 0x7}, {0x1, 0x0, 0x1, 0x8000, 0x7, 0x3f}, {0x8, 0x0, 0x5c2, 0x17, 0x40, 0x81}, {0x7, 0x871d, 0xffffffc6, 0x0, 0x7fff, 0xbb}, {0x2, 0x9, 0xdeb6, 0x80, 0x80000000, 0x8}, {0x2, 0x2, 0x0, 0x80000000, 0x30, 0x117}, {0x9, 0x1, 0x7fffffff, 0x401, 0x3ff, 0x6}, {0x81, 0x8001, 0x7, 0x0, 0x80, 0x3}, {0x101, 0x7fff, 0x3e8, 0x7, 0xffffff22, 0xffffffa9}, {0x20, 0x6, 0x5, 0x7fff, 0x4, 0x5}, {0x8, 0x1, 0x30ce44cb, 0x2, 0x7, 0x8}, {0x3ff, 0x7, 0xfffffffc, 0x4, 0xfffffff8, 0x4}, {0x200, 0x3f, 0x6af, 0x7fff, 0x10001, 0x7}, {0xffffff76, 0x9, 0x80000001, 0xffff, 0x3f, 0x5}, {0x93e9, 0x9, 0x7115, 0x101, 0x0, 0x7}], [{}, {0x1, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x3}, {}, {0x2}, {0x5}, {0x1, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x4}, {0x4, 0x1}, {0x3}, {0x1}, {0x7}, {0x3}, {0x3}, {0x2}, {0x2, 0x1}, {0x4, 0x1}, {0x4}, {0x4, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x5}, {0x4}, {0x2}, {0x6df43decebfc51f3, 0x1}, {0x3}, {0x5, 0x1b00d0426450aa16}, {0x2, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x7}, {0x0, 0x1}, {0x3}, {0x4}, {0x4, 0x1}, {0x2}, {}, {0x4}, {0x2, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x2, 0x1}, {0x5}, {}, {0x5, 0x1}, {0x3, 0x1}, {}, {}, {0x3, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x0, 0x1}, {0x4}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x6, 0x1}, {0x5}, {0x0, 0x1}, {0x4}, {0x2}, {0x3}, {0x1, 0x1}, {0x5}, {0xb, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x4}, {0x0, 0x1}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x2, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x5}, {0x3, 0x1}, {0x4}, {0x2, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x1}, {0x4, 0x1}, {0x3}, {0x3}, {0x3, 0x1}, {0x3, 0x1}, {}, {}, {0x1, 0x1}, {0x0, 0x1}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x2}, {0x2}, {0x0, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x7, 0x1}, {0x2}, {0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x1}, {0x2}, {0x5}, {0x4, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0xa8, 0x5, 0x0, 0x1, [{0x44, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_PARMS_EX={0xe80, 0x4, {{{0xc00000, 0xffffffff, 0x4, 0x3}, 0xa9, 0x50, [{0xf6bd, 0x1c00, 0x3, 0x4, 0x0, 0x9}, {0x3ff, 0xfffffff8, 0x6, 0x7, 0x9a68, 0xa3e6}, {0x9, 0x8, 0x0, 0x0, 0x80000000, 0xffff}, {0x2, 0x2, 0x4, 0xa25, 0x4, 0x5}]}, [{0x6, 0x6, 0xe73f, 0x7, 0x4, 0x9}, {0x800000, 0xff, 0x4, 0x4, 0x7}, {0x4, 0x4, 0x0, 0x0, 0x8, 0x4}, {0x9, 0x5, 0x49f, 0x7, 0xfff, 0x847a}, {0x30c, 0x5, 0x7, 0x7ff, 0xea6e}, {0x1, 0x5, 0x0, 0xff, 0x6, 0xffffc6ba}, {0x80000001, 0x401, 0xf488, 0x3, 0x7f, 0x2}, {0xfffffffe, 0x7, 0x6, 0x80000000, 0xbe64, 0x7}, {0x5, 0x800, 0xfffffff9, 0x2, 0xfffff001, 0xffe0000}, {0x9, 0x80000000, 0x3, 0x3a, 0x1f, 0x6}, {0x9, 0x0, 0xa15, 0x100, 0x6, 0x8}, {0x5, 0x4, 0xfffffffe, 0x6, 0x7, 0x7fffffff}, {0x6, 0x6, 0x3, 0x3, 0x773, 0x101}, {0x20, 0x4, 0x200, 0x7, 0x6, 0xac}, {0x800, 0x4, 0x2, 0x8, 0x4, 0x2}, {0x3, 0xffffffe0, 0x40, 0x80000000, 0x2, 0x5bfd}, {0x3, 0x7fffffff, 0xeef8, 0x0, 0x3, 0x1f}, {0x5, 0x5, 0x40, 0x1, 0x6, 0x401}, {0xdd6, 0x1, 0x5, 0x2}, {0x2, 0x0, 0x7, 0x7, 0x1, 0x1}, {0x20, 0x1, 0x101, 0xfffffff9, 0x80000001, 0x9}, {0x2, 0x401, 0x1f07, 0x5, 0x800, 0x4}, {0x9, 0x0, 0x3, 0xfffff000, 0x10000, 0x1ff}, {0x5, 0x9, 0x0, 0x7, 0x10000, 0xb5}, {0x30cbee94, 0x4, 0x4, 0x1401, 0x8, 0x8}, {0x8, 0x7e2f35c, 0x8000, 0x1, 0x0, 0x6}, {0x9, 0xc, 0x937, 0x0, 0x5, 0x81}, {0x0, 0xffff, 0xfffffe00, 0xfff, 0x7ff, 0x7fffffff}, {0x9, 0x462, 0x3510, 0x400, 0x7, 0x7}, {0x0, 0x5, 0xff, 0x7, 0x9, 0x10000}, {0x0, 0x1, 0x8000, 0xffffffff, 0x1, 0x7}, {0x8f2, 0xfffffff9, 0x6, 0x4, 0x1, 0x1}, {0x487, 0xe61, 0x2cb, 0x57, 0x0, 0x400}, {0x4, 0x5b, 0x7, 0x10000000, 0x4, 0x100}, {0x5, 0x10000, 0x0, 0xfff, 0x5}, {0x7, 0x0, 0x101, 0x8000, 0x80000001, 0x8001}, {0x661, 0x4, 0x6, 0x800, 0xfffffc00}, {0x5b00, 0x5, 0x1ff, 0x8035, 0x9, 0x1ff}, {0x8, 0x5, 0x1, 0x4, 0x6, 0x9}, {0x8, 0x81, 0x44146fdc, 0x4}, {0x2, 0x21, 0x8, 0xc93, 0x4, 0x3}, {0x10000, 0x4, 0x93, 0x1, 0x5, 0x81}, {0x200, 0x0, 0x80000000, 0x547, 0x7f, 0x7}, {0x0, 0x88, 0x7, 0x100, 0x4, 0x80}, {0x3, 0x1, 0x2, 0x5, 0x1, 0x4}, {0x2a12, 0x3ff, 0x7, 0x10001, 0x3, 0x6536}, {0x0, 0x80000001, 0x8, 0x9, 0x8001, 0x1ff}, {0x1, 0x7f, 0x33a, 0x7, 0x8, 0x3}, {0x5, 0x77, 0x3e, 0x1, 0x0, 0x438}, {0x6, 0x7, 0x1, 0x80000001, 0x5, 0x6}, {0x0, 0x1ff, 0x8000, 0x4, 0x2, 0x8}, {0x0, 0x6, 0x2, 0x40, 0xbc9, 0x2}, {0x80000000, 0x6, 0x35, 0x3, 0x11, 0x7}, {0xfff, 0xe78, 0x7, 0x58, 0x7, 0x5eb}, {0x6, 0x7, 0x3, 0x5, 0x0, 0x9}, {0x80000001, 0x9, 0x2000000, 0x3, 0x8, 0x8}, {0x2, 0x7, 0x1000, 0x8, 0x0, 0x6}, {0x7fffffff, 0x2, 0x3ff, 0x1, 0x0, 0x8}, {0x1e5, 0xffff, 0x1000, 0x788d, 0x80000000, 0x1}, {0x401, 0x8, 0x10001, 0x4c, 0xffffffe0, 0x10001}, {0x5, 0x2, 0xcd, 0xf7e0, 0x7ff, 0x9b2}, {0x1ff, 0x7, 0x7, 0x80000001, 0x1ff, 0xff}, {0xb0e, 0x31, 0x2, 0x5, 0xfe4, 0x80}, {0x1, 0x1000, 0x4452, 0x3, 0x3, 0x7c71}, {0x7fff, 0x80000000, 0xae6, 0x1, 0x9a5b, 0x8}, {0xff, 0x0, 0x6, 0x1a, 0x6, 0x6}, {0x0, 0x0, 0x8, 0x5, 0x6, 0xffffffff}, {0x2, 0x0, 0x99, 0x4, 0x0, 0x8}, {0x5, 0x8, 0x4, 0x1000, 0x1, 0xd94}, {0x0, 0x7fff, 0xc, 0x4, 0x1000, 0x5}, {0x0, 0x81, 0x1, 0x401, 0x3, 0xcf30}, {0x2, 0x2, 0x8, 0x5, 0x5, 0x1ff}, {0xfffffff8, 0x4, 0x4, 0x6, 0x101, 0xc}, {0xfc1cbe4, 0x5, 0x1ff, 0xfffffff9, 0x0, 0x530}, {0x3, 0x4, 0x7, 0x100, 0x5, 0x1}, {0x6034, 0x9, 0xffff, 0x5, 0x3}, {0x40, 0x8f, 0x0, 0x0, 0x1, 0x5e}, {0xffff, 0x6, 0x100, 0x9, 0x6, 0x40}, {0x1, 0xa2, 0x38d, 0xfffffffc, 0x2, 0x4}, {0x1, 0x6, 0x8813, 0x3826, 0x400, 0x8}, {0x7, 0x4, 0x8ef, 0x6, 0xc6, 0x5}, {0x9, 0x9, 0x1, 0x8000, 0x10000, 0x4}, {0xffff, 0x2, 0x5e, 0xffffffff, 0x6, 0x6}, {0x8000, 0x4, 0x5, 0x7, 0x7fff, 0x6978}, {0x0, 0xfffffffd, 0x9, 0xbadf, 0x20, 0x7}, {0x3, 0x1, 0x6, 0x3, 0x0, 0xb8}, {0x0, 0x1, 0x80, 0x1, 0xfffffffd, 0xfffffffb}, {0x10000, 0x80000000, 0x7, 0x7ff, 0x3, 0x5e}, {0x5, 0x7, 0x2, 0x1, 0x8, 0x40}, {0xffff, 0x1, 0x401, 0xff, 0x1ff, 0x7fbc}, {0x0, 0x0, 0x4, 0x8, 0xe7, 0x1f}, {0x8, 0x3, 0x6a, 0x1, 0x2, 0x1}, {0x3ff, 0x5, 0xffffffff, 0x7, 0x7fff, 0xfffffffa}, {0x81, 0x6, 0x400, 0x3ff, 0x1000}, {0xffffffff, 0x7, 0x423, 0x3, 0xef, 0x446}, {0x7, 0x5, 0x3f, 0x32ac, 0x3f, 0x3}, {0x0, 0x8, 0x4, 0x1, 0x8, 0x79}, {0x3, 0x2, 0xffffffff, 0x200, 0x1, 0x929}, {0xa692, 0xa7c, 0xfffffff9, 0x3f, 0x8000000, 0x104c}, {0x4, 0x1, 0x9, 0x0, 0xfffffff8, 0xffffff7f}, {0x6, 0x20, 0x7fffffff, 0x2, 0x81}, {0xffff, 0x7ff, 0x6, 0xf8, 0x3f, 0x2}, {0x3, 0x6, 0x1000, 0x80000000}, {0x24, 0x80000000, 0x6, 0x7, 0x1, 0x3}, {0x2, 0x0, 0x8, 0x4, 0x2, 0x3}, {0x1, 0x400, 0xda4, 0x0, 0xffff, 0x9}, {0x3, 0x8000, 0x0, 0x3, 0x5, 0x2}, {0x200, 0x2, 0x101, 0x1, 0x9, 0x38}, {0x1, 0x81, 0x5, 0x4, 0x1, 0x6}, {0x8001, 0x1fa, 0x0, 0x80000001, 0x7, 0x1}, {0x6, 0x53d5357b, 0x8, 0x9, 0x1, 0x100}, {0x20000000, 0x2, 0x3, 0x7, 0xf8d, 0x6}, {0x7, 0xfb85, 0xffffffff, 0x8000, 0x4, 0x6326}, {0x1f, 0x2, 0x1, 0x8, 0x1, 0x7fff}, {0x7, 0xffffffff, 0x400, 0x0, 0x2, 0x80000000}, {0x6, 0x2, 0x8bad, 0x4, 0x401, 0xf4f9}, {0xd9c, 0x7, 0xe45, 0x7, 0x2, 0x8}, {0x80000000, 0x0, 0xc00, 0x8, 0x4, 0x8}, {0x6, 0x0, 0x40, 0x3ff, 0x7fffffff, 0x2}, {0x8, 0x6, 0xb02, 0xffff, 0x7, 0x8c0}, {0x7ff, 0x9, 0xffffffc0, 0x1, 0x9, 0x1}, {0xfaa, 0x2c, 0x4, 0x8d1, 0x8, 0xffff}, {0xca, 0x5, 0xf24c, 0x7, 0x5, 0x7}, {0x2, 0xc0, 0x2, 0x36, 0xff, 0x1}, {0x80000001, 0x7, 0x2, 0x4, 0xff, 0x200}, {0xffffff7f, 0x0, 0xfffffffd, 0x3, 0x1, 0x1}, {0x3, 0x7, 0x1, 0x6, 0xfffffff7, 0x3}, {0x1, 0x5, 0x42f, 0xfffffff8, 0x7, 0xfffff612}], [{0x5}, {0x5}, {0x0, 0x1}, {0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x1}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x1}, {}, {0x2, 0xd72e08beccf8ab27}, {0x6}, {0xc0a0c24e46a28157}, {0x2, 0x1}, {0x2, 0x1}, {0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x4}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {0xc, 0x1}, {0x4, 0x1}, {}, {0x4}, {}, {0x1, 0x1}, {0x2}, {}, {0x1, 0x1}, {0x1}, {}, {0x0, 0x1}, {0x5}, {0x5}, {0x2, 0x1}, {}, {0x5}, {0x4}, {0x5, 0x1}, {0x3, 0x1}, {}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x5}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x3}, {}, {0x1, 0x1}, {0x0, 0x1}, {0x2}, {0x2}, {0x4, 0x1}, {0x3}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {}, {0x1, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x4}, {0x1, 0x1}, {0x3}, {0x4, 0x1}, {0x4, 0x1}, {0x4}, {0x4, 0x1}, {0x1, 0x2}, {0x2}, {0x5}, {0x3}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x2}, {}, {0x2, 0x1}, {0x4, 0x1}, {0x1}, {0xb, 0x1}, {0x0, 0x1}, {0x3}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x5, 0x33fe7e2b978d3c93}, {0x4, 0x1}, {0x2}, {0x4}, {0x3}, {0x5, 0x1}, {0x4, 0x1}, {}, {0x2, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x1}, {0x3, 0x1}, {0x5}, {0x5}, {0x4, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x5, 0x3}, {0x4}]}}, @TCA_PEDIT_KEYS_EX={0x100, 0x5, 0x0, 0x1, [{0x44, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x2c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}]}]}, {0x68, 0x6, "a1d741177fc3db3033f2ce6496a272d1b4739373b7ecd4f03c65a9c86532c4871bd2aa864704e0e362fc3907b78c264636e23fa087001a7d3968f7d49f3883f9377f1d1b301feaaa2fbbd7acfa170a992dfecc4422be86ef3e9a7d5c6eedac67045239ab"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_police={0x120, 0x6, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x10, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x3f}]]}, {0xe8, 0x6, "9decec00153f3b5eae44f9a6db1ce7d6ebcc8cd2eaeaf705ea996e5b18b2c2fbd9051aab9e149f95e3c293d0bafd49d7c6df5b181df47fb59b9c9c278a662440ec58ba9953ceda95ddca65bd7b4fdec306bcb6467a371e184b9f0d107d5011e23ccae6ebfc2a9f049f2ff5a0a0a86769b7d8d9de886d4d5030ee2aba63608edda3582a21bd1a6342f64767d80ee152c6ca60633ec91ca9f0b7162380623b224a907cd731d37f93ba866b7de6f4918ff768a64d1c40e9fe0dc3abbe75d555b86ed6b7ad201f206eab6bbcec13696531364951114d5e80ad5d276e14ac204e7bd867c20454"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x3}}}}, @m_vlan={0xa0, 0x17, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x48, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xb49}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x81, 0xfe2, 0x6, 0xad, 0xffff}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x5d0}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x6}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x691}]}, {0x2e, 0x6, "c385b38f860c0a4193c494bccdd79527e281b1d14031006651c648e1f103ed9507218bf20707f24c8685"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}, @m_ct={0x118, 0x1a, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x6c, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e23}, @TCA_CT_LABELS_MASK={0x14, 0x8, "4a6e9af40f5dd45534221fd7f18004e0"}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_CT_MARK_MASK={0x8, 0x6, 0x9}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @local}, @TCA_CT_ACTION={0x6, 0x3, 0x19}, @TCA_CT_ZONE={0x6, 0x4, 0x8d8e}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e22}, @TCA_CT_LABELS_MASK={0x14, 0x8, "9b41455c71aec6a61c219a51456f627d"}, @TCA_CT_MARK_MASK={0x8, 0x6, 0x2}]}, {0x85, 0x6, "477f59244f6b686451c320c76bc5ca41f82823895faf3865daf3e91550edab5df3a131cb4d90e412776b1c61bab62df5b571894eecbe5eb9a932ab1fe129a8574f9d919270b948912c594ef4e50662e57e198d53b9480ee4ada05bc0271b63501a31ab973f45379196ad6edfde5cb49ee62b08a27017a9dd2bec08df0133a2b25a"}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}, @TCA_TCINDEX_HASH={0x8, 0x1, 0xbc4f}, @TCA_TCINDEX_FALL_THROUGH={0x8}, @TCA_TCINDEX_HASH={0x8, 0x1, 0x8766}, @TCA_TCINDEX_POLICE={0x1c, 0x6, [@TCA_POLICE_RATE64={0xc}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x400}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_CHAIN={0x8, 0xb, 0x283a}]}, 0x2698}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}}, 0x0) connect(r0, &(0x7f0000000140)=@can={0x1d, r5}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 209.094925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=101 sclass=netlink_route_socket pid=9027 comm=syz-executor.2 14:34:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 209.205086] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=101 sclass=netlink_route_socket pid=9022 comm=syz-executor.2 14:34:29 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="ff00000013fb0000ff7fff7fc22a172227944877886656032b0213f079497dee858c50a6303cf3681ca248ba74b0e6a2a64ef93bb6016d5ce0e5bee6ea805ce99e7bfa53073b0100000039f0d1eb78ff29a50facb942e076a8dd46fb701061e60101f272bb34c37f13177c995f423f187a97880cb46f7e199268ccf00801e1ff00000000899d06678ff947de57bfad0086972a", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="000000000100000000000000000000009372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d218100000000000000000000000000000000000020000000000000eeff000000"], 0x80}}, 0x0) 14:34:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:29 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00'}) connect(r0, &(0x7f00000001c0)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:29 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = getpid() syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000)='NLBL_CIPSOv4\x00') sched_setattr(r4, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000200)={{0xa, 0x1, 0x9, 0xfffffff9, 'syz0\x00', 0x68841308}, 0x0, 0x1, 0x183d, r4, 0x3, 0x2, 'syz0\x00', &(0x7f00000001c0)=['\x9a(\x00', '[]&\x00', 'vxcan0\x00'], 0xe, [], [0x6, 0x7fff, 0x9, 0x724e]}) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r6, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r7}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x7, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x2, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}, 0x1, 0x0, 0x0, 0xa0}, 0x0) 14:34:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:29 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sysvipc/msg\x00', 0x0, 0x0) sendmsg$OSF_MSG_REMOVE(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)={0x12b4, 0x1, 0x5, 0x301, 0x0, 0x0, {0x7, 0x0, 0xa}, [{{0x254, 0x1, {{0x0, 0xba10}, 0x8, 0x0, 0x3, 0x81, 0x24, 'syz0\x00', "689e3770ef9f1cccd151c1e72447e8f4e97baff7782559232d77e6cca82207d9", "dd631ce724be979ebd3bc6569f516df5b0a8456c6096e2376a1b15d414c26c01", [{0x5, 0xef96, {0x1}}, {0x3, 0x3, {0x2, 0x8}}, {0x9, 0x2, {0x1}}, {0x6, 0x1, {0x3, 0x5be5e60}}, {0x0, 0x200, {0x1, 0x7}}, {0x400, 0x80, {0x0, 0x4}}, {0x0, 0x7, {0x2, 0x1}}, {0x4, 0x4d61, {0x1, 0x3}}, {0x8, 0x5, {0x3, 0x8}}, {0x8000, 0x1ff, {0x3, 0x46}}, {0x100, 0x3, {0x2, 0x6}}, {0x7fff, 0x5, {0x1, 0x5}}, {0x399e, 0x80, {0x2, 0x1}}, {0x6, 0x5, {0x3, 0x2}}, {0x4, 0x800, {0x3, 0xfffffff8}}, {0x9, 0x4, {0x0, 0x1}}, {0x5, 0x6, {0x3, 0x80000001}}, {0x8000, 0xf9b9, {0x1, 0xfffffff8}}, {0x8, 0x0, {0x1, 0x4}}, {0xf9, 0x8, {0x2, 0x4}}, {0x1, 0x101, {0x1, 0x5}}, {0xd1e6, 0x7ff, {0x3, 0x20}}, {0x6, 0x4, {0x1, 0x7}}, {0x6, 0xfb9, {0x7, 0x9}}, {0x5, 0x40, {0x0, 0xd86}}, {0x20, 0x2, {0x3, 0x2400}}, {0x7ff, 0x6, {0x0, 0x3}}, {0x6, 0xeb9, {0x2, 0x8}}, {0x1ff, 0x0, {0x1, 0x5}}, {0x0, 0xee, {0x2, 0x1ff}}, {0x2, 0x101, {0x0, 0x9}}, {0x23c2, 0xcf8, {0x3, 0x2}}, {0xac, 0x2eff, {0x1, 0x7ff}}, {0x1, 0x0, {0x2, 0x1}}, {0x1, 0x5, {0x1, 0x3}}, {0x2, 0x2, {0x1, 0x409}}, {0xb, 0x4, {0x3, 0x5}}, {0xfff, 0xfffd, {0x1, 0xa038}}, {0x700, 0x3, {0x2, 0x80000000}}, {0x3, 0x4, {0x2, 0x4}}]}}}, {{0x254, 0x1, {{0x0, 0xc63}, 0x6, 0x6, 0x5, 0x6, 0x9, 'syz1\x00', "52b781fb333d4c64528219db1c507a575114b08520ca7df5daa575df601effe8", "53e39eb9546f0aa13751524d3a137835796611c8274dc1706bd05a7f37bc6949", [{0x15, 0x1, {0x0, 0x6}}, {0x4, 0x6, {0x0, 0x3}}, {0x54, 0x8, {0x3, 0x16}}, {0x7, 0x4, {0x0, 0x8001}}, {0x0, 0x8, {0x1, 0xffff}}, {0x6, 0xe7, {0x3, 0x5}}, {0x0, 0xfeff, {0x2, 0x6}}, {0xffff, 0x6, {0x0, 0x7}}, {0x1, 0xff, {0x3, 0x9}}, {0x1, 0x614, {0x3, 0x3}}, {0x8001, 0x1, {0x1, 0x9}}, {0xbb8, 0x9, {0x2, 0x401}}, {0x8, 0xff81, {0x3, 0xe6}}, {0x4, 0x2, {0x3, 0x80000001}}, {0x0, 0x2, {0x3, 0x7}}, {0x8, 0x8000, {0x1, 0x8}}, {0x6, 0x0, {0x2, 0x6}}, {0x9726, 0x50, {0x1, 0xfffffff9}}, {0x40, 0x1, {0x3, 0x283}}, {0x7, 0x3, {0x3, 0x2}}, {0x5, 0x101, {0x2, 0x22d}}, {0x639d, 0x7, {0x2, 0x2}}, {0x0, 0x53c0, {0x0, 0x5}}, {0x8, 0x3, {0x1, 0x7}}, {0x14, 0x449c, {0x3, 0x1000}}, {0x800, 0xffff, {0x1, 0xa15f}}, {0x8, 0x8763, {0x0, 0x70e2}}, {0x251, 0x6, {0x1, 0x5}}, {0x7f, 0x4e33, {0x2, 0x8}}, {0x0, 0x8, {0x0, 0x4}}, {0x7, 0x4, {0x2, 0x7}}, {0xb732, 0x2, {0x1, 0x5}}, {0x100, 0x6, {0x0, 0x7}}, {0x8fa8, 0x4, {0x2, 0x1ff}}, {0x0, 0x94, {0x0, 0x1}}, {0x8, 0x2, {0x0, 0x7}}, {0x0, 0x40, {0x0, 0x80000001}}, {0x1, 0x8, {0x3, 0x7}}, {0x1ff, 0x7ff, {0x3, 0x6}}, {0x9, 0xa964, {0x1, 0x8001}}]}}}, {{0x254, 0x1, {{0x1, 0x1f}, 0x6, 0x9, 0x200, 0x544, 0x28, 'syz0\x00', "d4a281dd36ae60c685eb9da264bcf936e994151338d9ce19882f5611502471ce", "4d34c41498b0892b5d69978502ee028aaffbcd7d61f1433d1974a1996a373a1f", [{0x7ff, 0x3f, {0x3, 0x828}}, {0x780f, 0x3, {0x2, 0x7ff}}, {0x1000, 0x1ff, {0x3, 0x9}}, {0x4, 0x2, {0x3, 0x4}}, {0x401, 0x5, {0x3, 0x7fffffff}}, {0x9, 0x401, {0x0, 0x6}}, {0x9, 0x4b, {0x2, 0x3}}, {0x3, 0x7ff, {0x0, 0x2}}, {0x0, 0x1, {0x1, 0x5}}, {0x7, 0x1, {0x1, 0x6}}, {0x6, 0x2, {0x3, 0x1}}, {0x3, 0x8001, {0x0, 0x4}}, {0x7fff, 0x0, {0x2, 0x8001}}, {0x7, 0x8000, {0x1, 0x2}}, {0x4, 0x1, {0x1, 0x9}}, {0x6, 0x8, {0x3}}, {0x4, 0x8, {0x0, 0x3}}, {0x2, 0x1, {0x0, 0xd3aa}}, {0x6, 0x8, {0x2, 0x7}}, {0xff, 0x200, {0x1, 0x3}}, {0x14d, 0x40}, {0x5, 0x7ff, {0x3, 0x61}}, {0x7, 0x2, {0x3, 0x400}}, {0x1ff, 0x5, {0x1, 0x4}}, {0x6, 0x0, {0x0, 0x4}}, {0x4, 0x80, {0x2, 0x2}}, {0xfd, 0x2, {0x3, 0x6}}, {0x1, 0xfabb, {0x3, 0x3f}}, {0x2, 0x1f, {0x0, 0x6}}, {0xff7f, 0x0, {0x1, 0x7ff}}, {0x0, 0x2, {0x1, 0x9f78}}, {0x2f33, 0xe71, {0x0, 0x7}}, {0x200, 0x5e, {0x0, 0xa57}}, {0x1, 0x6, {0x0, 0x1f}}, {0x9, 0xffe0}, {0x8, 0x28, {0x0, 0x1}}, {0x1000, 0x1ff, {0x2, 0x9}}, {0x0, 0x1, {0x1, 0x55a0}}, {0x6, 0x8, {0x3, 0x80000000}}, {0x4, 0x1, {0x2, 0xff}}]}}}, {{0x254, 0x1, {{0x0, 0x101}, 0x8, 0x5, 0x6, 0x200, 0x1c, 'syz0\x00', "c4b8d0c08982ba12a0f30fd7e2d4ec208605465ad7c0f20bcda61ed878a6067d", "0bdfaabb4b80182d8bb3007b30dd9509976498d4fa6f3e93e7d5dc5f6ccaa2a3", [{0x9, 0x1000, {0x0, 0x7f}}, {0x1, 0x9, {0xca9b84d2cdebde18, 0x1}}, {0x8e, 0x81, {0x1, 0x2}}, {0x0, 0xe1, {0x3, 0xcf}}, {0x7ff, 0x1, {0x0, 0x78c5}}, {0x1, 0x2050, {0x1, 0x7}}, {0x3, 0x3, {0x3, 0x1}}, {0x0, 0x1, {0x2, 0x1}}, {0x3, 0x7, {0x1, 0x9}}, {0x7, 0x0, {0x1, 0x8}}, {0x7, 0x200, {0x3, 0x279b}}, {0x200, 0x9, {0x2, 0x5}}, {0xfff, 0x8, {0x1, 0x200}}, {0x200, 0x2, {0x2, 0x7800}}, {0x100, 0x1f, {0x1, 0x9}}, {0x2, 0x1ff, {0x2, 0x6}}, {0x81, 0xff1, {0x1, 0x81}}, {0xffff, 0x1, {0x1, 0x6}}, {0x40, 0x80, {0x3, 0xf5}}, {0xff, 0x1, {0x0, 0x5}}, {0x1ff, 0x3f, {0x2, 0x80000001}}, {0x3, 0x8, {0x3}}, {0x1, 0x6, {0x1, 0x3}}, {0x800, 0xfe00, {0x0, 0x1}}, {0x100, 0x7265, {0x2, 0x80}}, {0x2, 0x400, {0x0, 0x9}}, {0x3f, 0x6, {0x0, 0xffffffff}}, {0x200, 0x5, {0x1, 0x10000}}, {0x7f1, 0x1}, {0x7fff, 0x7cd, {0x0, 0x4}}, {0x2, 0x3, {0x3, 0x6}}, {0x20, 0x4, {0x1, 0x7fffffff}}, {0x0, 0xcc, {0x1}}, {0xffc1, 0x6, {0x1, 0x9}}, {0xff, 0x401, {0x3, 0x5}}, {0x2, 0x3, {0x2, 0x1000}}, {0x2, 0x8, {0x0, 0x10001}}, {0x8, 0x3ff, {0x2, 0x5}}, {0x20, 0x1f, {0x2}}, {0xaa, 0x7, {0x0, 0x3}}]}}}, {{0x254, 0x1, {{0x0, 0xffff}, 0x3, 0x1, 0x8, 0x3, 0x26, 'syz0\x00', "265a6bb07b2e58d9548a4d635c4807aa2813711e08fafa3ece65f2393860528d", "2a37f26bfc6b15952f7c17061c0d9420f95e9ac61a3006629c10a923f73ba17e", [{0x6, 0x100, {0x1, 0x4}}, {0x7, 0xffff, {0x1, 0xffffffff}}, {0x2, 0x3, {0x2, 0xff}}, {0x5, 0x1, {0x0, 0x6}}, {0x6, 0x80, {0x2, 0x8}}, {0x1, 0x0, {0x6, 0x1}}, {0x8, 0x1d92, {0x2, 0x6}}, {0x5e, 0x7, {0x2, 0x9}}, {0xfffc, 0xba, {0x3, 0x7ff}}, {0x6, 0x0, {0x2, 0x20}}, {0x8, 0x800, {0x3, 0x1}}, {0x6, 0xe3, {0x2, 0x10001}}, {0x7, 0x5, {0x2, 0x3d}}, {0x6, 0x7, {0x3}}, {0x9, 0x0, {0x0, 0x3}}, {0x3, 0x0, {0x3, 0x8000}}, {0x1, 0x4, {0x0, 0x7fffffff}}, {0x6, 0x7, {0x1, 0x4}}, {0x5, 0x1f, {0x3, 0x6}}, {0x100, 0x8, {0x1, 0x311}}, {0x1, 0x3, {0x3, 0x4}}, {0x4, 0x2, {0x1, 0x6}}, {0x0, 0x3, {0x1, 0x84}}, {0x3f, 0x1, {0x1, 0x5}}, {0x9, 0x4, {0x2, 0x61}}, {0xffff, 0x2, {0x1, 0x2}}, {0xbd3, 0x6, {0x0, 0x1ff}}, {0x10, 0x0, {0x0, 0x4}}, {0x3ff, 0x5, {0x2, 0xdb}}, {0x7, 0x7, {0x0, 0x401}}, {0x9, 0x9, {0x2, 0x6f}}, {0x8000, 0x1ff, {0x1, 0x20e}}, {0xffaa, 0x1, {0x1, 0x4}}, {0x7ff, 0x6, {0x0, 0x3f}}, {0x9, 0x7d1, {0x2, 0x400}}, {0x6f, 0x7, {0x1, 0xffffffff}}, {0x8, 0x92c9, {0x1, 0x4}}, {0x4, 0x9, {0x3, 0xb3}}, {0xfe00, 0x2fd4, {0x1, 0x2}}, {0x2, 0x2, {0x1, 0x400}}]}}}, {{0x254, 0x1, {{0xf286b45901c1cbdd, 0x1}, 0x46, 0x5, 0x0, 0x40, 0x6, 'syz0\x00', "f5f2e68c48b4602c03e543acc1702488d1e870daa7cb1e969ebd8a052d62be5e", "0b17c218aac5e6af16f4a2747d9d6d06af13de0a87f3ada802fca1af07956720", [{0x100, 0x20, {0x1, 0x1f}}, {0x0, 0x8, {0x1, 0x2}}, {0x2, 0x5, {0x3, 0x3ff}}, {0x0, 0x21e9, {0x1, 0x6}}, {0x200, 0x1000, {0x3, 0x5}}, {0x3, 0x0, {0x2, 0x1}}, {0xd803, 0x8000, {0x0, 0x7}}, {0xec, 0x2, {0x3, 0x401}}, {0xda, 0x8c, {0x2, 0xffff}}, {0xfff7, 0xa5, {0x0, 0x9}}, {0x8, 0x5, {0x1, 0x49a}}, {0x0, 0x2, {0x2, 0x8}}, {0x1, 0x5, {0x0, 0x20}}, {0x637d, 0x6, {0x0, 0x81}}, {0x7f, 0xb683, {0x1, 0x4}}, {0x3, 0x100, {0x1, 0x1f}}, {0x1, 0x3, {0x3}}, {0x4, 0x80, {0x1, 0x7fff}}, {0x4, 0x8001, {0x6, 0x6da}}, {0x3, 0xe5, {0x3, 0x6}}, {0x3f, 0x864, {0x0, 0x8}}, {0x345, 0x5, {0x1, 0x77b8b3ac}}, {0x4, 0x4, {0x2, 0x5383}}, {0x5, 0x1, {0x1, 0x5}}, {0xd, 0x7ff, {0x0, 0xfa}}, {0x4, 0x401, {0x0, 0x6}}, {0xfc9, 0x1}, {0x2, 0x7, {0x0, 0x6}}, {0x200, 0xcccf, {0x0, 0x7f}}, {0x82d1, 0x0, {0x1, 0x6}}, {0xfffe, 0x2, {0x0, 0xe7}}, {0x0, 0x1, {0x0, 0x5}}, {0x8fc, 0x7, {0x1, 0x5}}, {0x2, 0x81, {0x2, 0x6}}, {0x4b8, 0x5, {0x3, 0xf2cb}}, {0x20, 0x7f, {0x2, 0x20}}, {0x7f, 0x9, {0x2, 0x81}}, {0x8, 0x3, {0x2, 0x7ea6}}, {0x1, 0x10e, {0x1, 0x5}}, {0x5, 0x8, {0x2, 0x40000000}}]}}}, {{0x254, 0x1, {{0x2, 0x4}, 0x77, 0x5, 0x100, 0x0, 0x19, 'syz0\x00', "1f898a9d91b8738c5fbc64db8867813bd30a8cf8bde2ab663f7b9862a9e7b624", "42973f1bcdc2dedd04c318d34e519ec43079fb0210749d218252cdfe272936bf", [{0x0, 0x9, {0x0, 0x75}}, {0x3, 0x9, {0x1, 0x8001}}, {0xfffa, 0x5, {0x0, 0x20}}, {0x8, 0x7, {0x0, 0x8000}}, {0x2, 0xd, {0x3, 0x9}}, {0x9, 0x1000, {0x3}}, {0x0, 0xee, {0x3}}, {0x0, 0x4, {0x1, 0x80}}, {0x3, 0x2, {0x1, 0x1539}}, {0x3, 0x8, {0x2, 0x30f}}, {0x8, 0xfffb, {0x1, 0x7}}, {0x81, 0x7f, {0x1, 0x80000001}}, {0xfff7, 0x7, {0x0, 0x6}}, {0x7, 0x36a7, {0x1, 0x8}}, {0x400, 0x4, {0x3, 0x1}}, {0x200, 0x5746, {0x0, 0xfffffffb}}, {0x100, 0x2, {0x1, 0x9}}, {0x6, 0x7, {0x2, 0x8}}, {0x4, 0x5, {0x1, 0xba9}}, {0xc18, 0x2, {0x1, 0x6}}, {0x7, 0xffff, {0x2, 0xffffffff}}, {0x7ff, 0xbf, {0x3}}, {0x9, 0x7f, {0x3, 0x1}}, {0x8001, 0x3c69, {0x1, 0x7}}, {0x26, 0x200, {0x1, 0x5}}, {0x800, 0xff80, {0x0, 0x6}}, {0x3f, 0x0, {0x0, 0x9}}, {0x6, 0xe680, {0x2, 0x2}}, {0x7, 0x1, {0x0, 0x8}}, {0x3, 0x9, {0x2, 0xe3}}, {0x7f, 0x8b9, {0x2, 0x8}}, {0x0, 0x8000, {0x3, 0xffff0000}}, {0x2, 0x81, {0x2, 0x400}}, {0xeeca, 0x5, {0x1, 0x1f}}, {0xef4, 0x1, {0x0, 0x732e}}, {0xfffc, 0x7, {0x1, 0xc245}}, {0xe173, 0x7ff, {0x1, 0x1}}, {0x7, 0xa1, {0x1, 0x7c33}}, {0x9, 0x8, {0x1, 0x6}}, {0x0, 0x7f, {0x0, 0x3}}]}}}, {{0x254, 0x1, {{0x3, 0x3ff}, 0x2, 0x3, 0x3, 0x800, 0x9, 'syz1\x00', "1f4a13438e627463c79d550871dd306ba5c49be7091d37e8671856d2104b0114", "b01347cf35a42d32a3e6a8a177a413e80847179478082b9b567427d831be11e4", [{0x8, 0x5, {0x2, 0x2}}, {0x3, 0x120, {0x3, 0x7}}, {0x6f8, 0x0, {0x1, 0x54}}, {0x0, 0x5c, {0x1, 0x7ff}}, {0x40, 0xba00, {0x2, 0x8}}, {0xfff, 0x6217, {0x0, 0x8}}, {0x1, 0xd, {0x3, 0xdc53}}, {0x1, 0x7, {0x2, 0x80}}, {0x7f, 0x3f, {0x1, 0x7ff}}, {0x200, 0x1, {0x1, 0x85bf}}, {0x3, 0x7, {0x2, 0x1}}, {0x8000, 0x109, {0x3, 0x3}}, {0x8001, 0x1ff, {0x3, 0x7}}, {0xa3, 0x5, {0x0, 0x10000}}, {0xfc01, 0x23, {0x2, 0x5}}, {0x3f, 0x4, {0x0, 0x80000000}}, {0x562, 0x7, {0x0, 0x800}}, {0x1, 0x2, {0x2, 0x9}}, {0x5, 0x0, {0x2, 0x3f}}, {0x8, 0x7fff, {0x3, 0x8}}, {0xc3b, 0xb7, {0x2, 0x101}}, {0x800, 0x5, {0x0, 0x4}}, {0x7, 0x1ff}, {0x2, 0x38, {0x3, 0x3}}, {0x7, 0x4b39, {0x3, 0x9}}, {0x5, 0x1501, {0x2, 0x7}}, {0xfff9, 0x7, {0x0, 0x8001}}, {0x0, 0x5, {0x3, 0x4f9}}, {0x1, 0x200, {0x1, 0x2}}, {0x1000, 0x1, {0x2, 0x10000}}, {0x1, 0x200, {0x0, 0x2}}, {0x9, 0x9, {0x2, 0x101}}, {0x0, 0x8162, {0x2, 0x7fff}}, {0x40, 0x6, {0x2, 0x6}}, {0x4, 0x400, {0x0, 0x8001}}, {0x0, 0x1, {0x2, 0x40}}, {0x3, 0x5, {0x1, 0x598}}, {0x9, 0x33, {0x1}}, {0xea77, 0x38d, {0x0, 0x7}}, {0x9, 0x3, {0x1, 0x8}}]}}}]}, 0x12b4}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631fa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:29 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89b0, &(0x7f0000000140)={'veth1_macvtap\x00', @ifru_settings={0x3, 0x4, @fr_pvc_info=&(0x7f0000000000)={0x259f9e96, 'bridge_slave_0\x00'}}}) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x10001, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x20, 0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000280)={{}, {r1, r2/1000+10000}}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(0xffffffffffffffff, 0xc0385720, &(0x7f0000000100)) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, 0x0) unshare(0x40000000) prctl$PR_SET_TIMERSLACK(0x1d, 0x5) 14:34:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:29 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:30 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'vlan1\x00', {0x2, 0x4e24, @private=0xa010101}}) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000001c0)=""/142, &(0x7f0000000100)=0x8e) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x68, r7, 0x5, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @media='ib\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r7, 0x4, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0xffff}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x4000010) bind$bt_hci(r2, &(0x7f00000002c0)={0x1f, 0x3}, 0x6) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) [ 210.314287] nla_parse: 4 callbacks suppressed [ 210.314295] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 14:34:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 210.474472] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=9086 comm=syz-executor.2 14:34:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 210.605777] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 210.657544] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=9080 comm=syz-executor.2 14:34:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:30 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xe6, 0x20040) sendmsg$can_bcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x4, 0xff4b, 0x7fff7ffe, {0x77359400}, {0x77359400}, {}, 0x1, @canfd={{0x3, 0x1, 0x1, 0x1}, 0x1a, 0x1, 0x0, 0x0, "97acf831a6107802f036bc39aa160f35e5c19a65a2aaa0d68ed6145edc17fb6195af1dfd51fe9eda64981006e2e218d4f8d93bb5e51d4fb9996e50d30cd8397b"}}, 0x80}}, 0x0) 14:34:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:30 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) r2 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0100000013fb0200ff7fff7f00000000", @ANYRESDEC=r2, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="000000000100000000000000000000009372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"/80], 0x80}}, 0x0) 14:34:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x77359400}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) 14:34:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x80, 0x0, 0xde3, 0x7, 0x78}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={r3, 0x2, 0x30}, 0xc) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) accept4$llc(r4, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x10, 0x800) 14:34:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 2: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000100)={0xffffffffffffffff, 0xba4, 0x7c600000, 0x10000}) r1 = getpid() sched_setattr(r1, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x6, 0x2, 0x1, 0x0, 'syz0\x00', 0x7ff}, 0x6, 0x784cc602a8fe9f58, 0x8, r1, 0x5, 0x1, 'syz0\x00', &(0x7f00000001c0)=[']&\xfat\'&#-,#\x8d$#{]*[\x00', 'vxcan0\x00', 'vxcan0\x00', '/$\x00', 'vxcan0\x00'], 0x2a, [], [0x8, 0xfffe, 0x6, 0x1]}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r2, &(0x7f0000000140)=@ll={0x11, 0x0, r3}, 0x80) sendmsg$can_bcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r1}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="000000000100000000000000000000009372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"/80], 0x80}}, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 14:34:31 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x8}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x22004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) exit(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0, 0x0) 14:34:32 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x4, 0x0, [@sadb_key={0x4, 0x9, 0x88, 0x0, "8f2c0f4d0484adaf1b2986f5b3488b43db"}, @sadb_address={0x3, 0x6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x70}, 0x1, 0x7}, 0x0) 14:34:32 executing program 4: mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, r0}, 0x80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r7, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468", @ANYRES32=r1, @ANYRES16=r7, @ANYRES32=r6, @ANYRESDEC=r7, @ANYRESHEX=r7], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r9, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r3, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, r9, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'virt_wifi0\x00'}, @L2TP_ATTR_COOKIE={0xc}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x575}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xb1}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f00000001c0)) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x1, 0xfb13, 0x7fff7fff, {0x0, 0x2710}, {0x0, 0x2710}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "9372a07edb73955521d801f2be869631ea9506dd3d50254cfa5b2b020000b62d21810000000000000000000000000000000000002000"}}, 0x80}}, 0x0) 14:34:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:32 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vxcan0\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8, 0x1, 'drr\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x38, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4}}, @TCA_RATE={0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000008}, 0x0) r6 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000000)={r7, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000040)={r7, @in6={{0xa, 0x4e24, 0x3f, @private1, 0x10000}}, 0x7, 0xd3c, 0x0, 0x40, 0x8, 0x8, 0x6}, 0x9c) r8 = socket$caif_stream(0x25, 0x1, 0x0) recvmsg(r8, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r8, 0x8983, &(0x7f0000000000)) connect(r0, &(0x7f0000000140)=@ll={0x11, 0x0, r2}, 0x80) 14:34:33 executing program 0: mkdir(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 0: mkdir(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 213.281558] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 14:34:33 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 0: mkdir(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 213.496229] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 14:34:33 executing program 5: getpgid(0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) statx(r2, &(0x7f0000000240)='./file0\x00', 0x2000, 0x80, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./control\x00', 0x0, r5) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="02000000010007000000000002000200", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB="e574324ccb486537908ad41617e608000000c2628ef89c973606abf500", @ANYRES32=r5, @ANYBLOB="10000100000000002000010000000000"], 0x7c, 0x3) openat$sequencer(0xffffffffffffff9c, 0x0, 0xc00, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r6 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x5452, &(0x7f000031aff8)) sendmmsg(r6, &(0x7f0000002780), 0x3fffffffffffe8a, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) ioctl$FBIOPUTCMAP(0xffffffffffffffff, 0x4605, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 14:34:33 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4100, 0x1004}], 0x1) mkdir(&(0x7f00000000c0)='./control\x00', 0x3d) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x2c00) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000100)='./control\x00', 0xe4000c64) open(&(0x7f00000001c0)='./control\x00', 0x0, 0x0) 14:34:33 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:33 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0xcb777af773e296, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) dup(0xffffffffffffffff) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f00000002c0)={0x0, 0x1, @start={0x5, 0x1}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f0000000140)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000080}, 0xc800) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x60}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000180)=0x401, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000000, 0x8031, 0xffffffffffffffff, 0x0) 14:34:34 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:34 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:34 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:34 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:34 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 14:34:34 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:34 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 14:34:34 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:34 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 14:34:34 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:34 executing program 4 (fault-call:2 fault-nth:0): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:34 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000380)=""/141) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x3, 0x3, 0x201, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0xfffffeff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x20040041}, 0xc0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0xfffffd93}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @local, 0x0, 0x0, 0xfffe}) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x48c2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 215.077632] FAULT_INJECTION: forcing a failure. [ 215.077632] name failslab, interval 1, probability 0, space 0, times 0 [ 215.095451] CPU: 0 PID: 9345 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 215.103312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.112689] Call Trace: [ 215.115305] dump_stack+0x1b2/0x283 [ 215.119054] should_fail.cold+0x10a/0x154 [ 215.123235] should_failslab+0xd6/0x130 [ 215.127235] __kmalloc_track_caller+0x2bc/0x400 [ 215.131919] ? strndup_user+0x5b/0xf0 [ 215.135766] memdup_user+0x22/0xa0 [ 215.139326] strndup_user+0x5b/0xf0 [ 215.142975] ? copy_mnt_ns+0xa30/0xa30 [ 215.146883] SyS_mount+0x39/0x120 [ 215.150355] ? copy_mnt_ns+0xa30/0xa30 [ 215.154264] do_syscall_64+0x1d5/0x640 [ 215.158187] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 215.163400] RIP: 0033:0x45c369 [ 215.166606] RSP: 002b:00007f917d33fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 215.174357] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 215.181640] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 215.188922] RBP: 00007f917d33fca0 R08: 0000000000000000 R09: 0000000000000000 [ 215.196197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 215.203469] R13: 00007ffeaedbb38f R14: 00007f917d3409c0 R15: 000000000078bf0c 14:34:35 executing program 4 (fault-call:2 fault-nth:1): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:35 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:35 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 215.426339] FAULT_INJECTION: forcing a failure. [ 215.426339] name failslab, interval 1, probability 0, space 0, times 0 [ 215.477576] CPU: 0 PID: 9363 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 215.485444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.494839] Call Trace: [ 215.497465] dump_stack+0x1b2/0x283 [ 215.501110] should_fail.cold+0x10a/0x154 [ 215.505279] should_failslab+0xd6/0x130 [ 215.509290] kmem_cache_alloc+0x28e/0x3c0 [ 215.513465] getname_flags+0xc8/0x550 [ 215.517284] ? perf_trace_lock_acquire+0x510/0x510 [ 215.522233] user_path_at_empty+0x2a/0x50 [ 215.526408] do_mount+0x118/0x2a00 [ 215.529973] ? lock_acquire+0x170/0x3f0 [ 215.534119] ? lock_downgrade+0x740/0x740 [ 215.538303] ? copy_mount_string+0x40/0x40 [ 215.542570] ? __might_fault+0x177/0x1b0 [ 215.546657] ? _copy_from_user+0x96/0x100 [ 215.550821] ? copy_mount_options+0x1fa/0x2f0 [ 215.555324] ? copy_mnt_ns+0xa30/0xa30 [ 215.559221] SyS_mount+0xa8/0x120 [ 215.562681] ? copy_mnt_ns+0xa30/0xa30 [ 215.566580] do_syscall_64+0x1d5/0x640 [ 215.570487] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 215.575680] RIP: 0033:0x45c369 [ 215.578869] RSP: 002b:00007f917d33fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 215.586589] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 215.593883] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 215.601170] RBP: 00007f917d33fca0 R08: 0000000000000000 R09: 0000000000000000 [ 215.608442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.615711] R13: 00007ffeaedbb38f R14: 00007f917d3409c0 R15: 000000000078bf0c 14:34:35 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 14:34:35 executing program 4 (fault-call:2 fault-nth:2): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:35 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) [ 215.814962] FAULT_INJECTION: forcing a failure. [ 215.814962] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 215.826807] CPU: 0 PID: 9375 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 215.834621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.843984] Call Trace: [ 215.846591] dump_stack+0x1b2/0x283 [ 215.850235] should_fail.cold+0x10a/0x154 [ 215.854398] __alloc_pages_nodemask+0x22c/0x2720 [ 215.859170] ? __lock_acquire+0x5fc/0x3f20 [ 215.863431] ? perf_trace_run_bpf_submit+0x119/0x200 [ 215.868540] ? perf_trace_run_bpf_submit+0x119/0x200 [ 215.873652] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 215.878509] ? depot_save_stack+0x10d/0x3e3 [ 215.882839] ? perf_trace_lock_acquire+0x510/0x510 [ 215.887791] cache_grow_begin+0x8f/0x420 [ 215.891862] cache_alloc_refill+0x273/0x350 [ 215.896194] kmem_cache_alloc+0x333/0x3c0 [ 215.900352] getname_flags+0xc8/0x550 [ 215.904159] ? perf_trace_lock_acquire+0x510/0x510 [ 215.909095] user_path_at_empty+0x2a/0x50 [ 215.913248] do_mount+0x118/0x2a00 [ 215.916799] ? lock_acquire+0x170/0x3f0 [ 215.920775] ? lock_downgrade+0x740/0x740 [ 215.924937] ? copy_mount_string+0x40/0x40 [ 215.929179] ? __might_fault+0x177/0x1b0 [ 215.933246] ? _copy_from_user+0x96/0x100 [ 215.937400] ? copy_mount_options+0x1fa/0x2f0 [ 215.941895] ? copy_mnt_ns+0xa30/0xa30 [ 215.945793] SyS_mount+0xa8/0x120 [ 215.949247] ? copy_mnt_ns+0xa30/0xa30 [ 215.953141] do_syscall_64+0x1d5/0x640 [ 215.957070] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 215.962260] RIP: 0033:0x45c369 [ 215.965448] RSP: 002b:00007f917d33fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 215.973166] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 215.980436] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 215.987706] RBP: 00007f917d33fca0 R08: 0000000000000000 R09: 0000000000000000 [ 215.994977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.002247] R13: 00007ffeaedbb38f R14: 00007f917d3409c0 R15: 000000000078bf0c 14:34:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x11011, r2, 0x0) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000006000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) read$snapshot(r1, &(0x7f0000000540)=""/225, 0xe1) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0004000000000000000000", @ANYRES32=r5, @ANYRES32], 0x28}}, 0x0) 14:34:35 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 14:34:36 executing program 0 (fault-call:3 fault-nth:0): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000580)=ANY=[@ANYBLOB="dd0400130000000000010005000000000000000200002000000401"], 0x28) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x1}, 0x1) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) [ 216.258524] FAULT_INJECTION: forcing a failure. [ 216.258524] name failslab, interval 1, probability 0, space 0, times 0 [ 216.291250] CPU: 0 PID: 9392 Comm: syz-executor.0 Not tainted 4.14.189-syzkaller #0 [ 216.299100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.308469] Call Trace: [ 216.311077] dump_stack+0x1b2/0x283 [ 216.314719] should_fail.cold+0x10a/0x154 [ 216.318887] should_failslab+0xd6/0x130 [ 216.322875] __kmalloc_track_caller+0x2bc/0x400 [ 216.327581] ? strndup_user+0x5b/0xf0 [ 216.331412] memdup_user+0x22/0xa0 [ 216.335012] strndup_user+0x5b/0xf0 [ 216.338648] ? copy_mnt_ns+0xa30/0xa30 [ 216.342545] SyS_mount+0x39/0x120 [ 216.346008] ? copy_mnt_ns+0xa30/0xa30 [ 216.349909] do_syscall_64+0x1d5/0x640 [ 216.353819] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 216.359021] RIP: 0033:0x45c369 [ 216.362215] RSP: 002b:00007f3b6fadac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 216.369940] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 216.377220] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 216.384494] RBP: 00007f3b6fadaca0 R08: 0000000000000000 R09: 0000000000000000 [ 216.391771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 216.399050] R13: 00007ffd31657ebf R14: 00007f3b6fadb9c0 R15: 000000000078bf0c 14:34:36 executing program 4 (fault-call:2 fault-nth:3): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:36 executing program 0 (fault-call:3 fault-nth:1): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 216.591618] FAULT_INJECTION: forcing a failure. [ 216.591618] name failslab, interval 1, probability 0, space 0, times 0 [ 216.610717] CPU: 0 PID: 9398 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 216.618539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.627897] Call Trace: [ 216.630503] dump_stack+0x1b2/0x283 [ 216.634149] should_fail.cold+0x10a/0x154 [ 216.638319] should_failslab+0xd6/0x130 [ 216.642309] kmem_cache_alloc_trace+0x29a/0x3d0 [ 216.646994] ? rpc_clntdir_populate+0x30/0x30 [ 216.651504] sget_userns+0x102/0xc10 [ 216.655225] ? get_empty_filp.cold+0x37/0x37 [ 216.659652] ? set_anon_super+0x20/0x20 [ 216.663648] ? rpc_clntdir_populate+0x30/0x30 [ 216.668158] mount_ns+0x65/0x180 [ 216.671540] mount_fs+0x92/0x2a0 [ 216.674925] vfs_kern_mount.part.0+0x5b/0x470 [ 216.679441] do_mount+0xe53/0x2a00 [ 216.682999] ? lock_acquire+0x170/0x3f0 [ 216.686989] ? lock_downgrade+0x740/0x740 [ 216.691154] ? copy_mount_string+0x40/0x40 [ 216.695408] ? __might_fault+0x177/0x1b0 [ 216.699482] ? _copy_from_user+0x96/0x100 [ 216.703647] ? copy_mount_options+0x1fa/0x2f0 [ 216.706596] FAULT_INJECTION: forcing a failure. [ 216.706596] name failslab, interval 1, probability 0, space 0, times 0 [ 216.708148] ? copy_mnt_ns+0xa30/0xa30 [ 216.708165] SyS_mount+0xa8/0x120 [ 216.708184] ? copy_mnt_ns+0xa30/0xa30 [ 216.730574] do_syscall_64+0x1d5/0x640 [ 216.734672] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 216.739866] RIP: 0033:0x45c369 [ 216.743087] RSP: 002b:00007f917d33fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 216.750807] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 216.758077] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 216.765345] RBP: 00007f917d33fca0 R08: 0000000000000000 R09: 0000000000000000 [ 216.772622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 216.779988] R13: 00007ffeaedbb38f R14: 00007f917d3409c0 R15: 000000000078bf0c [ 216.787286] CPU: 1 PID: 9405 Comm: syz-executor.0 Not tainted 4.14.189-syzkaller #0 [ 216.795083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.804426] Call Trace: [ 216.807028] dump_stack+0x1b2/0x283 [ 216.810651] should_fail.cold+0x10a/0x154 [ 216.814811] should_failslab+0xd6/0x130 [ 216.818797] kmem_cache_alloc+0x28e/0x3c0 [ 216.822954] getname_flags+0xc8/0x550 [ 216.826760] ? perf_trace_lock_acquire+0x510/0x510 [ 216.831697] user_path_at_empty+0x2a/0x50 [ 216.835836] do_mount+0x118/0x2a00 [ 216.839366] ? lock_acquire+0x170/0x3f0 [ 216.843328] ? lock_downgrade+0x740/0x740 [ 216.847467] ? copy_mount_string+0x40/0x40 [ 216.851691] ? __might_fault+0x177/0x1b0 [ 216.855758] ? _copy_from_user+0x96/0x100 [ 216.859894] ? copy_mount_options+0x1fa/0x2f0 [ 216.864374] ? copy_mnt_ns+0xa30/0xa30 [ 216.868249] SyS_mount+0xa8/0x120 [ 216.871688] ? copy_mnt_ns+0xa30/0xa30 [ 216.875569] do_syscall_64+0x1d5/0x640 [ 216.879449] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 216.884629] RIP: 0033:0x45c369 [ 216.887803] RSP: 002b:00007f3b6fab9c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 216.895502] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 216.902758] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 216.910029] RBP: 00007f3b6fab9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 216.917296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.924553] R13: 00007ffd31657ebf R14: 00007f3b6faba9c0 R15: 000000000078bfac 14:34:37 executing program 4 (fault-call:2 fault-nth:4): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:37 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x3800, r0, &(0x7f0000000000)="98", 0x1}]) [ 217.225134] FAULT_INJECTION: forcing a failure. [ 217.225134] name failslab, interval 1, probability 0, space 0, times 0 [ 217.251648] CPU: 1 PID: 9407 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 217.259466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.268817] Call Trace: [ 217.271407] dump_stack+0x1b2/0x283 [ 217.275035] should_fail.cold+0x10a/0x154 [ 217.279189] should_failslab+0xd6/0x130 [ 217.283164] kmem_cache_alloc_trace+0x29a/0x3d0 [ 217.287837] ? rpc_clntdir_populate+0x30/0x30 [ 217.292334] sget_userns+0x102/0xc10 [ 217.296044] ? get_empty_filp.cold+0x37/0x37 [ 217.300451] ? set_anon_super+0x20/0x20 [ 217.304428] ? rpc_clntdir_populate+0x30/0x30 [ 217.308925] mount_ns+0x65/0x180 [ 217.312298] mount_fs+0x92/0x2a0 [ 217.315667] vfs_kern_mount.part.0+0x5b/0x470 [ 217.320166] do_mount+0xe53/0x2a00 [ 217.323712] ? lock_acquire+0x170/0x3f0 [ 217.327687] ? lock_downgrade+0x740/0x740 [ 217.331838] ? copy_mount_string+0x40/0x40 [ 217.336076] ? __might_fault+0x177/0x1b0 [ 217.340146] ? _copy_from_user+0x96/0x100 [ 217.344295] ? copy_mount_options+0x1fa/0x2f0 [ 217.348791] ? copy_mnt_ns+0xa30/0xa30 [ 217.352678] SyS_mount+0xa8/0x120 [ 217.356131] ? copy_mnt_ns+0xa30/0xa30 [ 217.360019] do_syscall_64+0x1d5/0x640 [ 217.363915] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 217.369111] RIP: 0033:0x45c369 [ 217.372295] RSP: 002b:00007f917d33fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 217.379999] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 217.387264] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 217.394529] RBP: 00007f917d33fca0 R08: 0000000000000000 R09: 0000000000000000 [ 217.401793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 217.409057] R13: 00007ffeaedbb38f R14: 00007f917d3409c0 R15: 000000000078bf0c 14:34:37 executing program 0 (fault-call:3 fault-nth:2): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:37 executing program 4 (fault-call:2 fault-nth:5): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 217.524265] FAULT_INJECTION: forcing a failure. [ 217.524265] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 217.536136] CPU: 0 PID: 9419 Comm: syz-executor.0 Not tainted 4.14.189-syzkaller #0 [ 217.543942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.552100] FAULT_INJECTION: forcing a failure. [ 217.552100] name failslab, interval 1, probability 0, space 0, times 0 [ 217.553302] Call Trace: [ 217.553325] dump_stack+0x1b2/0x283 [ 217.553349] should_fail.cold+0x10a/0x154 [ 217.574907] __alloc_pages_nodemask+0x22c/0x2720 [ 217.579691] ? __lock_acquire+0x5fc/0x3f20 [ 217.583956] ? perf_trace_run_bpf_submit+0x119/0x200 [ 217.589075] ? perf_trace_run_bpf_submit+0x119/0x200 [ 217.594194] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 217.599058] ? depot_save_stack+0x10d/0x3e3 [ 217.603399] ? perf_trace_lock_acquire+0x510/0x510 [ 217.608375] cache_grow_begin+0x8f/0x420 [ 217.612444] cache_alloc_refill+0x273/0x350 [ 217.616774] kmem_cache_alloc+0x333/0x3c0 [ 217.620932] getname_flags+0xc8/0x550 [ 217.624795] ? perf_trace_lock_acquire+0x510/0x510 [ 217.629737] user_path_at_empty+0x2a/0x50 [ 217.633895] do_mount+0x118/0x2a00 [ 217.637446] ? lock_acquire+0x170/0x3f0 [ 217.641423] ? lock_downgrade+0x740/0x740 [ 217.645575] ? copy_mount_string+0x40/0x40 [ 217.649819] ? __might_fault+0x177/0x1b0 [ 217.653886] ? _copy_from_user+0x96/0x100 [ 217.658048] ? copy_mount_options+0x1fa/0x2f0 [ 217.662545] ? copy_mnt_ns+0xa30/0xa30 [ 217.666436] SyS_mount+0xa8/0x120 [ 217.670844] ? copy_mnt_ns+0xa30/0xa30 [ 217.674738] do_syscall_64+0x1d5/0x640 [ 217.678728] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 217.683940] RIP: 0033:0x45c369 [ 217.687125] RSP: 002b:00007f3b6fadac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 217.694842] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 217.702115] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 217.709409] RBP: 00007f3b6fadaca0 R08: 0000000000000000 R09: 0000000000000000 [ 217.716681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 217.723947] R13: 00007ffd31657ebf R14: 00007f3b6fadb9c0 R15: 000000000078bf0c [ 217.748642] CPU: 1 PID: 9421 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 217.756472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.765821] Call Trace: [ 217.768418] dump_stack+0x1b2/0x283 [ 217.772052] should_fail.cold+0x10a/0x154 [ 217.776203] should_failslab+0xd6/0x130 [ 217.780197] kmem_cache_alloc_trace+0x29a/0x3d0 [ 217.784875] selinux_sb_alloc_security+0x41/0x210 [ 217.789719] security_sb_alloc+0x66/0xa0 [ 217.793781] ? rpc_clntdir_populate+0x30/0x30 [ 217.798273] sget_userns+0x194/0xc10 [ 217.801984] ? get_empty_filp.cold+0x37/0x37 [ 217.806392] ? set_anon_super+0x20/0x20 [ 217.810364] ? rpc_clntdir_populate+0x30/0x30 [ 217.814857] mount_ns+0x65/0x180 [ 217.818230] mount_fs+0x92/0x2a0 [ 217.821601] vfs_kern_mount.part.0+0x5b/0x470 [ 217.826093] do_mount+0xe53/0x2a00 [ 217.829670] ? lock_acquire+0x170/0x3f0 [ 217.833642] ? lock_downgrade+0x740/0x740 [ 217.837789] ? copy_mount_string+0x40/0x40 [ 217.842033] ? __might_fault+0x177/0x1b0 [ 217.846092] ? _copy_from_user+0x96/0x100 [ 217.850247] ? copy_mount_options+0x1fa/0x2f0 [ 217.854744] ? copy_mnt_ns+0xa30/0xa30 [ 217.858632] SyS_mount+0xa8/0x120 [ 217.862085] ? copy_mnt_ns+0xa30/0xa30 [ 217.865979] do_syscall_64+0x1d5/0x640 [ 217.869874] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 217.875061] RIP: 0033:0x45c369 [ 217.878242] RSP: 002b:00007f917d33fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 217.885946] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 217.893220] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 217.900490] RBP: 00007f917d33fca0 R08: 0000000000000000 R09: 0000000000000000 [ 217.907778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 217.915049] R13: 00007ffeaedbb38f R14: 00007f917d3409c0 R15: 000000000078bf0c 14:34:37 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IMADDTIMER(r2, 0x80044940, &(0x7f00000000c0)=0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) [ 217.984919] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 218.039013] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 14:34:38 executing program 5: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x5, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000380)=""/194, 0xc2) splice(r2, 0x0, r1, 0x0, 0x8, 0x0) 14:34:38 executing program 0 (fault-call:3 fault-nth:3): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:38 executing program 4 (fault-call:2 fault-nth:6): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 218.364374] FAULT_INJECTION: forcing a failure. [ 218.364374] name failslab, interval 1, probability 0, space 0, times 0 [ 218.403898] FAULT_INJECTION: forcing a failure. [ 218.403898] name failslab, interval 1, probability 0, space 0, times 0 [ 218.411326] CPU: 0 PID: 9444 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 218.422912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.432279] Call Trace: [ 218.434882] dump_stack+0x1b2/0x283 [ 218.438524] should_fail.cold+0x10a/0x154 [ 218.442688] should_failslab+0xd6/0x130 [ 218.446664] __kmalloc+0x2c1/0x400 [ 218.450204] ? __list_lru_init+0x67/0x710 [ 218.454360] __list_lru_init+0x67/0x710 [ 218.458352] sget_userns+0x4e4/0xc10 [ 218.462068] ? get_empty_filp.cold+0x37/0x37 [ 218.466480] ? set_anon_super+0x20/0x20 [ 218.470460] ? rpc_clntdir_populate+0x30/0x30 [ 218.474959] mount_ns+0x65/0x180 [ 218.478422] mount_fs+0x92/0x2a0 [ 218.481805] vfs_kern_mount.part.0+0x5b/0x470 [ 218.486310] do_mount+0xe53/0x2a00 [ 218.489856] ? lock_acquire+0x170/0x3f0 [ 218.493838] ? lock_downgrade+0x740/0x740 [ 218.497997] ? copy_mount_string+0x40/0x40 [ 218.502275] ? __might_fault+0x177/0x1b0 [ 218.506346] ? _copy_from_user+0x96/0x100 [ 218.510527] ? copy_mount_options+0x1fa/0x2f0 [ 218.515029] ? copy_mnt_ns+0xa30/0xa30 [ 218.518952] SyS_mount+0xa8/0x120 [ 218.522406] ? copy_mnt_ns+0xa30/0xa30 [ 218.526338] do_syscall_64+0x1d5/0x640 [ 218.530246] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 218.535445] RIP: 0033:0x45c369 [ 218.538633] RSP: 002b:00007f917d33fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 218.546364] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 218.553639] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 218.560920] RBP: 00007f917d33fca0 R08: 0000000000000000 R09: 0000000000000000 [ 218.568198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 218.575498] R13: 00007ffeaedbb38f R14: 00007f917d3409c0 R15: 000000000078bf0c [ 218.584563] CPU: 1 PID: 9448 Comm: syz-executor.0 Not tainted 4.14.189-syzkaller #0 [ 218.592368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.601721] Call Trace: [ 218.604317] dump_stack+0x1b2/0x283 [ 218.607952] should_fail.cold+0x10a/0x154 [ 218.612113] should_failslab+0xd6/0x130 [ 218.616094] kmem_cache_alloc+0x28e/0x3c0 [ 218.620254] alloc_vfsmnt+0x23/0x7f0 [ 218.623982] ? _raw_read_unlock+0x29/0x40 [ 218.628170] vfs_kern_mount.part.0+0x27/0x470 [ 218.632688] do_mount+0xe53/0x2a00 [ 218.636247] ? lock_acquire+0x170/0x3f0 [ 218.640253] ? lock_downgrade+0x740/0x740 [ 218.644407] ? copy_mount_string+0x40/0x40 [ 218.648673] ? __might_fault+0x177/0x1b0 [ 218.652733] ? _copy_from_user+0x96/0x100 [ 218.656889] ? copy_mount_options+0x1fa/0x2f0 [ 218.661381] ? copy_mnt_ns+0xa30/0xa30 [ 218.665266] SyS_mount+0xa8/0x120 [ 218.668718] ? copy_mnt_ns+0xa30/0xa30 [ 218.672605] do_syscall_64+0x1d5/0x640 [ 218.676504] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 218.681690] RIP: 0033:0x45c369 [ 218.684870] RSP: 002b:00007f3b6fadac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 218.692575] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 218.699835] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 218.707098] RBP: 00007f3b6fadaca0 R08: 0000000000000000 R09: 0000000000000000 [ 218.714359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 218.721649] R13: 00007ffd31657ebf R14: 00007f3b6fadb9c0 R15: 000000000078bf0c 14:34:38 executing program 4 (fault-call:2 fault-nth:7): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 218.856733] FAULT_INJECTION: forcing a failure. [ 218.856733] name failslab, interval 1, probability 0, space 0, times 0 [ 218.878860] CPU: 1 PID: 9450 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 218.886677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.896031] Call Trace: [ 218.898633] dump_stack+0x1b2/0x283 [ 218.902269] should_fail.cold+0x10a/0x154 [ 218.906429] should_failslab+0xd6/0x130 [ 218.910409] __kmalloc+0x2c1/0x400 [ 218.913948] ? __list_lru_init+0x67/0x710 [ 218.918093] __list_lru_init+0x67/0x710 [ 218.922073] sget_userns+0x504/0xc10 [ 218.925784] ? get_empty_filp.cold+0x37/0x37 [ 218.930197] ? set_anon_super+0x20/0x20 [ 218.934194] ? rpc_clntdir_populate+0x30/0x30 [ 218.938686] mount_ns+0x65/0x180 [ 218.942052] mount_fs+0x92/0x2a0 [ 218.945420] vfs_kern_mount.part.0+0x5b/0x470 [ 218.949921] do_mount+0xe53/0x2a00 [ 218.953466] ? lock_acquire+0x170/0x3f0 [ 218.957437] ? lock_downgrade+0x740/0x740 [ 218.961582] ? copy_mount_string+0x40/0x40 [ 218.965823] ? __might_fault+0x177/0x1b0 [ 218.969883] ? _copy_from_user+0x96/0x100 [ 218.974031] ? copy_mount_options+0x1fa/0x2f0 [ 218.978521] ? copy_mnt_ns+0xa30/0xa30 [ 218.982406] SyS_mount+0xa8/0x120 [ 218.985854] ? copy_mnt_ns+0xa30/0xa30 [ 218.989746] do_syscall_64+0x1d5/0x640 [ 218.993648] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 218.998834] RIP: 0033:0x45c369 [ 219.002018] RSP: 002b:00007f917d33fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 219.009724] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 219.016986] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 219.024249] RBP: 00007f917d33fca0 R08: 0000000000000000 R09: 0000000000000000 [ 219.031514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 219.038780] R13: 00007ffeaedbb38f R14: 00007f917d3409c0 R15: 000000000078bf0c 14:34:38 executing program 0 (fault-call:3 fault-nth:4): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:39 executing program 4 (fault-call:2 fault-nth:8): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 219.171065] FAULT_INJECTION: forcing a failure. [ 219.171065] name failslab, interval 1, probability 0, space 0, times 0 [ 219.228236] CPU: 0 PID: 9455 Comm: syz-executor.0 Not tainted 4.14.189-syzkaller #0 [ 219.236082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.245628] Call Trace: [ 219.248231] dump_stack+0x1b2/0x283 [ 219.251878] should_fail.cold+0x10a/0x154 [ 219.256048] should_failslab+0xd6/0x130 [ 219.260036] kmem_cache_alloc_trace+0x29a/0x3d0 [ 219.264720] ? rpc_clntdir_populate+0x30/0x30 [ 219.269225] sget_userns+0x102/0xc10 [ 219.272944] ? get_empty_filp.cold+0x37/0x37 [ 219.277363] ? set_anon_super+0x20/0x20 [ 219.281361] ? rpc_clntdir_populate+0x30/0x30 [ 219.285858] mount_ns+0x65/0x180 [ 219.289235] mount_fs+0x92/0x2a0 [ 219.292630] vfs_kern_mount.part.0+0x5b/0x470 [ 219.297138] do_mount+0xe53/0x2a00 [ 219.300690] ? lock_acquire+0x170/0x3f0 [ 219.304669] ? lock_downgrade+0x740/0x740 [ 219.308831] ? copy_mount_string+0x40/0x40 [ 219.313076] ? __might_fault+0x177/0x1b0 [ 219.317147] ? _copy_from_user+0x96/0x100 [ 219.321302] ? copy_mount_options+0x1fa/0x2f0 [ 219.325810] ? copy_mnt_ns+0xa30/0xa30 [ 219.329706] SyS_mount+0xa8/0x120 [ 219.333163] ? copy_mnt_ns+0xa30/0xa30 [ 219.337063] do_syscall_64+0x1d5/0x640 [ 219.340971] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 219.346170] RIP: 0033:0x45c369 [ 219.349362] RSP: 002b:00007f3b6fadac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 219.357082] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 219.364356] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 219.371634] RBP: 00007f3b6fadaca0 R08: 0000000000000000 R09: 0000000000000000 [ 219.378906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 219.386178] R13: 00007ffd31657ebf R14: 00007f3b6fadb9c0 R15: 000000000078bf0c 14:34:39 executing program 0 (fault-call:3 fault-nth:5): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) [ 219.432306] FAULT_INJECTION: forcing a failure. [ 219.432306] name failslab, interval 1, probability 0, space 0, times 0 [ 219.489002] CPU: 0 PID: 9458 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 219.496845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.506205] Call Trace: [ 219.508815] dump_stack+0x1b2/0x283 [ 219.512467] should_fail.cold+0x10a/0x154 [ 219.516643] should_failslab+0xd6/0x130 [ 219.520633] __kmalloc+0x2c1/0x400 [ 219.524202] ? register_shrinker+0x1ab/0x220 [ 219.528626] register_shrinker+0x1ab/0x220 [ 219.532871] sget_userns+0x9aa/0xc10 [ 219.536615] ? get_empty_filp.cold+0x37/0x37 [ 219.541058] ? set_anon_super+0x20/0x20 [ 219.545047] ? rpc_clntdir_populate+0x30/0x30 [ 219.549548] mount_ns+0x65/0x180 [ 219.552923] mount_fs+0x92/0x2a0 [ 219.556343] vfs_kern_mount.part.0+0x5b/0x470 [ 219.560855] do_mount+0xe53/0x2a00 [ 219.564408] ? lock_acquire+0x170/0x3f0 [ 219.568391] ? lock_downgrade+0x740/0x740 [ 219.572551] ? copy_mount_string+0x40/0x40 [ 219.576823] ? __might_fault+0x177/0x1b0 [ 219.580891] ? _copy_from_user+0x96/0x100 [ 219.585049] ? copy_mount_options+0x1fa/0x2f0 [ 219.589546] ? copy_mnt_ns+0xa30/0xa30 [ 219.593444] SyS_mount+0xa8/0x120 [ 219.597053] ? copy_mnt_ns+0xa30/0xa30 [ 219.600952] do_syscall_64+0x1d5/0x640 [ 219.604861] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 219.610052] RIP: 0033:0x45c369 [ 219.613241] RSP: 002b:00007f917d33fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 219.620956] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 219.628239] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 219.635518] RBP: 00007f917d33fca0 R08: 0000000000000000 R09: 0000000000000000 [ 219.642795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 219.650071] R13: 00007ffeaedbb38f R14: 00007f917d3409c0 R15: 000000000078bf0c 14:34:39 executing program 4 (fault-call:2 fault-nth:9): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) 14:34:39 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r2, r3}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) keyctl$search(0xa, r1, &(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, r3) setxattr$security_selinux(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:apt_var_lib_t:s0\x00', 0x23, 0x1) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 219.810440] FAULT_INJECTION: forcing a failure. [ 219.810440] name failslab, interval 1, probability 0, space 0, times 0 [ 219.836075] CPU: 0 PID: 9470 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 219.843907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.853268] Call Trace: [ 219.855871] dump_stack+0x1b2/0x283 [ 219.859515] should_fail.cold+0x10a/0x154 [ 219.863680] should_failslab+0xd6/0x130 [ 219.867662] __kmalloc+0x2c1/0x400 [ 219.871207] ? register_shrinker+0x1ab/0x220 [ 219.875636] register_shrinker+0x1ab/0x220 [ 219.879882] sget_userns+0x9aa/0xc10 [ 219.883599] ? get_empty_filp.cold+0x37/0x37 [ 219.888024] ? set_anon_super+0x20/0x20 [ 219.892005] ? rpc_clntdir_populate+0x30/0x30 [ 219.896501] mount_ns+0x65/0x180 [ 219.899880] mount_fs+0x92/0x2a0 [ 219.903260] vfs_kern_mount.part.0+0x5b/0x470 [ 219.907762] do_mount+0xe53/0x2a00 [ 219.911312] ? lock_acquire+0x170/0x3f0 [ 219.915289] ? lock_downgrade+0x740/0x740 [ 219.919453] ? copy_mount_string+0x40/0x40 [ 219.923697] ? __might_fault+0x177/0x1b0 [ 219.927770] ? _copy_from_user+0x96/0x100 [ 219.931926] ? copy_mount_options+0x1fa/0x2f0 [ 219.936431] ? copy_mnt_ns+0xa30/0xa30 [ 219.940322] SyS_mount+0xa8/0x120 [ 219.943778] ? copy_mnt_ns+0xa30/0xa30 [ 219.947679] do_syscall_64+0x1d5/0x640 [ 219.951580] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 219.956783] RIP: 0033:0x45c369 [ 219.959975] RSP: 002b:00007f917d33fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 219.967694] RAX: ffffffffffffffda RBX: 000000000001fb40 RCX: 000000000045c369 [ 219.974971] RDX: 0000000020000180 RSI: 0000000020000240 RDI: 0000000000000000 [ 219.982244] RBP: 00007f917d33fca0 R08: 0000000000000000 R09: 0000000000000000 [ 219.989515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 219.996785] R13: 00007ffeaedbb38f R14: 00007f917d3409c0 R15: 000000000078bf0c [ 220.069901] list_add double add: new=ffff8880578e01a0, prev=ffffffff886dd500, next=ffff8880578e01a0. [ 220.079680] ------------[ cut here ]------------ [ 220.084436] kernel BUG at lib/list_debug.c:29! [ 220.089013] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 220.094359] Modules linked in: [ 220.097544] CPU: 1 PID: 6384 Comm: syz-executor.4 Not tainted 4.14.189-syzkaller #0 [ 220.105318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.114664] task: ffff888057e22400 task.stack: ffff888057e28000 [ 220.120717] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 220.125891] RSP: 0018:ffff888057e2fc88 EFLAGS: 00010082 [ 220.131265] RAX: 0000000000000058 RBX: ffff8880578e0140 RCX: 0000000000000000 [ 220.138523] RDX: 0000000000000000 RSI: ffffffff86ac0dc0 RDI: ffffed100afc5f87 [ 220.145782] RBP: ffff8880578e01a0 R08: 0000000000000058 R09: 0000000000000002 [ 220.153055] R10: 0000000000000000 R11: ffff888057e22400 R12: ffff8880578e01a0 [ 220.160327] R13: ffff8880578e01a0 R14: ffff888050d5f818 R15: ffffffff8b04f260 [ 220.167587] FS: 0000000001771940(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 220.175799] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 220.181669] CR2: 0000000000741138 CR3: 0000000057dec000 CR4: 00000000001406e0 [ 220.188940] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 220.196199] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 220.203457] Call Trace: [ 220.206032] ? __put_net+0x1e/0x100 [ 220.209650] __put_net+0x3a/0x100 [ 220.213094] __sk_destruct+0x589/0x6e0 [ 220.216971] __sk_free+0xd9/0x2d0 [ 220.220419] sk_free+0x2b/0x40 [ 220.223602] tcp_close+0x983/0xed0 [ 220.227142] ? ip_mc_drop_socket+0x16/0x220 [ 220.231469] inet_release+0xdf/0x1b0 [ 220.235177] __sock_release+0xcd/0x2b0 [ 220.239064] ? __sock_release+0x2b0/0x2b0 [ 220.243199] sock_close+0x15/0x20 [ 220.246659] __fput+0x25f/0x7a0 [ 220.249929] task_work_run+0x11f/0x190 [ 220.253811] exit_to_usermode_loop+0x1ad/0x200 [ 220.258382] do_syscall_64+0x4a3/0x640 [ 220.262265] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 220.267444] RIP: 0033:0x415ec0 [ 220.270620] RSP: 002b:00007ffeaedbae78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 220.278317] RAX: 0000000000000000 RBX: 00007ffeaedbaf80 RCX: 0000000000415ec0 [ 220.285587] RDX: 00000000000000e0 RSI: 00007ffeaedbb360 RDI: 0000000000000003 [ 220.292845] RBP: 0000000000000003 R08: 0000000000006000 R09: 0000000000004000 [ 220.300111] R10: 00007ffeaedbaf80 R11: 0000000000000246 R12: 0000000000000000 [ 220.307363] R13: 00007ffeaedbb600 R14: 0000000000035aa9 R15: 00007ffeaedbb610 [ 220.314625] Code: e9 57 ff ff ff 4c 89 e1 48 c7 c7 40 5b e4 86 e8 53 b6 44 fe 0f 0b 48 89 f2 4c 89 e1 48 89 ee 48 c7 c7 80 5c e4 86 e8 3c b6 44 fe <0f> 0b 48 89 f1 48 c7 c7 00 5c e4 86 4c 89 e6 e8 28 b6 44 fe 0f [ 220.333833] RIP: __list_add_valid.cold+0x26/0x3c RSP: ffff888057e2fc88 [ 220.340489] ---[ end trace cd6d9fe25d61a723 ]--- [ 220.345229] Kernel panic - not syncing: Fatal exception [ 220.351580] Kernel Offset: disabled [ 220.355189] Rebooting in 86400 seconds..