ecuting program 4: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() pause() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1e) [ 442.469404] bond0: Error: Device is in use and cannot be enslaved 12:11:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0e000032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:10 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x6698, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x56324a54, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000000000000, 0x8001, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x10, 0x4, 0x6) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000040)={0x0, 'syz0\x00'}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x48401) ioctl$RTC_PIE_ON(r1, 0x7005) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'sit0\x00', 0x300000000000}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000240)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000140)={0xfffffffffffffffb, 0xff, 0xffffffffffff7fff, 0x502, 0x10, 0x6, 0x4, 0x101, 0x7, 0x4, 0x8, 0x617}) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0xff00) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) getresuid(&(0x7f0000000100), &(0x7f0000000200)=0x0, &(0x7f0000000240)) r5 = socket(0xa, 0x0, 0x6) bind$inet6(r5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$inet(0x2, 0xa, 0x0) connect$inet(r8, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x3f}, 0x10) r9 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r9, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r9, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x3f}, 0x10) r10 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r10, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r10, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x3f}, 0x10) r11 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r11, 0x0, 0x0, &(0x7f0000000280)="8907196204001029605942", 0xfffffffffffffddc) connect$inet(r11, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x3f}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r12, &(0x7f0000000000), 0xfffffea6) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r13, &(0x7f0000000000), 0xfffffea6) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r12, @ANYRES32=r4, @ANYBLOB, @ANYRES32, @ANYBLOB="02000500", @ANYRES32=r4, @ANYBLOB, @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYPTR64=&(0x7f0000000900)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[], @ANYRES32=r3, @ANYRES64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64=r13, @ANYRESOCT, @ANYRESHEX], @ANYBLOB="b4863d63e0ef784cce43e8b81ca31c0c", @ANYRES32, @ANYBLOB="08000300", @ANYRES32=r7, @ANYBLOB, @ANYBLOB="0800d8b8", @ANYRES32, @ANYBLOB="10000200000000002000d6f8000000"], 0x16, 0x1) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x282080, 0x0) r14 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r14, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r14, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 12:11:10 executing program 2: clone(0x31020000, 0x0, 0x0, 0x0, 0x0) time(&(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x14000000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0f000032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x101000, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2c0000006400010700"/20, @ANYRES32=r6, @ANYBLOB="080000e7000000"], 0x2c}}, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000100)={@remote, r6}, 0x14) r7 = fcntl$dupfd(r1, 0x0, r1) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1b6) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r10 = socket$packet(0x11, 0x20000000000003, 0x300) getsockopt$packet_buf(r10, 0x107, 0xb, 0x0, &(0x7f0000000100)) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r11, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r11, 0xc034564b, &(0x7f0000000200)={0x9, 0x1de981bf, 0xb52, 0x4, 0x2, @stepwise={{0x8, 0x8000}, {0x3, 0x8}, {0x6, 0xaf}}}) setreuid(0x0, r9) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$NS_GET_OWNER_UID(r12, 0xb704, &(0x7f0000000080)=0x0) r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r15) setresuid(0x0, r13, r15) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)='1', 0x1}], 0x1) 12:11:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e48000032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 442.811493] syz-executor.3 (12461): /proc/12460/oom_adj is deprecated, please use /proc/12460/oom_score_adj instead. 12:11:10 executing program 2: clone(0x31020000, 0x0, 0x0, 0x0, 0x0) time(&(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x14000000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e4c000032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000004300)=[{{&(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000002c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000300)=[{0x10, 0xc, 0x9}, {0x10}, {0x20, 0x0, 0x0, "bb9b4b50a53e2b19c2bcad43ab5ff0"}, {0x20, 0x6, 0x8, "17fe34ac1b8db2729d43"}], 0x60}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x119000, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) 12:11:10 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) mmap(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x2000000, 0x8010, r0, 0x6f626000) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="71d0d96615546cc9c6d78b"], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000100), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000001000)) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000000)={0x7ff, 0x0, 0x3ff, 0x400, 0x7f, "2013c5a472d89d7253034592d607761ec3a3a8", 0x200, 0x5}) 12:11:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e60000032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd02000000b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x9}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='pr\bquo2\v\x00\x00']) 12:11:13 executing program 2: clone(0x31020000, 0x0, 0x0, 0x0, 0x0) time(&(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x14000000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e68000032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:13 executing program 0: gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) tkill(0xffffffffffffffff, 0x33) mknod$loop(&(0x7f0000000080)='./file1\x00', 0x0, 0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}, 0x0, 0x7}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/softnet_stat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000400)={0x60, 0x0, 0x5, {{0x5, 0x9, 0x5ee1ddab, 0x9, 0x10000, 0x7, 0x3, 0x9}}}, 0xfffffffffffffde1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="02000002", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r8, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000), &(0x7f0000a8a000)=0x4) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='[d::],0:26:\x00'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='\n\x00', 0x0, 0x0) 12:11:13 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x2, 0x0, 0x0, 0x6698, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x56324a54, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000000000000, 0x8001, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x10, 0x4, 0x6) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000040)={0x0, 'syz0\x00'}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0xffffffff, 0x48401) ioctl$RTC_PIE_ON(r1, 0x7005) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'sit0\x00', 0x300000000000}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000240)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000140)={0xfffffffffffffffb, 0xff, 0xffffffffffff7fff, 0x502, 0x10, 0x6, 0x4, 0x101, 0x7, 0x4, 0x8, 0x617}) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0xff00) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) getresuid(&(0x7f0000000100), &(0x7f0000000200)=0x0, &(0x7f0000000240)) r5 = socket(0xa, 0x0, 0x6) bind$inet6(r5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$inet(0x2, 0xa, 0x0) connect$inet(r8, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x3f}, 0x10) r9 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r9, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r9, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x3f}, 0x10) r10 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r10, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r10, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x3f}, 0x10) r11 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r11, 0x0, 0x0, &(0x7f0000000280)="8907196204001029605942", 0xfffffffffffffddc) connect$inet(r11, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x3f}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r12, &(0x7f0000000000), 0xfffffea6) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r13, &(0x7f0000000000), 0xfffffea6) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000b40)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="02000100", @ANYRES32=r12, @ANYRES32=r4, @ANYBLOB, @ANYRES32, @ANYBLOB="02000500", @ANYRES32=r4, @ANYBLOB, @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYPTR64=&(0x7f0000000900)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[], @ANYRES32=r3, @ANYRES64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64=r13, @ANYRESOCT, @ANYRESHEX], @ANYBLOB="b4863d63e0ef784cce43e8b81ca31c0c", @ANYRES32, @ANYBLOB="08000300", @ANYRES32=r7, @ANYBLOB, @ANYBLOB="0800d8b8", @ANYRES32, @ANYBLOB="10000200000000002000d6f8000000"], 0x16, 0x1) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x282080, 0x0) r14 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r14, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r14, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 12:11:13 executing program 3: ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000200)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x10, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) r4 = accept$unix(r3, &(0x7f0000000340)=@abs, &(0x7f00000003c0)=0x6e) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f0000000640)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r9) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) setresgid(0x0, r11, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0xfe, 0x1000000000000000}], 0x0, &(0x7f0000000480)={[{@gid={'gid', 0x3d, r11}}, {@errors_continue='errors=continue'}, {@errors_recover='errors=recover'}, {@case_sensitive_no='case_sensitive=no'}, {@fmask={'fmask', 0x3d, 0x1}}], [{@euid_gt={'euid>', r12}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic'}}]}) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r13, &(0x7f0000000200)=ANY=[], 0xfc28) r14 = syz_open_dev$dmmidi(&(0x7f0000001b00)='/dev/dmmidi#\x00', 0x5, 0x8000) r15 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r15, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) r16 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r16, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r17 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001b40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r18 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r19 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r19, &(0x7f0000000000), 0xfffffea6) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r20, &(0x7f0000000200)=ANY=[], 0xfc28) r21 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001c40)='/dev/vsock\x00', 0x100, 0x0) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r22, &(0x7f0000000200)=ANY=[], 0xfc28) r23 = fcntl$getown(0xffffffffffffffff, 0x9) r24 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) setresgid(0x0, r25, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0xfe, 0x1000000000000000}], 0x0, &(0x7f0000000480)={[{@gid={'gid', 0x3d, r25}}, {@errors_continue='errors=continue'}, {@errors_recover='errors=recover'}, {@case_sensitive_no='case_sensitive=no'}, {@fmask={'fmask', 0x3d, 0x1}}], [{@euid_gt={'euid>', r26}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic'}}]}) r27 = getpid() rt_tgsigqueueinfo(r27, r27, 0x16, &(0x7f0000000100)) ptrace(0x10, r27) ptrace$pokeuser(0x6, r27, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r27, 0x388, 0x2) r28 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r29) r30 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) setresgid(0x0, r31, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0xfe, 0x1000000000000000}], 0x0, &(0x7f0000000480)={[{@gid={'gid', 0x3d, r31}}, {@errors_continue='errors=continue'}, {@errors_recover='errors=recover'}, {@case_sensitive_no='case_sensitive=no'}, {@fmask={'fmask', 0x3d, 0x1}}], [{@euid_gt={'euid>', r32}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic'}}]}) r33 = signalfd4(r2, &(0x7f0000002180)={0x2}, 0x8, 0x40000) r34 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r34, &(0x7f0000000000), 0xfffffea6) r35 = openat$uinput(0xffffffffffffff9c, &(0x7f00000021c0)='/dev/uinput\x00', 0x802, 0x0) r36 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r36, 0x4030582a, &(0x7f0000000040)=0x1000) r37 = gettid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002200)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000002300)=0xe8) r39 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r39, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) setresgid(0x0, r40, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0xfe, 0x1000000000000000}], 0x0, &(0x7f0000000480)={[{@gid={'gid', 0x3d, r40}}, {@errors_continue='errors=continue'}, {@errors_recover='errors=recover'}, {@case_sensitive_no='case_sensitive=no'}, {@fmask={'fmask', 0x3d, 0x1}}], [{@euid_gt={'euid>', r41}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic'}}]}) sendmmsg$unix(r4, &(0x7f0000002e80)=[{&(0x7f0000000500)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000940)="00a0b0c92ea41ef46d6313f30568d267539ec269f1c6468a55dbb1b83f70bd04a920b693fccf04bcda45bbcbb8cff8844ed872b591304a091112313c3c41e898cb2ffea40468c4d258ed82b1de0f6ceb3be3b8b419802c73aaad9b73b70761397092428db8b276170b399b68ba957a9cc5fc3891e801e2b3ffa89b342387d781f69a493bda389cdfdc546711192ba66a5b924039c66d075d365702784940e0746a2f45a0450a33e56881e2dcf2a7dc1e6172535b0381b9e07ab067547243eb4465facb62e497bba70267c758f23c1a9cbf93bf97c57d3d1a1b85822d236fec4b18791877eb9a16d3c7bda8db05bbdca3eebf19e784bd1edae8e1e5f73c05b369bbd5cf01647f5e066f288e9eeae411fcfa843a7abeae63fb45f2f6278730f9c1477582bb99eec8a6897ccd479caaa4177abc7688505d96a5a67bdb75f9e48c1028f9b87b223b88e02576d73ed3b812aec66ca00c97abecd105670c832f5ebe85c4102ee30ec799d83b9f9ea84a64cd798b3a68b5b5050533e4bae03e6047262efc98809240d99e42fe52e91996e99e0a211773887b6edfd004d9e3b17a73c5379fa758f254e74aeb3baad7931c5689812ca5d686c5a2770616dd49b2386741c451ab2f691f84b31ddbecc5d922ab84dcfe4373f9684cbe90005cc6dd0929647b588fa4ea4527c75379e6b6e6e4bf56db6aaf2e62d7acef00a618604d8af55f89fb2ea3d0df229613699d9bf5d642a774b1b279d41cdd19747b7e91ae0651a3a5a31f88bda31afa9f12f6bc7721ebae31bead1cd5f51cd39ecd52f09de6824504fc1303bd5cd6d24b2b7bafc850e4c596d9fc08ef7b300475680e8c2063a6a5124f7735cfb1b59f5a34195a11eb02c6112387791faa5552efb4ec57dd190769769941cd6485bac1e0789f86980d58cc75066f4d12c28ae2b054308e265b7e816a391fbb77f13f4138bd878bc1c1e65f001a585c7273815bf498d71e8e9b7d90f9136f328e393cb98240b1460347b20407c18a3d186b0238b2c57721e960fa2c7a76487f4e31052b9be4676de009af94c00d98c96a584c84feab7c5eff27c434c00baf4f746c0b92588288f552f56613c1fc4e8aa752990311c3d0f10e39c2870d6e7c145e6cd8851bdc42d683ea21ed633963b74d3ae03415259423dfe70d37c6aad62507700bf09b5c762ef558c22633c316fb877b7bb1bb2d1172ebcd044e806ba9fe6d6ed937739df6ad760574a3a09789f1f47d14b0e54d2a41e242e5c30d87a642120e72fbdb6c8234f488bd1fe33310c91ec11b5f685b53157f7d9a69f46ebeea704e4a6b07262b6e62de6d2c48d6da2c5323de11479fc90bba20806c2310493b6b3a0d5a9693378069f268f61b337b24e8933e709e3d20f0a64b6de0009f421c7df109443604af90b7d2ff054e92ead0fabd11d53075c719e754cee73367668b1e52a238c0a9820f7b56b1456065e1351517e312a835cb3b2dba362b656c2bb8aa2c05b6dffd89aa14babd9e8551e2767daa2a688577a220e0ac4f9c45f2dd4dfc750134aefcdb7b089f3de8a176d839fdb45f0c96b3bcc3b9eab84b216267e7daa9118e1a58c907492e7579ff32e57e1b4b884eb2f12fa4b4c8a91a47bf1f47950e77b4c3db09a162cdf01681bba37c372fe211c82e5d1f1a76cdc21cf736cd26f594678be30a1c6664423043f177ad65a152c0d316b24cd20984807cbf0ca9dd08c2384560fadaf6bce69290ab8968e6c08cfd0e82eb1499715cdf905c01e0aaa2551ee93ec3b9fdff17e2e66fed54de08d4b9996693d6eb3554693f6d4e61c13afe4993b80089daceb3ce028cc4d9fe9fad96d198c710aaf8e6aa59cf986f6e51d066525a7bcf82e0be3decefaa4323ad64b87c561f720b0fe73715ced030a783d6c64dede5822a8f400fa9debc48a649faffdf2b5adaa3ccd3fdf350c54da50946b78e1fa90fb820fe794870ed0f3973ad2252eb4ad8400bb583e77c4743eaf3d1a32af5c8b28fd5b60c54aa776d8175438dd957fee8897004b7c058e0aaec431f7d6e3f5c5278dc9c018632f2be48a1a64f959d56f6ea6bb2c29cecefe41b3fd8c65dcac3295146ac241705b10027f1b9a88570a2dc1ddc7ff41936ed9c7758bb676991b7e09c56903f12a12620a2c502be7a3c53433698680b51a55a5ea22974dbdfc5d5f6b459629c3f1999a1849f4b45e95cc3bba95a3ad7df4bc82f130cf9432a0818310313ef02ded5f48003adc26fa3724a211aefc0bfdd2e0c28352df19bbd2be6d6450a1435caff9ecbeeb859063b1406ccd6f87774771069da9a4882bba8613ad53054123363d586da64881beeed5a5ad7c9ef4b64e67328973b3e298c20db955e92fdaa3bd5caf2c4ed155c571bcd15a85fdf71fcff31f874e283aaf289b5d20687c658a62d9991de5f4b50b6312b02163d3028be63ed19cc685a2fc0a75ea49f2460e4b2f5816a0a30a48d8ab78d6e77f1fa61f4e3374d460e9fa67c838f1204aa0ef201afbdb325cc596a8496c6b0d2566918ac36496e4c15362d8ea18559baa879c9abfcc852bffff5e948f29211a7ff38d9de5b4bc277a947d891a6e437ba778fecca8268b4aeef9f0908c6161cb1a25ff3805fe0b59e2359cbabad672b472032d2a72fca83ea3009e68b015102d20c997353a318606006ec02ecbf3c9de09b8ac779003be9687a47df53537072e5ce17fe6c03fb45f42c35ee6e486829ddb7882d385490b74c449ff7a6e23f4da06d7935bf09a6fb9a48c4dba944004f4038a0ef1bdabb799ebddd83891de48f75d35ac44cf6f3e736e7a503dfd6da3abb363caa702e51fd5240157d81abf136e4abdae3cc2f3cc455fe0147b8808040fe4ca707b59e5ba4cebb522c7fd382779b74afc5b35990679f69ecd7d8c3f21929aef36a9fdf2807b7eebc85c22bf87b43265b3c6598ecad6efed7bb4712b5bc62eeac5df1e40c4ce96963ef5e0148c05496f78305016f052b07ab0773997df6b908339f062185005764251746e801ab62e0893e234c89292614a5e5c650d747b62b6f36b36c3dbae5005132ec4983f7473bd661a6c4c96afc75748a0a5b6ba276f8be19dd41f77c48a1eea492e0938a44cd78480a6760b8ed79363bb4d2c91692ab82aeffbea871e953a1cb17bd4acd2638af15662c449613e740982ceb58bac0cae68e27227cce4bbf0393f03931b204ab82a090e457e938916aa19e5c4150c9e25515b9962101b26b5a58638595289fddbea406e797cf87526644b635a689ff62cd55f34deb6ec7ebb9a30803c6095759d7b1ce8df8f56f121d7c2d20d098a0a30a0d31e603f7dd128c6273d4812dae5d50a1412932535a890fdf73ed144d6b6289f933c2b495d185712f9d3a4a4f4d2321e0d54f90d2168e91b4b9cb41bc53dba9343aeb9f49281cfeedd759617e47ef054d92ff2fb4642dd9e3d9d0803d6ed627a1e30f78775a9c7e7c5021771d45d6ec3e78bdf7969fa26d9a51fa0cdbab769f2078d5ea4be9f760c23c05d49b222c1ed552181f0878d6558e8a535b2b68b0002916a215ac105ac693eb9d5e3d88d8c85392236771fa81ae71dc59630e698dd8baf4219ca32dd8881084ddaae1be4217141f5f91bb497646039c64d5d66140ccda7ec260368d64d5ef629ac41c5d5a261a4be63422566cee9879e23e823f930347e01f8a4b36858f9e281e57b4437a87d63c6dab58f5df5a45e2f4147f7a5665063f9ccd010fadb58fb3f665b0c21a283c52c42a54febd5c4af2905473fe408ec0bffe5747c0d21353e0b14785e2af170ecd27990d47ffd845ff8d15c46cf44cf6329f4b191dc71d38e52290d5d4665a2da25314a47e05a3f216ce1831267875f260febd4ffbc4b9b38253a56ebb34b4c26c01fe105f8edc2612134d8ac69162d2428fd20409ca0941d70d4aa2673e12a7eddf0d122185e5d1ee573fd43647f1a5948a9fb012e92540526fe4a8dbe2d5e22154d9891c64133de24df33d8c40f117d2c7d17b0eea415dc1e732fc0e10563306c258741dcdfd02dbba5585e643e84e3cc8b480e15900dfd2ab94422dc234942c3709c3dda0272dfb6a6e21979890406d5e6f5dc34f37beca781cb45d38fa6bedd76b555375f26bc45a7f6512906f1c893e32f13fb860654eb999abcdd6f25d4db8f4c759de4f4074b049e728ecbd48f5d01e7620d4624b1a81bac422bd958e2064f2a6a22ca79026f96ffb385d5f8df057e9e62af034412c611e655448584b41f1d1d4dd8c79737fc30ff94a6469efae0c4b262d5d7bb4807492957acbdff5d272433732e2ade211574bb9798edff6b7665767afa00235f2667584ab22866a638c203e528084773a5e4a8f1e7b034eb70ca0c3807d265042b6e91669ab16432ff2d049516478ccb01c139aad0f396cd51b6f69cee460e99f39f8de5daf977b72a439af018fcadd3935b9fed0057c29b5c8da369b66b1ab0ba64c2d64aeadafa0ff1ab8d40a53d422a04e7df52a12782d4e0df8ba296454068976dcbf38aaba02be60895e2e50da478c3bd93fd11ed27dd8042a4ce97d785fcc658d62b0c3fab6a12914557a19443f2f00341a87c3d52aed65015358bc5a878ba93115619ab2511bace7a4873a27d180d51da6e309184a993892a6f0e05925c649f1a8617337174819922605a37b419639ff89c7c212941d8c61fe4f1b9304a22d1f1fd3bc8249cb0bd56d539318040a979cfd2014e76821db1b030c3406cae0cd06c4d33d6f4fb61dff525da339649041afa7cc7e58d302f7da135aa650dafbbf7ad9bfb6274ce32e91eeb4b54e40de0e2e254f552c0512544c9926d01d4d1ddd95e1a5e89e7e8f51f79bafa393f9ffe3d96d55c58077717a28a3166814bc549c5d8e4b5d193b86c22ac6b72b400f5b0e5d20a886e783b73e41e25e0e2285dccf689b74654a09869be1cb731779e2ceedfc26f2f1315826ffec648d39e4bc5ce35e6d14f3b0ac9643b97645c480b406f0bcc1847d24f0840deca005ec89e06b2ca3f3994057d03e609270f63154096eae71de65aa680736be3a678851befcfc5a5bbc1f55e27686c32e8ea6e0418c739e667d7e61adda33b236c6a194bf7a2270ece4566c56d839f5b8a87c7fb3cad9d9176a2ec3ec7c9bdd4a5dce1124adf625bc7b86c150cb163929bdc13db8a825b43809b9b56e8ea34bdd32f1eaa7b5b663b951abb9b8b82551a6cc1d9e0b7b98adfc10e4f3a0ab1e52d274c200e64ae2154d848399f57248bbcb8d1ce21931cfef496cc8b83335abf0910e26a0ca79073a6c0db723f98bbc673fd1ad3b47583fdba06d189d1b13e4bc37487c1f221f2efb52aad3a2913072ded3f7b7625b840bdad889808d21feba8ffde2db9acb092be3b0f46c3f80e2500e6b1af0df34161b446c74116cbd2fd469ad7cee6e91216efc1122a25f610a304a14b580cd90edfd3174e37ff480d0dc8817874a0067cc36a5b4c71730b3c8861a56bd01c96640503f17d0ed6eb6ef10cc9ca988d5a47a13ca8179dd65da34952d034f014953bae6f5ae843d98566e57783878d854415ad545d30cc63cff399979b831c509eeb24d5260da669221da934154b3002468eb499e72d04e544356c81ea52f18fb64768c92bc1a03dc6cf76922cf26336cbc14f14ac90823ef0417633cdf45c475e1a888365fbb62e3280be0090066a1ca886535d4bc4556b71caa64dc58e7ec101822020768a870541a03aa9b81e95fcb1eb020686824e699c9a7c0e555b40e1ba927188903587b54c2382091f1ca29136511e684e0e0da5b7643ca", 0x1000}, {&(0x7f0000000580)="9367505f0f6a220313d3b887091daea2ee658aedd15c9e89d630a1161396fe5c", 0x20}], 0x2, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r6, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7, r9, r11}}}], 0x40, 0x4005890}, {&(0x7f00000006c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000000740)="eb1df801c3766eef27491785c64d6cb910e3d32415f5b3cac1", 0x19}, {&(0x7f0000000780)="b661f28480aad62c1b09193cde78cb3befb04b65b3b8591cfa4a5966605dc651e263958c8586febfacfe49f209c211786f35c0dcdc88402677eb868e5d9e0e438c719d8e12fb4ca6bf36d7a7afdbd4fa16d2a0e9b1b5cc5d846d919ed6dc1755b53fba66b83682e5bcc439a143059591f5d4683de40c059c1d113426954b9e5731b447700c9c60e4da1472a667c15ed23843425cee8fc672fcddc7393e690ab3889e6b53865aa032", 0xa8}, {&(0x7f0000000840)="3c26cde8db3b3922b711c3ff2a6269ae2e531b9e1e491668596b05fd30f8b6bfe7815b3cc7525db8a3d00d3e8d0bb82861b722aa4ae84bbcb8f203f379233de06debc768e89e70d83deafab5cb5f93c5e9f7201e17e03055333a3f624f62dee4c2db9b902e3236e2b3cfd8b9948300e20c0abae3da0b3e650f0f36b345791226a7ba28f1289fb36c539d9ffba9a8aee55523b1b4", 0x94}, {&(0x7f0000001940)="1aacc6f0f9d138511daaa5b7b84bc80e7dc3e62ce52cdeea76c84c170514918938b0005359ee15f4581686aba78cdf2940c82b4ccb73b6184d2a06d52cdf172842b0d75af41ae2cc5541c55c64e71944867c1ba63fb8560cc6d2cc7f7af97358c03e65c41f8efc55c7a6e7809198fec00bb06882414ca66812db99f6c63c5cc8d9e9fbd8ba7fd19cff36e7c0257bc10ce3f31ab60288b9c1e30e393c2798c0ea3d9b1e4c7ff53876614141bbbd7ccca96681980314768586d5ee5fbadfba16bf41970644e0", 0xc5}, {&(0x7f0000001a40)="394ca642878a6f4402abe72702bd7e1fc9f982c6d06d4ce4693bde691ce292c55052263cf1fd5438a086103c5edd13cefd5336", 0x33}], 0x5, &(0x7f0000001c80)=[@rights={{0x24, 0x1, 0x1, [r13, r14, r15, r16, r17]}}, @rights={{0x2c, 0x1, 0x1, [r18, r0, r19, r2, r20, r21, r22]}}, @cred={{0x1c, 0x1, 0x2, {r23, 0xee00, r25}}}, @cred={{0x1c, 0x1, 0x2, {r27, r29, r31}}}], 0x98}, {&(0x7f0000001d40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001dc0)="edb4490489817751c82ecb1c1d9b", 0xe}, {&(0x7f0000001e00)="558f505d0bd5c238c2ce49458dab2ef8de7c01945f1379790e821f08e04841c6a577a6656b3237acb26463ed4ab9e7567ada5799d6cc0a5ec798964641ab2a670d05b1814a8bfee5327e364a8bfcc0742f18045f3119d6fbfb31183abe7fb7dc202a98293ddad5c0275faaf7a4d6a06094fc875b2eb18d901a2e30a9c2", 0x7d}, {&(0x7f0000001e80)="f705cf4fb02ecdcf24b2a6c3aa92a039be1f85095ba691c3ef2cdce45f14221cd28bc9583298d6b194e088c029f6e8888ffa34a879c60d2d6268cd112e112114803b92690efd675acef03df424c6eacf12bb4640abe3270ca6e8edd3472d52d701fc74ddd50d38cb27b3c96d6b0400d664f5e23d3d7b5ab308aca6a7c55f309aaafd16fc4d25d52a91aa1985d9502de8eb823a3fee344c9eb97260355468bd2d3efdbba95b3ee7063584c0c1260992c773a2c8b851df2f740711cb0618a2fc525df1f92c2466d64dcedb0437", 0xcc}, {&(0x7f0000001f80)="bb04a6ae67924c7718dee57b0498185f12e98fbbd175f1cc5046d627dc6d66999c1102847d7e3b6bf84697b1bbe2403081118037a1495ba2ec0507c1e8fd5bce42e1638bf2f9a584f5d71d5467252201f7db7364", 0x54}, {&(0x7f0000002000)="b28822b86cb44d89fd69", 0xa}, {&(0x7f0000002040)="6a7fa25ec7c0a35c8f65576cfa032136320333fe2018278a4dfac51fc58ca25e6e1a1ce9c241e7a3a9ad6ca8da67fbdb44a1e48b2337dbda754f2d6b5460e4814d0d818d74a8dbfa7fb2ebc3022b2d0294f309b7c25605b48b7bd98ec2b2274fb256a37e1cc2cb783e3acc81a44033413bb05b25b7c586730440bea8a146a207f936092e330e55a7448401b458a3230a3e59c618a02d535664", 0x99}], 0x6, &(0x7f0000002340)=[@rights={{0x2c, 0x1, 0x1, [r2, r33, r34, 0xffffffffffffffff, r35, r36, r2]}}, @cred={{0x1c, 0x1, 0x2, {r37, r38, r40}}}], 0x50, 0x200048c4}, {&(0x7f00000023c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000028c0)=[{&(0x7f0000002440)="37e9846102c7c574638cc57c29a41a16d5b4ac51d5f13935e5c69592de6269eb5127105cfaec47088adbc5fea587ab79bfc9e2b7376dfdbe293ea15dbb301d1584bd7774d8e07dc1cfcfcd5858151a0ad1398690949ad7be8b2604bd33c67fdd3b463c89c07b060ec2a9b87df089893daa31606691b586810a7c3984feb66d310af641b1edb42c70fa2da9ab931dfa75a1bc9359c470fc62b0c52ad38034e6e9182330a31260c7d70977d02d53ced73fe449800fcc9fdfa67f7c334a55e1", 0xbe}, {&(0x7f0000002500)="84b0a4ff03ba5f363cd36aa107cbde6b00df1f2f09ce3136f759ba1a9316f0d1dd79f926af7e382b2ad4", 0x2a}, {&(0x7f0000002540)="fa9d22f26939659bdd42d3077a2fed0a8ea657bf4acb5acacf0d3b4c6ed89c97b90a55b345b2c410023e7b42bee47323566b19c123d87f399442352f315483f8493f8042eb9cb99e1b106f3d4f2cff9a97b410148f19cd876121958fa497f68d64878168d3896c5cc263a98c02981a11f65aeecb4e3a3ca8a64ffdf58d77c2502d60c9e5b91b32e79c45e4c9567447448af1c8e173eb6b21dc2bceb338609d6f766d63789c3ccdcefa2df2139f3ca22f729dc0a147b03599abbe05e0cfaeecc4c00684744e6eaa3980eee561aad4778fd3ad9b9b09bbd7198d849435d61e34b82c2ffb74c72177", 0xe7}, {&(0x7f0000002640)="dae6fe34f827914dffa396ee007119cc1f17de4b89e860884b729d555c665acc5a9f4f7c84aaddcac6149accd17d0b5ea0fcdf160ff57e8189d4d39d5ecf2079c6a71ea6be9f903109eb42764bc07446780c5646841bede42dc14ec4b43e38477cf4a4e9acec4fa1b4c90acc6f3eea94ed45b74d9f01dcbdc20b7c7ed5402a272f8bf11da4c94c9b7105c9d65131d126ef6f082b3d3428cc0f9a1c242c76dd8c1592876bd92c3c7e88da42b40779ef2720a9c7fbfcf2be49baaa98aa5969e0056a7010f391ba84fb2bdaec741d4a8fcafcc06cf852bd3a44d7", 0xd9}, {&(0x7f0000002740)="4b0c5837e40a9d02746ba2fc4cc0fd0eeab04743989ede9b5e00cc7ddffb019b705d9a9701cdb9d5d5a1ea36253d25b4d5a306fd0683929152f39d330992fd5a5efcd4ca924aeb5e806fd279ab7b16b0b5243e64442bcda24a5be9c2144723676cb1248adad44634f77190a8063a79d2a1182f57b69912bfad8a7dfb31e80a727f1af1ab3ed2c671da9b0bbfc2a6ba74743376637150a14fd0a68a72941d026f674c80be9b6775a5582da8337d0cd7d748a44d65739e638db55ed3a14fb6b78de653704c68ad537c4e94a0428d32739b5dc1b813bb47e70b64226b", 0xdb}, {&(0x7f0000002840)="76fb5222895e656fd5c79694a7ce5e4ac46532bb8b75950e070681f6420663fe6459d1dfad3956fe58860a4818280f25816e84f25c562c72816052a2cb6ce106db2ff686f62b0def1326dfe8f1945e52e76cbd4c89694a392e57444b0f4daec179f382cfd0f910a6c034c1c5915ed5504332f409", 0x74}], 0x6, 0x0, 0x0, 0x24000000}, {&(0x7f0000002940)=@file={0x18a82636a2ce707c, './file0\x00'}, 0x6e, &(0x7f0000002e00)=[{&(0x7f00000029c0)="845d1e02fb80f935b8", 0x9}, {&(0x7f0000002a00)="7aed24a18c1ccd5bf068a3f2093db4ce0ae73fd87d9fc8d70be499e611c21c1e4f5a3b2356325ffb16dbceffd002c1cc26f9ad7150862eead4ed72aa21ba7a7e849ad6af320850aa35a6691e140d9144222c4690dc8c922c034d5a9ae959bff4d8973c79cd03dcf728da950835075f3093f7b3c41f86ca40e5393cb677a41cbd75c9725169d9dac99aa65ce2ba00862cacd0cd91b40b2dd4b58aa2059ca85f2995bb321527c32b49aee5617e72e8b4dd5b8c8e20544624bae3a9e6ad16d5d4ea0f199e32ac3ff6fd40d69d52f3d95a2cbf12c9473a289b36963d1299cdb97d9e12f2fb0968a5062c8f3f4d41a0e448636e43", 0xf2}, {&(0x7f0000002b00)="17eb08d371317aacc2a48a5e44fe9ae8805fb972581b9036857986c71cd75ac6c9428230946fa0f88dcf4620fe8472e1109c223608b864795cae7b9ebf2cb4cfd14810b13a193344fccf631781e3708598aa95568511fd85f500af76f62b7fb66c81234b4ed6c0d4ad1f50f1acaa41c2c59704ac1d3f06d9bb1f31ce73a2fb3b74bd516b5b50f97a86a9ae003a8125583d883aa732bafb52df1ac115a371a6ce76b0b1113ff4c256596413e20ba46ee16bc3bbbb09fbef6e4afcdc78295c74a35a37", 0xc2}, {&(0x7f0000002c00)="9e7439b9cfbf417ef74be0c8bc1f0d0533441286aa9c81a3c06c90f7045c2ffb6113e701e161aeb555cfab388cf40876eb4cf0cb1104a85b0a24188e2775b0819ba36d1266a8b6100f311fc9f31bff5a675d879bd5cb6a463693f93a67cc76bfe185da6fb3d0cb132c250888433505", 0x6f}, {&(0x7f0000002c80)="b19f4e0407e68fe3483253cf173fc3930eda55869edf3583a2c8bb09f9e84d3df933fc1395348b68cea39aa5154fbacabc37e87b9d9a97b79c83c7728cef40e0fd897c2a37318427e08a9da2e9460451c9f6da6f8b0a96f92d9b70d32c3a5b21fb3b52d0a8aeabd2", 0x68}, {&(0x7f0000002d00)="5d281adcdbb5cd5d9e5ceb53a4ae1f20e6587a5d08cfe89d8640289b81fb7398c60916a3e4482d3f", 0x28}, {&(0x7f0000002d40)="a22a777f515fa13d77d37c98e963b6f44217d1ab08a15949bcaae92f431f65f3f429466bc09e028bde1b136d2d8e317b470adbd80d427faa7b87f550f5a7bfdb7031e844d8d55a12ff0d8b21efc134443063774384d6c4e5077e325c86e5e50879e2d3f038a8a21311d55f349c72e3955b664da3bfda73179932212e3d60f603f0f7884e5fe20e64816377563ec3c9631cf89b8ed18f7b2a62fa009ebd5a5894cf73e82d5c0cfe31e0f14f36beb09875f45e81de", 0xb4}], 0x7, 0x0, 0x0, 0x40000a1}], 0x5, 0x8000) r42 = creat(0x0, 0x0) fallocate(r42, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r43 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_SET_SOCK(r43, 0xab00, 0xffffffffffffffff) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$SIOCX25SCAUSEDIAG(0xffffffffffffffff, 0x89ec, &(0x7f0000000100)={0xa, 0x17}) r44 = socket(0x10, 0x0, 0x0) sendto(r44, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r44, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, 0x0}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x2, 0x12, &(0x7f0000000400)=""/254) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:11:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e6c000032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 445.633936] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 12:11:13 executing program 2: clone(0x31020000, 0x0, 0x0, 0x0, 0x0) time(&(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x14000000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) r0 = dup(0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:13 executing program 4: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r0 = syz_open_dev$adsp(0x0, 0x20000401, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000200)={&(0x7f00000001c0)=[0x9e, 0x4, 0x7273], 0x3, 0x9, 0x0, 0x6, 0x6, 0x800, {0x7fffffff, 0x2d7, 0x9, 0x2, 0x6, 0x1222, 0x27e5, 0x3, 0x1000, 0x4800, 0x7f, 0x8, 0x3, 0x800, "6fb265274533f2d7d795f2c8836e9bfcace770625396ae452ea5c8a159587041"}}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x521000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a80)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b000000050000009807000088030000880300009002000000000000f8040000c8060000c8060000c8060000c8060000c806000005000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/80], @ANYBLOB="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"], 0x7f8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 12:11:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e74000032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e7a000032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 446.014166] net_ratelimit: 22 callbacks suppressed [ 446.014218] protocol 88fb is buggy, dev hsr_slave_0 [ 446.025459] protocol 88fb is buggy, dev hsr_slave_1 12:11:13 executing program 4: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x2, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10021, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000005c0)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5bbb89452fd9bb6708ae89ba29", 0xde, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400)=0x0, &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r1, r2, r4) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r7) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/dlm-monitor\x00', 0x0, 0x0) r8 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r9 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001e40)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r9, 0x80287010, &(0x7f0000001e00)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r5, &(0x7f0000000c40)=ANY=[], 0x0) close(r0) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$VHOST_SET_VRING_ERR(r10, 0x4008af22, 0x0) ioctl$KVM_GET_FPU(r10, 0x81a0ae8c, &(0x7f0000000180)) r11 = accept4$packet(r10, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001d80)=0x14, 0x0) listen(r11, 0xfffffffd) setsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x4, 0x9, 0x23, 0x7ff, 0x10001, 0x24, 0x7d, 0x3, 0xa0}, 0x4) process_vm_writev(r7, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x100000000000036d, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r12, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1f00}) ioctl$sock_inet6_SIOCADDRT(r12, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r13 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r13, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1f00}) ioctl$sock_inet6_SIOCADDRT(r13, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r14 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r14, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1f00}) ioctl$sock_inet6_SIOCADDRT(r14, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r15 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r15, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1f00}) ioctl$sock_inet6_SIOCADDRT(r15, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001dc0)=ANY=[@ANYPTR64=&(0x7f00000020c0)=ANY=[@ANYRES32, @ANYRES32=r12, @ANYPTR64=&(0x7f0000000900)=ANY=[@ANYRES64, @ANYPTR64, @ANYPTR64, @ANYRES32=r13, @ANYRES64=0x0, @ANYRES16=r14, @ANYRES64=r3, @ANYRESDEC, @ANYRESDEC=0x0], @ANYBLOB="c428cb2a1b14f69f2ea8ec1c6fe966a9cc5985216e6ba7f75b3ad87ec1b8654bd4bcdc4e0de96c5c3df866040ca83e2eafb2335f7cca0e02e6522afac08517e769cec86d0829d484a4afd3f8b83ca75d1f5ea146f55d93fbdacff47874f69c8d819e3099ab060fd8ab8ca1db1dccf44060e8fc4661cff946051d76b8c19ea459a98029fb3c024d27a1", @ANYRESDEC, @ANYRES32, @ANYRESOCT=r15, @ANYRESDEC]]], 0x8}}, 0xfffffffffffffff9) r16 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r16, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000002000290f0000faffffff0000020000009500290000000001acf2fbd06c53844a", @ANYRES32=0x0, @ANYRES32=0x0], 0x2c}}, 0x0) 12:11:13 executing program 2: clone(0x31020000, 0x0, 0x0, 0x0, 0x0) time(&(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x14000000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) r0 = dup(0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 446.092931] protocol 88fb is buggy, dev hsr_slave_0 [ 446.098769] protocol 88fb is buggy, dev hsr_slave_1 [ 446.127962] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:11:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2ef0000032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2eab010032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 446.288011] bridge0: port 3(gretap0) entered blocking state [ 446.303188] bridge0: port 3(gretap0) entered disabled state [ 446.445771] device gretap0 entered promiscuous mode 12:11:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) r4 = dup(r3) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000340)=r4) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="48004000100005070000800000000000000000000d88419fd43342623ddc65ce2b83b42bf919eecbd445e3bd0246dfb2dda78a7817361b5770f9f1469eb9281e60c8c073fa74b1c5bc7e833d67f010b70bb9dd27baead5cd2379ded37bd5d51da939", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32=r6, @ANYBLOB="ac0c000004000000000000000c0001006367726f75700000200002001c100100180000000000080001006270660004000200040006000000166569735843de8b4c1ef779b8d8e7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063f8d1af66b583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) 12:11:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000240)="585ccbc4ed83b836c1a647cffb1f6bb749a80afc9ca94914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50cc93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d000000000000400000000000000000", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000340)={'s\x01\x00', 0x1}, &(0x7f0000000100)='\x00', 0x90, 0xfffffffffffffffd) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$void(r3, 0x5450) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x0f\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x97\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 12:11:14 executing program 2: clone(0x31020000, 0x0, 0x0, 0x0, 0x0) time(&(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x14000000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) r0 = dup(0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00030032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 446.490570] bridge0: port 3(gretap0) entered blocking state [ 446.496909] bridge0: port 3(gretap0) entered forwarding state 12:11:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000980)={"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"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0xfffffea6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0xfffffea6) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000100)={r6, 0x101, 0x80000001, r7}) r8 = dup3(r3, r4, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)=0x1000) accept4$ax25(r9, &(0x7f0000000280)={{0x3, @rose}, [@null, @bcast, @bcast, @bcast, @null, @null, @null, @null]}, &(0x7f0000000080)=0x48, 0x80400) ioctl$USBDEVFS_CONTROL(r9, 0xc0185500, &(0x7f0000000000)={0x3, 0x15, 0x200, 0x9, 0x1000, 0x467, &(0x7f0000000d80)="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"}) ioctl$KVM_SET_SREGS(r5, 0x4138ae84, &(0x7f0000000140)={{}, {0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0xdef]}) dup2(r8, r5) 12:11:14 executing program 2: clone(0x31020000, 0x0, 0x0, 0x0, 0x0) time(&(0x7f0000000000)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x14000000) r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00050032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:14 executing program 1: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) recvfrom$unix(r2, &(0x7f0000000000)=""/151, 0x97, 0x40, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000000), 0x40000000000028f, 0x0, 0x0) [ 446.779304] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 446.902112] protocol 88fb is buggy, dev hsr_slave_0 [ 446.907304] protocol 88fb is buggy, dev hsr_slave_1 [ 446.972116] protocol 88fb is buggy, dev hsr_slave_0 [ 446.977297] protocol 88fb is buggy, dev hsr_slave_1 12:11:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = dup2(0xffffffffffffffff, r2) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="01000100005d4ed1836f3195a0389031a7a4456cd567bb90d8c362ef8289b36ce88f07376b063f4553fa4dd7e616a0cde27b8c56fc3d2c3405766b4539573e3fc9b2c48551afcf3f0b18c29bddf051", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r4}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e20, 0x1, @empty, 0x8001}}, 0x5, 0x5, 0x1, 0x3, 0x80}, &(0x7f0000000880)=0x98) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x20e6, &(0x7f00000008c0)={0x2, 0x4e1e, @multicast2}, 0xffffffffffffffed) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) flock(0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_SET_INFO(r5, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20004000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x8000) syz_mount_image$msdos(0x0, &(0x7f0000000500)='./file0\x00', 0x8, 0x0, &(0x7f0000001900), 0x8, &(0x7f00000019c0)=ANY=[]) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x16f7883f5a2ea5c) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0xfffffea6) tee(r7, r8, 0xfffffffffffffc01, 0x5) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)=0x1000) accept4(r9, &(0x7f00000003c0)=@caif=@dgm, &(0x7f0000000280)=0x80, 0x80000) openat$cgroup_ro(r6, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000900)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x298, 0x298, 0x368, 0x368, 0x298, 0x4a0, 0x4a0, 0x4a0, 0x4a0, 0x4a0, 0x5, &(0x7f0000000340), {[{{@uncond, 0x0, 0x98, 0xd0}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @empty, @local, @port=0x4e21, @port=0x4e24}}}}, {{@ip={@rand_addr=0x4, @rand_addr=0x8, 0xffffffff, 0xff, 'dummy0\x00', 'veth1_to_hsr\x00', {}, {}, 0x67, 0x0, 0x30}, 0x0, 0x190, 0x1c8, 0x0, {}, [@common=@inet=@recent0={0xf8, 'recent\x00', 0x0, {0x10001, 0x784, 0x4, 0x1, 'syz0\x00', 0x5}}]}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x2, @empty, @dev={0xac, 0x14, 0x14, 0x26}, @port=0x4e24, @gre_key}}}}, {{@uncond, 0x0, 0x98, 0xd0}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x12, @empty, @remote, @port=0x4e24, @icmp_id=0x68}}}}, {{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff000000, 0xff, 'veth0_to_bridge\x00', 'syzkaller1\x00', {0xff}, {}, 0x5e, 0x3, 0xa}, 0x0, 0xd8, 0x138, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x6f93, [0xac6, 0x18c, 0x0, 0x1, 0x6b5253f3, 0x2], 0x9, 0x4}}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev={[], 0x27}, 0x401, 0xf, [0x38, 0xd, 0x27, 0x1b, 0x1b, 0x3b, 0x0, 0xa, 0xf, 0x12, 0x5, 0x33, 0x12, 0x19, 0x21, 0x9], 0x0, 0x10001, 0x3f}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x598) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 12:11:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00060032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:14 executing program 2: clone(0x31020000, 0x0, 0x0, 0x0, 0x0) time(&(0x7f0000000000)) r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:14 executing program 1: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) recvfrom$unix(r2, &(0x7f0000000000)=""/151, 0x97, 0x40, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000000), 0x40000000000028f, 0x0, 0x0) 12:11:14 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x18b264, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000000c0)=0x9) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000100)=0xffff) syz_emit_ethernet(0x86, &(0x7f0000000280)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @remote}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x5c, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @local, {[@rr={0x7, 0x17, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @rand_addr, @loopback, @multicast1]}, @timestamp={0x44, 0x18, 0x0, 0x0, 0x0, [{}, {}, {}, {[@initdev={0xac, 0x1e, 0x0, 0x0}]}]}, @lsrr={0x83, 0x7, 0x0, [@broadcast]}, @ssrr={0x89, 0x7, 0x10, [@rand_addr]}]}}, "1901000000000000"}}}}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x83ec) openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) lseek(r1, 0x0, 0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000900)={0x1, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) sendmmsg$inet_sctp(r2, &(0x7f0000000040)=[{&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x401, @remote, 0x5}, 0x1c, &(0x7f0000000880)=[{&(0x7f0000000340)="88946097f5b091b3eeb5005bbbf501481826ab2268348b68b82ca391828e9d3c5fd12cd4e0a5f7f79c8eddf516d3de704c2a3cb263dfa13d037a3d31a5d7d64b0410ae711576a278b7a38b60ae269806cdc341bcfe9edc57a873f85670145d47f946ae62f8955750db246655abd6c10b8b689a36c49834592c618d906cb1321b460524e1c3a22c6bb65ed7f082fc3513a693a79cc881826aaa643f005d69ad3e35db9d2ca21ef24c5d4fc0c7b4d074b741aeffe8fe775b0e4e4da39279b7f3e3dfad5e74", 0xc4}, {&(0x7f0000000440)="81c8781faf798e453f43397a8f241b7b2b2fd430dc5dba0ef6bbeae666ef766761de2f5161ead74652c988a484b99bf3de4fb245ed965e629956b982df7d4a3ad2d33a0f294dabc8e1b7ab5dc5a5f667c4368cfaf43525b45208fc7ba82de8eec722af52888924d8e019779da069f1cf5bda15bd62a5af4d3886d7d70acee1e8ce97261e4c927812099d541e4cc8376d40e9e7c6f38f6a5cf8d91c70238bebebe67bf9adea8dfb1218823d210d36261a6f388ec58d115c810659de063a6a8244e776f5028feff74e1a75f9061b7dac44081a9f352b1c49c3e6253a9e45735bbf271207e1913dcd9db84cd0132d3734956d94849782171c0560315c2f50", 0xfd}, {&(0x7f0000000540)="918937454e44ad3efcef7a9f87c51e24133e0ceef43e779ae1219d10a25c9532eb78ab25ca945696a2fe301bf0990c3da29553fee63d80a45ba72f22437c36f8160074dac18b815f4611c050069823861648", 0x52}, {&(0x7f00000005c0)="95187e2a0b5168dc9db1f6a07f7a64a3d9c48d5dbdcabcd17b96c4c4c24872d5179ba54853cbfa43e1c8b11fc9d48a880cc482bcd44a0da1a78a451976b40c2ffdd93c9b9efeec14fd59eb5cf6ea4381e990b2751e853fd8571753a4131f8b2f782b3871eaaf1201b22e1eb6fd1684db61efcdcd309591691a0cbf4862", 0x7d}, {&(0x7f0000000640)="67c643522b236a1b922024fbaca6ffe451b45090a966f69de450b3689b0a5d52a69a1496fefb320bc38f847092fbd94359d82790c8cb92f3e9d1f87ff316c7b2ff76c88502135b622af28adb7215fd70f0738b4175c93ad923de00dc50b7ac82344194cc7e9c5dbe0e8b599af1551ab3b7b138e60aa71821bad7444764a30653787e643ef36f35bdee95a54e8e684c3c0cda57c16385e18cf718dc2674b056c15ee7ba4848a430ab", 0xa8}, {&(0x7f0000000700)="a2f414a95dad5dee6fd1f74fb4ded4a601d10fc220e76f5ed975562a8aece25d185385dd59dbc5bbf446fbc3920a641e21e8f1df78a79ee3bb719a2d6dc045df765466a81454510c52e987507bf38289f9cbbb79298bae2854a5089f5f4a02db576e80ffb92079d0e0a749703252ff610ee372998f4eadac29ad1a898289cf372e6249f5eb4eb9b397d41f086832ddffbdff5788eb9fdbde806fcf06fd762db86e74f6a5b7aa4d913e7e082fd90e6efaa57aa74019bab359b07b140eae34e30612e33149e94fd1f9e19c91ca95f2a4f9ee1e89d831cfbc12694339f7b4c00d69cd7eaaf14b00b77a53b893f7fbdb13a9e35b7c5c8ab3a6bc", 0xf8}, {&(0x7f0000000800)="283d222a0354d29a7aeb17f48ab9796394c9b885848df5f3fbe7dd52b9959ef33bccead7eba675abd04da246b66f9ac65cc2ae72f8a6b51602727259f0c645aed7604301049d9b4c94b83c35fba0852d6ba804840aa1bfc63cbfaffa9a5f1ee3cb3244a5a153ce554486ee0e6afc9eb3a947ea90", 0x74}], 0x7, 0x0, 0x0, 0x40}], 0x1, 0x20000000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000240)={&(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x1, 0x2, 0x1, 0x4}) 12:11:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00070032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:14 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="93f9482803f19400"/18]) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000018c0)={0x0, @loopback, @local}, &(0x7f0000001900)=0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) bind$xdp(r0, &(0x7f0000001940)={0x2c, 0x8, r1, 0x28, r2}, 0x10) 12:11:14 executing program 2: clone(0x31020000, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 447.329994] overlayfs: unrecognized mount option "“ùH(ñ”" or missing value [ 447.372103] protocol 88fb is buggy, dev hsr_slave_0 [ 447.375756] overlayfs: unrecognized mount option "“ùH(ñ”" or missing value [ 447.377241] protocol 88fb is buggy, dev hsr_slave_1 12:11:15 executing program 1: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{0x0}, {&(0x7f00000008c0)=""/218, 0xda}, {0x0}], 0x3}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1, &(0x7f0000003680)=""/187, 0xbb}}], 0x2, 0x0, &(0x7f0000005480)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) shutdown(r3, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) futex(&(0x7f00000001c0), 0x82, 0x0, &(0x7f0000000240), &(0x7f0000000280), 0x1) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x1754) setreuid(0x0, 0x0) pipe(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000cab000)=0x310) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) ioctl$sock_SIOCBRDELBR(r5, 0x89a1, &(0x7f00000000c0)='hsr0\x00') getresuid(&(0x7f0000004180), 0x0, 0x0) 12:11:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000a0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 447.433631] device bridge_slave_1 left promiscuous mode [ 447.440787] bridge0: port 2(bridge_slave_1) entered disabled state 12:11:15 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:15 executing program 4: getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000010c0), 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x8, 0x0, 0x20, 0x0, 0x7f, 0xaaf455659d8b9c4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca2, 0x0, @perf_bp={&(0x7f0000001580), 0xa}, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(0xffffffffffffffff, r1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x4}, 0x8) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000001100)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r5 = accept4(0xffffffffffffffff, &(0x7f0000001140)=@alg, &(0x7f00000011c0)=0x80, 0x800) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000001200)=@assoc_value={0x0, 0x6}, &(0x7f0000001240)=0x8) pipe(&(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r8 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r8, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB], 0xa) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r12 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r12, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r12, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r12, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r12, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r12, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x3ff, 0x1, [0x0]}, 0xa) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") r15 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r15, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r15, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r15, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r15, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r15, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x3ff}, 0x8) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r16, &(0x7f0000000000), 0xfffffea6) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r17, &(0x7f0000000000), 0xfffffea6) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001880)=ANY=[@ANYRES16=r6, @ANYPTR=&(0x7f00000026c0)=ANY=[@ANYRES64=r2, @ANYRESDEC, @ANYPTR, @ANYRESDEC=r5, @ANYRES32], @ANYRESDEC=r1, @ANYBLOB="371f4357362b18fc3ebe0c8c106e7d4cefd67cdd5328fbb97890c819729cad6af949fd54f3c206e52b72de13e4bfa1d4a4f136b379bc1be0421b132dd20e1d5511a65ffa0f076ef53c091a2cbcd116c5abfb7fa170dedf79fc488c5e22e57d88f2148585817a067643a07077ff6e85b20a26c34373f27204fdbfcde6bf403d8523f5ba44f93eacc81707a6053faace55f3fedcf07ee8ea8fa97aa5be45e130786f05c997c12be2b1063cdd51b62df30954382e4e70686de41745669170af8f89def6cd885c8884910ec27dfb99d776285995b11bd3f9ad8e39be947110610bbfe1bfe372f2efd2e4565c0b0e994cda5c3888c2d0467322", @ANYRES16, @ANYRESDEC=0x0, @ANYPTR=&(0x7f0000001700)=ANY=[@ANYRES16, @ANYPTR=&(0x7f0000002340)=ANY=[], @ANYRESDEC, @ANYRES64=r10, @ANYRES32, @ANYBLOB="7d508731092f307a2246f705872fbb6fb8cc37fb5a77b72653afe37f2b306d799a4d4509993187acba53a357b8c78c76a1cbbffea9bd501548441ee5d762df9e60ef67099038f8c3e050ac25c79b176a735e4ffc781868d2cf3af38c7cb034ea2ecd12ae6d47c31564828e6b5316c28688b44d91371cda86dd61d043f8ed8e9ed80668be98a85b514bc66fdf16bcea5432a27ef0ccd723cd58b9896736d475a320142678fcb909d3456f7556613b4c7a8bad9a141cc26b1e69f3172de8adf497e42dbf", @ANYRESHEX, @ANYPTR64=&(0x7f00000019c0)=ANY=[@ANYRESHEX=r17, @ANYBLOB="f734d04f74cca15d045c281bb976a579b39ebe8c308a4bc5ea540d05c289713c0582cde3f2d391f50ab99abad921984ec63c886b2f07ae20d66a5d5514d6b431418993aaf394335e28b99f109968f4fb7ed4808f1edfa3f6b6e1ee89fad1f4a65f412d458f457b548150c2c47e1e3d892929582e7220d44928049b354086d9839eb00cdad0ede6f46b5b420aa93d0bcedc7c8922400f410b07a656", @ANYRESOCT], @ANYPTR=&(0x7f0000002400)=ANY=[@ANYRESDEC=0x0], @ANYRESDEC=r16], @ANYPTR64], 0x13b) write$P9_RREAD(r6, &(0x7f0000000080)={0x1001, 0x75, 0x0, {0xff6, "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"}}, 0x1001) epoll_ctl$EPOLL_CTL_DEL(r6, 0x2, 0xffffffffffffffff) r18 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x107402, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r18, 0xc0046686, &(0x7f0000001280)=ANY=[@ANYBLOB="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"]) r19 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r19, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r19, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r19, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r19, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r19, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r19, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r19, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 447.523810] device bridge_slave_0 left promiscuous mode [ 447.543097] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.835316] device hsr_slave_1 left promiscuous mode [ 447.877350] device hsr_slave_0 left promiscuous mode [ 447.941953] team0 (unregistering): Port device team_slave_1 removed [ 447.978546] team0 (unregistering): Port device team_slave_0 removed [ 448.019305] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 448.077573] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 448.215452] bond0 (unregistering): Released all slaves [ 449.425215] IPVS: ftp: loaded support on port[0] = 21 [ 449.493740] chnl_net:caif_netlink_parms(): no params data found [ 449.526314] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.532879] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.539987] device bridge_slave_0 entered promiscuous mode [ 449.547628] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.554270] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.561350] device bridge_slave_1 entered promiscuous mode [ 449.579580] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 449.589383] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 449.608434] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 449.616123] team0: Port device team_slave_0 added [ 449.621855] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 449.629638] team0: Port device team_slave_1 added [ 449.635335] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 449.642921] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 449.724083] device hsr_slave_0 entered promiscuous mode [ 449.792644] device hsr_slave_1 entered promiscuous mode [ 449.843232] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 449.850636] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 449.868234] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.874724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 449.881329] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.887747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 449.924918] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 449.931026] 8021q: adding VLAN 0 to HW filter on device bond0 [ 449.939945] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 449.949615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 449.957212] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.964243] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.971230] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 449.982514] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 449.988668] 8021q: adding VLAN 0 to HW filter on device team0 [ 449.998363] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.006114] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.012546] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.023191] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.030985] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.037399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.054131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 450.061928] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 450.072431] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 450.088079] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 450.099495] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 450.110017] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 450.116721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 450.125038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 450.133483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 450.147351] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 450.156189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 450.164458] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 450.179462] 8021q: adding VLAN 0 to HW filter on device batadv0 12:11:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2) preadv(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6609) connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@unspec, 0xc) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r1, 0x100000003, 0x0, 0x28120001) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), 0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x7, "d4bd4c0b2ecc0d"}, &(0x7f0000000140)=0xf) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e22, 0x4c2, @loopback, 0x3}}, [0x0, 0x0, 0x0, 0x0, 0xb46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f0f, 0x3f5a, 0x0, 0x0, 0x6]}, &(0x7f0000000200)=0x100) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) r3 = openat(r1, &(0x7f0000000040)='./bus\x00', 0x400000, 0x989903dbb8cdfe4) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000180)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280), 0x20) 12:11:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000e0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:18 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x210000, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0x10, 0x4) ioctl$TCXONC(r0, 0x540a, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x8081, 0x0) r2 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r2, &(0x7f0000000080)={0x14}, 0xfffffff4) r3 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) close(r3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) ftruncate(r4, 0x4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, &(0x7f0000000000)=0x10, 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r6, 0x10e, 0x2, &(0x7f0000000240)=0x10, 0x4) fcntl$getownex(r6, 0x10, &(0x7f0000000340)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="010000008c53f7a696b22191cb1bcaa53da5a8349fd875f69c52e6c536c902d5fe0a8d7f12b1ce23b89ec8979f8ca430ca64e34ffbf2f002d771e65cebeb2872316444252dc5591b9776f843bc24772477b1243c7fa8a7c4e20f222a70a35378e1e780fc56eaaf341ffc5870f1ad06f92615651db78bbce8ab00ada25c52d1367e9498d00b09003976e89d63fbfa6df6cd975c440f3389552d54832de9d84b7240fddd10d73694e29ce583c7c60db52eb2594e0f", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000040)={r7, 0xd366}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000280)={r7, 0x2, 0x30}, 0xc) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x3, 0x81}, &(0x7f0000000200)=0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000240)=0x10, 0x4) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 12:11:18 executing program 2: r0 = memfd_create(0x0, 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r1) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r5 = dup(r4) setsockopt$RDS_FREE_MR(r5, 0x114, 0x3, &(0x7f0000000080)={{0xfffffffa, 0xffff}, 0x6}, 0x10) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x500, 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000140)=0x80041) r7 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r7, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0xffffffff00000000) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 12:11:18 executing program 3: socket$inet_dccp(0x2, 0x6, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000000000/0x200000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000090000/0x2000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0xffffffffffffff10) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/52, 0x34}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) setresgid(0x0, r7, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0xfe, 0x1000000000000000}], 0x0, &(0x7f0000000480)={[{@gid={'gid', 0x3d, r7}}, {@errors_continue='errors=continue'}, {@errors_recover='errors=recover'}, {@case_sensitive_no='case_sensitive=no'}, {@fmask={'fmask', 0x3d, 0x1}}], [{@euid_gt={'euid>', r8}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic'}}]}) fchown(r3, r5, r7) r9 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T4(r9, 0x103, 0x6, &(0x7f0000000580)=0x6, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) mmap$usbfs(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x50, r2, 0x7) 12:11:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000f0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:18 executing program 2: r0 = memfd_create(0x0, 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 450.511239] ptrace attach of "/root/syz-executor.3"[12657] was attempted by "/root/syz-executor.3"[12679] 12:11:18 executing program 3: sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\t', @ANYRES16=0x0, @ANYBLOB="00000000000000000000020000007c00010008000300fdffffff92fe030000000000100001008000000073797a3000000000100001007564703a73797a30000000001000010069623a766c616e30000000000800030000000000040002002c0004f61300010002"], 0x3}}, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x1ff, 0x0) sendmsg$tipc(r0, &(0x7f00000004c0)={&(0x7f0000000240)=@id={0x1e, 0x3, 0x3, {0x4e20, 0x1}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000280)="c566d00d9805a453f151579438ff6f5c", 0x10}, {&(0x7f0000000340)="01ae293951553a59157eb9fb7934c387304b7323399b229d2bdf5c0a518ac087ec395275dd", 0x25}], 0x2, &(0x7f0000000400)="8bdef8cbeae029c3f1ba58f48167b34e6f0383dcf0c2808a6e7b263bf29ac4f53110e315a4bacd88ad092196bce13ba1d15926f11c80fd4b148b52b150b032d7f47c8332420acbe41d1f9abd327e5ededd5f390f182c3273f6a5b8dd8199de9c0799f7ee52e1b9d3b38cf5d5d0786770c5b9a2e9ad46e2e32e5c26f498accbe6288c2f86401fae5ba692ce02bdab9f4c14b5754eafbd85d6aa679d5df8270567fc4a709883fa95af64f70733", 0xac, 0x40}, 0x20000008) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000040)) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x525af40f}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x6040010}, 0x80) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x1, 0x344, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) 12:11:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x4e21, @local}}) fsetxattr$security_ima(r1, &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@v1={0x2, "b4b92d4cc2f4fa0f8fdd31f51830ab87c59b85"}, 0x14, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x6d) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000bccb280012000c000100766574680000000018000200fd00010000000000", @ANYRES32=0x0, @ANYBLOB="e6d2809622f8c4b2385df8c3c630915ec1408445b5b028612ede57e9d4fd6367e4d59c8b610ebbf4ba2eb2957ab0d46550f08820ad00f499df6ea463a35308ff338832e56536c517973be224c5666747ea779d"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0x4, 0xfffffffffffffffe}]}, 0x28}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0xfffffea6) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000000200)={0x3, 0x26, 0x1}) 12:11:18 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000200), &(0x7f0000000480)=0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0xfe7, 0x0, 0xed, 0x48c0, 0xc, 0x0, 0xa, 0x0, 0xa7, 0x0, 0x1f, 0x0, 0x6, 0x0, 0xfffffffffffff89d, 0x6, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x7, 0x7, 0x80, 0x3, 0x0, 0x0, 0x7, 0x80, 0x0, 0xc5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x4080, 0x401, 0xfffe, 0x5, 0x48f, 0x9, 0x5}, 0x0, 0x8, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) r6 = gettid() r7 = socket$kcm(0xa, 0x5, 0x0) close(r7) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x4, 0x6, 0x2, 0xfb, 0x0, 0x100, 0x180, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp, 0x1ed01c4de1a63abb, 0x14, 0x7fffffff, 0x0, 0xffffffffffffffe0, 0x10001, 0xde}, r6, 0x2, r5, 0x8) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0xfffffea6) recvmsg$kcm(r8, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local}, 0x62, &(0x7f0000000400), 0x1, &(0x7f0000000940)=""/214, 0xd6}, 0x2080) recvmsg$kcm(r7, &(0x7f0000000640)={&(0x7f00000002c0)=@hci, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/123, 0x7b}, {&(0x7f0000000500)=""/137, 0x89}, {&(0x7f00000005c0)=""/70, 0x46}], 0x3}, 0x40) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 12:11:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x284, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x172, 0x0, 0x0, 0xfffffffffffffe0b) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 450.640637] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 450.663708] IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready [ 450.671723] team0: Port device veth3 added 12:11:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00200032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:18 executing program 2: r0 = memfd_create(0x0, 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:18 executing program 3: openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tgkill(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x3) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) syz_open_dev$dspn(0x0, 0x0, 0x0) r0 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x0) fchdir(r0) io_setup(0x65ce, &(0x7f00000019c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000600)="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", 0x188) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x272) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="6051278077"], 0x1) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x142) truncate(&(0x7f0000001740)='./file0\x00', 0x5) sendfile(r1, r2, 0x0, 0x7fffffa7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x142) 12:11:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e003f0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000100)) socket$inet6(0xa, 0x2, 0x0) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$dri(0x0, 0x1, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000022c0)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x343eb24d5f4bf516, 0x0) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) 12:11:18 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r0 = dup(0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:18 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r0 = dup(0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 451.052658] net_ratelimit: 24 callbacks suppressed [ 451.052683] protocol 88fb is buggy, dev hsr_slave_0 [ 451.063312] protocol 88fb is buggy, dev hsr_slave_1 [ 451.148288] audit: type=1800 audit(1574251878.824:152): pid=12728 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16518 res=0 12:11:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00480032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:18 executing program 1: unshare(0x2040400) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) r3 = socket(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r5}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=r5, @ANYBLOB="030004004db41a0000010d08"], &(0x7f0000000340)=0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0xfffffea6) ioctl$VIDIOC_G_FMT(r6, 0xc0d05604, &(0x7f0000000380)={0x9, @sliced={0x5, [0x2, 0x0, 0x80, 0x4, 0x2, 0x5, 0x3, 0x40, 0x10, 0x3, 0xd7c2, 0x8, 0xff, 0x8, 0x2, 0xf90, 0x6, 0x6, 0xffff, 0x101, 0xe0b, 0xfffd, 0x339, 0x7, 0x2110, 0x400, 0x2, 0xf7b2, 0x4, 0x8, 0x5, 0x1000, 0x8, 0xf4f, 0x0, 0x4, 0x5, 0x1000, 0x101, 0x6, 0x6, 0x4, 0x1, 0x0, 0x2, 0x401, 0x6, 0xe206]}}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000080)={r5, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f00000001c0)=@req3={0x10000, 0xfffffff8, 0x8, 0x401, 0x4, 0x0, 0x200}, 0x1c) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r9 = fanotify_init(0x0, 0x0) fanotify_mark(r9, 0xd, 0x48000028, r8, 0x0) 12:11:19 executing program 0: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200200, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1]) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000080)={0x400, {{0x2, 0x4e24, @remote}}, {{0x2, 0x4e23, @multicast2}}}, 0x108) [ 451.296047] audit: type=1804 audit(1574251878.854:153): pid=12728 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515193472/syzkaller.83htGx/3/file0/file0" dev="sda1" ino=16518 res=1 12:11:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='\x00\x00\x00\x04\x04\x00\x10\x00', 0x1, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:11:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e004c0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:19 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r0 = dup(0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00600032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 451.532097] protocol 88fb is buggy, dev hsr_slave_0 [ 451.537294] protocol 88fb is buggy, dev hsr_slave_1 12:11:19 executing program 4: socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xf, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0xeca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000000), 0x2) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) 12:11:19 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) 12:11:19 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) dup(r0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x87) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xffcf, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="a199000036002908000000000000f9ff03000000c702000089990100ffffffff000000030000000000000001"], 0x99a1}, 0x1, 0xffffff7f0e000000}, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) [ 451.700215] audit: type=1804 audit(1574251879.374:154): pid=12781 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir427069130/syzkaller.vLLSD0/122/file0" dev="sda1" ino=16551 res=1 12:11:19 executing program 3: socket$inet6(0xa, 0x0, 0x2000000000adb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x23cea33ffd51e6f6) getuid() r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000100)) semop(r0, &(0x7f0000000640)=[{0x3, 0x8, 0x1000}, {0x93ba09a4b1db243e, 0x7, 0x800}, {0x3, 0x94, 0x1800}], 0x3) lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32], 0x177) stat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x4000000000}, r2, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x4) lseek(r3, 0x1, 0x3) read$char_usb(r3, &(0x7f0000000200)=""/153, 0x99) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="047da6d8fda6"], 0x1) r4 = msgget$private(0x0, 0x23cea33ffd51e6f6) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYRES32, @ANYRES32=r6], 0x8) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r9 = add_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="cbc74ef91a5d82e783cc7b4995923b0a075be0e75ab680912fe2b1a06874eaad90e2039fbd0607ac28528818b10669622aa08ef42b5687e40412aa217629ab184c92d8ae72db6b28b786", 0x4a, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r9) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000440)={{0x0, 0x0, r5, r6, r7, 0x20, 0x739}, 0x100000001, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r8}) lchown(&(0x7f0000000080)='./bus\x00', r6, r1) fallocate(r3, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000000)="e5"}], 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 12:11:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00680032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:19 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) dup(r0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 451.772136] protocol 88fb is buggy, dev hsr_slave_0 [ 451.777331] protocol 88fb is buggy, dev hsr_slave_1 [ 451.823149] audit: type=1804 audit(1574251879.444:155): pid=12784 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir427069130/syzkaller.vLLSD0/122/file0" dev="sda1" ino=16551 res=1 12:11:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e006c0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:19 executing program 4: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) dup(r0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:19 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) dup(r0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 451.984544] netlink: zone id is out of range [ 451.989056] netlink: zone id is out of range [ 452.033473] netlink: zone id is out of range 12:11:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x1000000002711, &(0x7f0000af0fe7)=""/13, &(0x7f00000000c0)=0x4e2) 12:11:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00740032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:19 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, 0x0, 0xfffffffffffffffd, 0x0, 0x1000) 12:11:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)) ptrace(0x10, r4) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) accept(r5, &(0x7f0000000280)=@alg, &(0x7f0000000300)=0x80) ptrace$pokeuser(0x6, r4, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r4, 0x388, 0x2) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0xb9, 0x7e, 0x0, 0x7, 0x8000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x8eda1d005ef77132, @perf_bp={&(0x7f00000001c0), 0xf}, 0x1004, 0x2125, 0x6, 0x0, 0xeb5, 0x80000001, 0x8}, r4, 0x1, r2, 0x4) fcntl$getflags(r3, 0x1) sendfile(r3, r3, 0x0, 0x27) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x4, 0x391f01) read$usbmon(r2, 0x0, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000040)=""/250) [ 452.162432] audit: type=1804 audit(1574251879.834:156): pid=12784 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir427069130/syzkaller.vLLSD0/122/file0" dev="sda1" ino=16551 res=1 12:11:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000001c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000340)=0x80) fsetxattr$security_ima(r4, &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=@ng={0x4, 0x11, "4c058466b8317be653"}, 0xb, 0x3) getsockopt$inet6_dccp_buf(r3, 0x21, 0x80, &(0x7f0000000100)=""/185, &(0x7f0000000080)=0xb9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x4048000) r7 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r7, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x102}}], 0x1, 0x4048000) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f00000000c0)=r8) r9 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r9, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r9, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) recvmmsg(r9, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) mmap(&(0x7f0000dff000/0x200000)=nil, 0x200000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106], 0x1c000}) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x15b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 452.252364] protocol 88fb is buggy, dev hsr_slave_0 12:11:19 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) [ 452.278910] audit: type=1804 audit(1574251879.864:157): pid=12784 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir427069130/syzkaller.vLLSD0/122/file0" dev="sda1" ino=16551 res=1 [ 452.371823] audit: type=1400 audit(1574251879.994:158): avc: denied { dyntransition } for pid=12823 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 452.400601] audit: type=1804 audit(1574251880.044:159): pid=12833 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir427069130/syzkaller.vLLSD0/123/file0" dev="sda1" ino=16625 res=1 [ 452.434650] audit: type=1804 audit(1574251880.104:160): pid=12834 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir427069130/syzkaller.vLLSD0/123/file0" dev="sda1" ino=16625 res=1 12:11:20 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, 0x0, 0xfffffffffffffffd, 0x0, 0x1000) 12:11:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e007a0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:20 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) 12:11:20 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) 12:11:20 executing program 3: socket$inet6(0xa, 0x0, 0x2000000000adb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x23cea33ffd51e6f6) getuid() r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000100)) semop(r0, &(0x7f0000000640)=[{0x3, 0x8, 0x1000}, {0x93ba09a4b1db243e, 0x7, 0x800}, {0x3, 0x94, 0x1800}], 0x3) lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32], 0x177) stat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x4000000000}, r2, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x4) lseek(r3, 0x1, 0x3) read$char_usb(r3, &(0x7f0000000200)=""/153, 0x99) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="047da6d8fda6"], 0x1) r4 = msgget$private(0x0, 0x23cea33ffd51e6f6) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYRES32, @ANYRES32=r6], 0x8) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r9 = add_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="cbc74ef91a5d82e783cc7b4995923b0a075be0e75ab680912fe2b1a06874eaad90e2039fbd0607ac28528818b10669622aa08ef42b5687e40412aa217629ab184c92d8ae72db6b28b786", 0x4a, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r9) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000440)={{0x0, 0x0, r5, r6, r7, 0x20, 0x739}, 0x100000001, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r8}) lchown(&(0x7f0000000080)='./bus\x00', r6, r1) fallocate(r3, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000000)="e5"}], 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 12:11:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e01ab0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 452.664589] audit: type=1804 audit(1574251880.344:161): pid=12849 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir258395771/syzkaller.Oj7gNt/36/file0" dev="sda1" ino=16724 res=1 12:11:20 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, 0x0, 0xfffffffffffffffd, 0x0, 0x1000) 12:11:20 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) 12:11:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00f00032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:20 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x0) 12:11:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000003f000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:20 executing program 4: socket$inet6(0xa, 0x0, 0x2000000000adb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x23cea33ffd51e6f6) getuid() r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000100)) semop(r0, &(0x7f0000000640)=[{0x3, 0x8, 0x1000}, {0x93ba09a4b1db243e, 0x7, 0x800}, {0x3, 0x94, 0x1800}], 0x3) lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32], 0x177) stat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x4000000000}, r2, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x4) lseek(r3, 0x1, 0x3) read$char_usb(r3, &(0x7f0000000200)=""/153, 0x99) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="047da6d8fda6"], 0x1) r4 = msgget$private(0x0, 0x23cea33ffd51e6f6) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYRES32, @ANYRES32=r6], 0x8) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r9 = add_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="cbc74ef91a5d82e783cc7b4995923b0a075be0e75ab680912fe2b1a06874eaad90e2039fbd0607ac28528818b10669622aa08ef42b5687e40412aa217629ab184c92d8ae72db6b28b786", 0x4a, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r9) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000440)={{0x0, 0x0, r5, r6, r7, 0x20, 0x739}, 0x100000001, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r8}) lchown(&(0x7f0000000080)='./bus\x00', r6, r1) fallocate(r3, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000000)="e5"}], 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 12:11:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000052000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:20 executing program 0: socket$inet6(0xa, 0x0, 0x2000000000adb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x23cea33ffd51e6f6) getuid() r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000100)) semop(r0, &(0x7f0000000640)=[{0x3, 0x8, 0x1000}, {0x93ba09a4b1db243e, 0x7, 0x800}, {0x3, 0x94, 0x1800}], 0x3) lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32], 0x177) stat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x4000000000}, r2, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x4) lseek(r3, 0x1, 0x3) read$char_usb(r3, &(0x7f0000000200)=""/153, 0x99) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="047da6d8fda6"], 0x1) r4 = msgget$private(0x0, 0x23cea33ffd51e6f6) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYRES32, @ANYRES32=r6], 0x8) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r9 = add_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="cbc74ef91a5d82e783cc7b4995923b0a075be0e75ab680912fe2b1a06874eaad90e2039fbd0607ac28528818b10669622aa08ef42b5687e40412aa217629ab184c92d8ae72db6b28b786", 0x4a, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r9) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000440)={{0x0, 0x0, r5, r6, r7, 0x20, 0x739}, 0x100000001, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r8}) lchown(&(0x7f0000000080)='./bus\x00', r6, r1) fallocate(r3, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000000)="e5"}], 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 12:11:20 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x0) 12:11:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00020032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:21 executing program 3: socket$inet6(0xa, 0x0, 0x2000000000adb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x23cea33ffd51e6f6) getuid() r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000100)) semop(r0, &(0x7f0000000640)=[{0x3, 0x8, 0x1000}, {0x93ba09a4b1db243e, 0x7, 0x800}, {0x3, 0x94, 0x1800}], 0x3) lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32], 0x177) stat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x4000000000}, r2, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x4) lseek(r3, 0x1, 0x3) read$char_usb(r3, &(0x7f0000000200)=""/153, 0x99) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="047da6d8fda6"], 0x1) r4 = msgget$private(0x0, 0x23cea33ffd51e6f6) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYRES32, @ANYRES32=r6], 0x8) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r9 = add_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="cbc74ef91a5d82e783cc7b4995923b0a075be0e75ab680912fe2b1a06874eaad90e2039fbd0607ac28528818b10669622aa08ef42b5687e40412aa217629ab184c92d8ae72db6b28b786", 0x4a, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r9) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000440)={{0x0, 0x0, r5, r6, r7, 0x20, 0x739}, 0x100000001, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r8}) lchown(&(0x7f0000000080)='./bus\x00', r6, r1) fallocate(r3, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000000)="e5"}], 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 12:11:21 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x0) 12:11:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00030032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:21 executing program 1: socket$inet6(0xa, 0x0, 0x2000000000adb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x23cea33ffd51e6f6) getuid() r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000100)) semop(r0, &(0x7f0000000640)=[{0x3, 0x8, 0x1000}, {0x93ba09a4b1db243e, 0x7, 0x800}, {0x3, 0x94, 0x1800}], 0x3) lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="750000007d0200000055002108ff7f00000803000000030000000000000000008481ffffffffffffff7f060000000000000015005e656d3170b226c252f178ce58996163636573737b02002b5d0b002f6465762f6c6f6f70230000000b002f6465762f6c6f6f70230081bd54fad523883cfdb8a67efa89aaef8c006291b100aa0e33ec99b507007378a3b1875ddfb747dd45b1eff91316b25bc9c51f1f3f49d2da8d6d5872e8ded1727987d04d5e60f62fec249133decf4b1b94b68b0c8f42f4cd9ca6f0d9e0909e51e73098fed5096209c2d2f0e3e93701eba8f6c9f3b577b33a825852b2d01981b868aa71a607edb4706c4eb544faa345e3169d214651f8e36637f2f9a36d4c66f4c80f847df14058ac513cda51b249bda781312a9cedafc7c70b4000085568c48f3239f7be25b69a2159848c0c77ab6de1cecad7f3b48f5b7882251d4a1019396cb0e06b28af873b6bc0ef55b6c4cfc2f7253325c8c67e049667820000000000000000593f6129", @ANYRES32, @ANYRES32], 0x177) stat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x4000000000}, r2, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x4) lseek(r3, 0x1, 0x3) read$char_usb(r3, &(0x7f0000000200)=""/153, 0x99) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="047da6d8fda6"], 0x1) r4 = msgget$private(0x0, 0x23cea33ffd51e6f6) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYRES32, @ANYRES32=r6], 0x8) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) r9 = add_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="cbc74ef91a5d82e783cc7b4995923b0a075be0e75ab680912fe2b1a06874eaad90e2039fbd0607ac28528818b10669622aa08ef42b5687e40412aa217629ab184c92d8ae72db6b28b786", 0x4a, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r9) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000440)={{0x0, 0x0, r5, r6, r7, 0x20, 0x739}, 0x100000001, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r8}) lchown(&(0x7f0000000080)='./bus\x00', r6, r1) fallocate(r3, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000000)="e5"}], 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 12:11:21 executing program 2 (fault-call:2 fault-nth:0): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00040032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 453.703295] FAULT_INJECTION: forcing a failure. [ 453.703295] name failslab, interval 1, probability 0, space 0, times 0 [ 453.742802] CPU: 1 PID: 12911 Comm: syz-executor.2 Not tainted 4.19.84 #0 12:11:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00050032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 453.749810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.759180] Call Trace: [ 453.761794] dump_stack+0x197/0x210 [ 453.765443] should_fail.cold+0xa/0x1b [ 453.769549] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 453.774702] ? lock_downgrade+0x880/0x880 [ 453.778921] __should_failslab+0x121/0x190 [ 453.783204] should_failslab+0x9/0x14 [ 453.787031] kmem_cache_alloc+0x2ae/0x700 [ 453.791212] ? ksys_write+0x1f1/0x2d0 [ 453.795131] getname_flags+0xd6/0x5b0 [ 453.798968] ? do_syscall_64+0x26/0x620 [ 453.802968] ? 0xffffffff81000000 [ 453.806447] __x64_sys_execveat+0xd4/0x130 [ 453.810713] do_syscall_64+0xfd/0x620 [ 453.814538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 453.819744] RIP: 0033:0x45a639 [ 453.822954] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 453.841880] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 453.849629] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 453.857244] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 453.864544] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 453.871982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 453.879268] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 453.886564] ? 0xffffffff81000000 12:11:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00060032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:21 executing program 2 (fault-call:2 fault-nth:1): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 454.043149] FAULT_INJECTION: forcing a failure. [ 454.043149] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 454.055037] CPU: 1 PID: 12924 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 454.061995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.071401] Call Trace: [ 454.074028] dump_stack+0x197/0x210 [ 454.077708] should_fail.cold+0xa/0x1b [ 454.081733] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 454.086879] ? mark_held_locks+0x100/0x100 [ 454.091130] ? __f_unlock_pos+0x19/0x20 [ 454.095128] __alloc_pages_nodemask+0x1ee/0x750 [ 454.095148] ? __alloc_pages_slowpath+0x2870/0x2870 [ 454.095164] ? find_held_lock+0x35/0x130 [ 454.095190] cache_grow_begin+0x91/0x8c0 [ 454.095206] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 454.095334] ? check_preemption_disabled+0x48/0x290 [ 454.095353] kmem_cache_alloc+0x63b/0x700 [ 454.095371] ? ksys_write+0x1f1/0x2d0 [ 454.131733] getname_flags+0xd6/0x5b0 [ 454.135542] ? do_syscall_64+0x26/0x620 [ 454.139519] ? 0xffffffff81000000 [ 454.142979] __x64_sys_execveat+0xd4/0x130 [ 454.147257] do_syscall_64+0xfd/0x620 [ 454.151053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.156232] RIP: 0033:0x45a639 [ 454.159412] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 454.178487] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 454.186210] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 12:11:21 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(0xffffffffffffffff, 0x8, r4) r5 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$describe(0x6, r5, &(0x7f0000000180)=""/250, 0xfa) sendfile(r2, r0, &(0x7f0000000040)=0x1, 0x4000000000d9) 12:11:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00070032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 454.193561] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 454.200823] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 454.208112] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 454.215373] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 454.222646] ? 0xffffffff81000000 [ 454.430264] device nr0 entered promiscuous mode 12:11:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xacab65bbbc89ee03}, 'teql0\x00'}}, 0x1e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000000)='ip6erspan0\x00'}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000140)=@add_del={0x3, &(0x7f0000000100)='ip6erspan0\x00\aH\x00\x00\x02'}) 12:11:22 executing program 2 (fault-call:2 fault-nth:2): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000a0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:22 executing program 1: getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0xe9484f786a3bb8e4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socket(0x10, 0x400000000080803, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240), 0x8) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000001140)=@alg, &(0x7f00000011c0)=0x80, 0x800) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000001200)=@assoc_value={0x0, 0x6}, &(0x7f0000001240)=0x8) getpgrp(r0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x0, &(0x7f00000000c0)="0800a1695e1d") socket$inet6_sctp(0xa, 0x80000000000001, 0x84) r5 = socket(0x0, 0x0, 0x0) write(r5, &(0x7f0000000180)="2600000022004701060000000000000002000000002b1f0097d2447bcd289834b01500000000", 0x26) read(r5, &(0x7f0000000000)=""/234, 0xea) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000080), 0xfffffffffffffcfa) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r7 = socket$inet(0x2, 0x100005, 0x96) sendto$inet(r7, 0x0, 0x206, 0x2000477d, &(0x7f0000e68000)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 12:11:22 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x6000004, 0x2010, r1, 0x2d8db000) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045505, &(0x7f0000000040)) [ 454.526798] FAULT_INJECTION: forcing a failure. [ 454.526798] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 454.538664] CPU: 1 PID: 12941 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 454.538676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.538684] Call Trace: [ 454.538709] dump_stack+0x197/0x210 [ 454.538734] should_fail.cold+0xa/0x1b [ 454.555041] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 454.570248] ? mark_held_locks+0x100/0x100 [ 454.574528] __alloc_pages_nodemask+0x1ee/0x750 [ 454.575313] usb usb7: usbfs: interface 0 claimed by hub while 'syz-executor.3' sets config #0 [ 454.579220] ? find_held_lock+0x35/0x130 [ 454.579243] ? __alloc_pages_slowpath+0x2870/0x2870 [ 454.579270] cache_grow_begin+0x91/0x8c0 [ 454.579293] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 454.606710] ? check_preemption_disabled+0x48/0x290 [ 454.611777] kmem_cache_alloc+0x63b/0x700 [ 454.615997] dup_fd+0x85/0xb30 [ 454.619363] unshare_fd+0x160/0x1d0 [ 454.623025] ? mmdrop_async_fn+0x20/0x20 [ 454.627118] ? fs_reclaim_acquire+0x20/0x20 [ 454.631493] unshare_files+0x7f/0x1f0 [ 454.635326] ? __ia32_sys_unshare+0x40/0x40 [ 454.639680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.645247] ? check_preemption_disabled+0x48/0x290 [ 454.650472] ? 0xffffffff81000000 [ 454.653959] __do_execve_file.isra.0+0x27e/0x2150 [ 454.658884] ? __phys_addr_symbol+0x30/0x70 [ 454.658904] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 454.668315] ? __check_object_size+0x3d/0x42a [ 454.668329] ? 0xffffffff81000000 [ 454.676352] ? prepare_bprm_creds+0x120/0x120 [ 454.680866] ? strncpy_from_user+0x21b/0x2d0 [ 454.685283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.690819] ? 0xffffffff81000000 [ 454.694278] __x64_sys_execveat+0xed/0x130 [ 454.698534] do_syscall_64+0xfd/0x620 [ 454.702341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.707526] RIP: 0033:0x45a639 [ 454.710710] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 454.729601] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 454.737302] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 454.744561] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 454.751819] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 454.759084] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 454.766342] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 454.773623] ? 0xffffffff81000000 12:11:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000e0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000500)={0x0, 0x9000000, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r5, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x6, 0x0, {0x1ec0}}}, 0x30}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0xfffffea6) r7 = socket$inet6(0xa, 0x2, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000400)=r8) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r9, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x14, r10, 0xc4c2c822e4e11799, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r6, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0xa4}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x104, r10, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5241}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x27e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x867a}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x4409c100}, 0x40000) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r5, 0x10, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008}, 0x1000) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000ffdbdf250100000008000100", @ANYRES32=r2, @ANYBLOB="3c000200380001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000000000000"], 0x58}}, 0x0) 12:11:22 executing program 1: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) r3 = accept4$vsock_stream(r2, &(0x7f00000001c0)={0x28, 0x0, 0x2711, @reserved}, 0x10, 0x80800) sendmsg$inet(r3, &(0x7f0000000500)={&(0x7f0000000200)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000280)="dcb03526", 0x4}, {&(0x7f00000002c0)="a70e583227e73b2eafd2f5254786f23d2eedda4ab4a7fe3a248ee67c60a4fe51a764c6e9e1b7f0e53299d98778d16522dcf5f9af00e3bc56d0b09c5ceacd884e35defccd317c844798311ebbd2bc4dee065d3e8258a10707b0c4432a2711", 0x5e}, {&(0x7f0000000340)="e250e78cfc869c3e2bf805ef29c9801c300f6ada8155678c9275595ddb0e29fbddef07b63bffa1fc62f9aee50dba27d0e5ccb2209284c3c145b708ab0b4f07aa21e5838ffc35162517d64b0dab1014f578fc3e5cfcd11299e04ea4e39845671d2a09431bada3319b2a2f4d6803e0c034233998e878b06380b680dbb138f5db8a80a69cd91db6cd842bd21d1e1477812cd41fa2a0fd4d951b2354b8e2207b10c7e37b070f9db7dd89c67cbd3d7b7b4c706c05b120d7e6961b06c8ff4fbb6fd3994cd763021f1ccb472c5ef6651ff634f98707b6641d0e8ca24efbaf1761958f09da65bc56b277589ce51cf35da1", 0xed}, {&(0x7f0000000440)="9c4bf7df0a7085d26bea715b56605c367136959919a458a598ebd45f1bf4770dd61fb304f3d687131010da364589944c1d7f0230c3ad88e8877bac", 0x3b}], 0x4, &(0x7f00000004c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0x18}, 0x20000000) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000040)={0x4ca7, 0xa, 0x2, "1c66e3102bcdd3d015b233310ebf45e04a05d32a4a42201c6155304ec738b9c2", 0x32315659}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.even\x89s\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x4) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0xfc28) perf_event_open$cgroup(&(0x7f00000000c0)={0x1f3aa78922ab6a34, 0x70, 0xff, 0x20, 0x4, 0xe, 0x0, 0x3, 0x10, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff8001, 0x4, @perf_config_ext={0x15ea, 0xfff}, 0x4c23, 0xfffffffffffffffa, 0xffffffe1, 0x0, 0x80000000, 0x8, 0xe}, r1, 0x6, r4, 0x2) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201a9ffffff00ae0000ff07000000000000550008000000000000000040000000006300000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 12:11:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000f0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 455.083302] loop1: p1 p2[EZD] p3 p4 [ 455.112422] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 455.139922] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 455.247310] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. [ 455.358511] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.3'. [ 455.371201] device nr0 entered promiscuous mode 12:11:23 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00480032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:23 executing program 2 (fault-call:2 fault-nth:3): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/audio\x00', 0x20080, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000440)={@rand_addr, @rand_addr, @multicast2}, &(0x7f0000000480)=0xc) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x200043, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000340)=0x10) r3 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$USBDEVFS_CLAIMINTERFACE(r6, 0x8004550f, &(0x7f0000000380)=0x5) sendmsg$nl_route(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x200, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x10000}, [@IFLA_PHYS_SWITCH_ID={0x14, 0x24, "8d99d310cfb3425851c9c12fb559"}]}, 0x34}}, 0x0) rt_sigaction(0x23, &(0x7f0000000140)={&(0x7f00000000c0)="66420f3a08cf73c4418df9868b1c0000c48241ac07676566a4c4237bf0edffc483915ec80dc4e2250207c462a9a73266470f38f66534c461cdfe6dc3", {0x6}, 0x40000000, &(0x7f0000000100)="c4c27d1a9b31c0619d6767f2406dc4c17bd0430c67400f014db166410f1a05a3e14264c4e169e071990f0122c423a5ced5a7c4617b125200dc7bf3"}, &(0x7f0000000200)={&(0x7f0000000180)="c4a1bcc28952b2000016660f28e9c422f9b7a40df0bf0000f2450f707eb800c4e2adac8afd000000420fa556f140c966430fe90bc4410a586d650f661b", {}, 0x0, &(0x7f00000001c0)="c4a3fd0114a10036420f370f006064660f1680a7540000c42239906ccc00c4c179f7fac4c17d5a1fc403fd5cd25d0f006f02f20f5e00"}, 0x8, &(0x7f0000000240)) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video0\x00', 0x2, 0x0) fstat(r4, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r7) 12:11:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$unix(0x1, 0x10004000000002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000004c0)="f21d83", 0x3) r5 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockname$netrom(r5, &(0x7f0000000680)={{0x3, @default}, [@bcast, @rose, @remote, @bcast, @bcast, @default, @remote, @default]}, &(0x7f0000000480)=0x48) openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@local, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0xe22a00e413e12ab6) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000440)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @empty}}, 0x24) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r6, 0xae80, 0x0) 12:11:23 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="700000002400ffffff7f00"/20, @ANYPTR64, @ANYBLOB="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"], 0x3}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 12:11:23 executing program 4: openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) r0 = socket(0x0, 0x0, 0x0) tgkill(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x3) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = creat(0x0, 0x0) io_setup(0x65ce, &(0x7f00000019c0)) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xe0b7}) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x0, 0x0, 0x400, 0x1, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r3, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d3", 0x1c2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x272) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="f6", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x142) truncate(&(0x7f0000001740)='./file0\x00', 0x5) sendfile(r3, r4, 0x0, 0x7fffffa7) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="f6", 0x1, 0x0, 0x0, 0x0) 12:11:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e004c0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:23 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x20100, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e180f000000e8bd6efb120009000e000100400000ff050005001201", 0x2e}], 0x10000146}, 0x0) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000100)=&(0x7f00000000c0)) [ 455.868296] device nr0 entered promiscuous mode 12:11:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00600032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 456.037543] FAULT_INJECTION: forcing a failure. [ 456.037543] name failslab, interval 1, probability 0, space 0, times 0 [ 456.106429] CPU: 1 PID: 13026 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 456.113438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.122816] Call Trace: [ 456.125441] dump_stack+0x197/0x210 [ 456.129109] should_fail.cold+0xa/0x1b [ 456.133030] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 456.138202] ? lock_downgrade+0x880/0x880 [ 456.142390] __should_failslab+0x121/0x190 [ 456.146640] should_failslab+0x9/0x14 [ 456.150444] kmem_cache_alloc_trace+0x2cc/0x760 [ 456.155129] ? lock_downgrade+0x880/0x880 [ 456.159296] ? __lock_is_held+0xb6/0x140 [ 456.163379] alloc_fdtable+0x86/0x290 [ 456.167204] dup_fd+0x743/0xb30 [ 456.170516] unshare_fd+0x160/0x1d0 [ 456.174165] ? mmdrop_async_fn+0x20/0x20 [ 456.178246] ? cache_grow_end+0xa4/0x190 [ 456.182332] unshare_files+0x7f/0x1f0 [ 456.186244] ? __ia32_sys_unshare+0x40/0x40 [ 456.190586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.196172] ? check_preemption_disabled+0x48/0x290 [ 456.201291] ? 0xffffffff81000000 [ 456.204771] __do_execve_file.isra.0+0x27e/0x2150 [ 456.209634] ? __phys_addr_symbol+0x30/0x70 [ 456.213978] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 456.218991] ? __check_object_size+0x3d/0x42a [ 456.223476] ? 0xffffffff81000000 [ 456.226934] ? prepare_bprm_creds+0x120/0x120 [ 456.231452] ? strncpy_from_user+0x21b/0x2d0 [ 456.235857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.241411] ? 0xffffffff81000000 [ 456.244855] __x64_sys_execveat+0xed/0x130 [ 456.249086] do_syscall_64+0xfd/0x620 [ 456.252885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.258080] RIP: 0033:0x45a639 [ 456.261353] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.280258] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 456.287960] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 456.296628] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 12:11:23 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) memfd_create(&(0x7f0000000540)='\x00', 0x17) r0 = inotify_init() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000080)=0x8, 0x8) inotify_rm_watch(r0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000300)) r2 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) openat$cgroup_ro(r2, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) read$eventfd(r3, &(0x7f00000003c0), 0x8) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r5) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x4000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='syz_tun\x00', r8}, 0x10) ftruncate(r4, 0x800fb) sendfile(r6, r7, 0x0, 0x8000fffffffe) 12:11:24 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup3(r1, r0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r5, 0x0, 0xedc0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0xfffffea6) openat$cgroup_ro(r2, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$PPPIOCDISCONN(r2, 0x7439) [ 456.303906] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 456.311169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 456.318557] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 456.325971] ? 0xffffffff81000000 [ 456.412081] net_ratelimit: 23 callbacks suppressed [ 456.412090] protocol 88fb is buggy, dev hsr_slave_0 [ 456.422313] protocol 88fb is buggy, dev hsr_slave_1 [ 456.492095] protocol 88fb is buggy, dev hsr_slave_0 [ 456.497676] protocol 88fb is buggy, dev hsr_slave_1 12:11:24 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00680032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:24 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x4, 0x0, 0x1fd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) 12:11:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x10000, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x2) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) r0 = creat(&(0x7f0000000200)='./file0\x00', 0x3112db6baec8f394) fallocate(r0, 0x64, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000000)=@ethernet={0x0, @remote}, 0x0, 0x0) socket$unix(0x1, 0x5, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="514c1cc2c4dad10000000000000000000000000000175af28d792da5c4cf2d62ce061a469f8febf7b654f4bf7566eee070e19e2d1285d7bfa5ce029a9da862bf662faa0ec7b27ab8a66df93fc470b21904a10fe9cec13cfd1097c9b23e0be80f85cbada4b79f", @ANYRES16, @ANYBLOB], 0x3}}, 0x4000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200000, 0x0) r2 = socket(0x10, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080), 0x10) write$FUSE_LSEEK(r1, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x14) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) write$FUSE_LSEEK(r4, 0x0, 0x0) r5 = creat(0x0, 0x1) write$binfmt_script(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0 '], 0xb) close(0xffffffffffffffff) r6 = creat(&(0x7f00000003c0)='./file0\x00', 0x88) close(r6) ioctl$LOOP_SET_FD(r6, 0x4c00, 0xffffffffffffffff) 12:11:24 executing program 2 (fault-call:2 fault-nth:4): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x4048000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) r1 = eventfd(0x7fffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x40, 0x0) fstat(r1, &(0x7f0000000840)) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r2, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) recvmmsg(r2, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) fstat(r3, &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRESHEX=r4]) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000440)=0xc) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="04000000", @ANYRESHEX=r7]) socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$hfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000240)=0xc) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) r9 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setresgid(r10, 0x0, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0xa, 0x0, 0x0) setsockopt$inet_int(r12, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r12, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) sendmsg$nl_route(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="2800000012000d0600000000000000007b96053c4a8320c5b7c9e33ee4cb61fe27442a3909214b84d7c783876105c0407c21d3c41fc61cbf2753ef7d278a639c707ca4e2fe2523b9e542d2d50fcf7608912ff5cc4b25339a901c04efd338ddae79b9affcc2a2e1868929148324814bf2c540cf462acf21849656292af333dedfdb", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n'], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) utimes(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=@fragment, 0x8) [ 456.747099] FAULT_INJECTION: forcing a failure. [ 456.747099] name failslab, interval 1, probability 0, space 0, times 0 [ 456.778284] CPU: 1 PID: 13062 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 456.785286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.794667] Call Trace: [ 456.797379] dump_stack+0x197/0x210 [ 456.801131] should_fail.cold+0xa/0x1b [ 456.805071] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 456.810199] ? lock_downgrade+0x880/0x880 [ 456.810230] __should_failslab+0x121/0x190 [ 456.818731] should_failslab+0x9/0x14 [ 456.822579] kmem_cache_alloc_node_trace+0x274/0x720 [ 456.827876] ? alloc_fdtable+0x86/0x290 [ 456.831926] __kmalloc_node+0x3d/0x80 [ 456.835918] kvmalloc_node+0x68/0x100 [ 456.839745] alloc_fdtable+0xd6/0x290 [ 456.843558] dup_fd+0x743/0xb30 [ 456.846860] unshare_fd+0x160/0x1d0 [ 456.850502] ? mmdrop_async_fn+0x20/0x20 [ 456.854610] ? cache_grow_end+0xa4/0x190 [ 456.858698] unshare_files+0x7f/0x1f0 [ 456.862514] ? __ia32_sys_unshare+0x40/0x40 [ 456.866848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.866869] ? check_preemption_disabled+0x48/0x290 [ 456.866884] ? 0xffffffff81000000 [ 456.877465] __do_execve_file.isra.0+0x27e/0x2150 [ 456.877484] ? __phys_addr_symbol+0x30/0x70 [ 456.877499] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 456.877521] ? __check_object_size+0x3d/0x42a [ 456.885799] ? 0xffffffff81000000 [ 456.885822] ? prepare_bprm_creds+0x120/0x120 [ 456.885846] ? strncpy_from_user+0x21b/0x2d0 [ 456.895180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.895197] ? 0xffffffff81000000 [ 456.895213] __x64_sys_execveat+0xed/0x130 [ 456.895240] do_syscall_64+0xfd/0x620 [ 456.907714] entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:11:24 executing program 2 (fault-call:2 fault-nth:5): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e006c0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 456.907729] RIP: 0033:0x45a639 [ 456.907743] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.907756] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 [ 456.917865] ORIG_RAX: 0000000000000142 [ 456.917875] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 456.917882] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 456.917890] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 456.917899] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 456.917908] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 456.917930] ? 0xffffffff81000000 [ 456.933734] hfs: unable to parse mount options [ 456.934711] protocol 88fb is buggy, dev hsr_slave_0 [ 456.936051] protocol 88fb is buggy, dev hsr_slave_1 12:11:24 executing program 1: r0 = dup(0xffffffffffffffff) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x8800, 0x100000000, 0x0, 0x0, 0x4, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0x13) splice(r1, &(0x7f0000000100)=0xe0, r0, &(0x7f0000000140)=0x1, 0x5, 0x1) r2 = socket$inet6(0xa, 0x80000, 0x0) close(r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x3) epoll_create1(0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f0000000080)) dup3(r6, r5, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r8 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x4, 0x100) getsockopt$bt_l2cap_L2CAP_OPTIONS(r8, 0x6, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0xc) fcntl$setlease(r5, 0x400, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000000c0)=0x14) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x801) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$cgroup_int(r9, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(r9, 0xc0189436, &(0x7f0000000180)={0x1f, 0x800, 0x2, 0x0, 0x0, [{r6, 0x0, 0x7}, {r0, 0x0, 0x8d8}]}) [ 457.115016] hfs: unable to parse mount options [ 457.174962] FAULT_INJECTION: forcing a failure. [ 457.174962] name failslab, interval 1, probability 0, space 0, times 0 [ 457.202259] CPU: 0 PID: 13084 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 457.209261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.209269] Call Trace: [ 457.209305] dump_stack+0x197/0x210 12:11:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00740032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 457.209336] should_fail.cold+0xa/0x1b [ 457.228879] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 457.234031] ? lock_downgrade+0x880/0x880 [ 457.238232] __should_failslab+0x121/0x190 [ 457.242502] should_failslab+0x9/0x14 [ 457.246341] kmem_cache_alloc_node_trace+0x274/0x720 [ 457.251545] ? alloc_fdtable+0x86/0x290 [ 457.255567] ? kasan_unpoison_shadow+0x35/0x50 [ 457.260199] __kmalloc_node+0x3d/0x80 [ 457.264043] kvmalloc_node+0x68/0x100 [ 457.267880] alloc_fdtable+0x142/0x290 [ 457.271809] dup_fd+0x743/0xb30 [ 457.275134] unshare_fd+0x160/0x1d0 [ 457.278792] ? mmdrop_async_fn+0x20/0x20 [ 457.282899] ? cache_grow_end+0xa4/0x190 [ 457.287161] unshare_files+0x7f/0x1f0 [ 457.291016] ? __ia32_sys_unshare+0x40/0x40 [ 457.295386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.300970] ? check_preemption_disabled+0x48/0x290 [ 457.306023] ? 0xffffffff81000000 [ 457.309510] __do_execve_file.isra.0+0x27e/0x2150 [ 457.309529] ? __phys_addr_symbol+0x30/0x70 [ 457.309547] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 457.309565] ? __check_object_size+0x3d/0x42a [ 457.309584] ? 0xffffffff81000000 [ 457.323887] ? prepare_bprm_creds+0x120/0x120 [ 457.323909] ? strncpy_from_user+0x21b/0x2d0 [ 457.323936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.323950] ? 0xffffffff81000000 [ 457.323964] __x64_sys_execveat+0xed/0x130 [ 457.346810] do_syscall_64+0xfd/0x620 [ 457.346833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.346844] RIP: 0033:0x45a639 [ 457.346858] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 457.346866] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 457.346882] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 457.346891] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 457.346899] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 457.346908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 457.346917] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 457.346934] ? 0xffffffff81000000 [ 457.347183] protocol 88fb is buggy, dev hsr_slave_0 [ 457.386209] protocol 88fb is buggy, dev hsr_slave_1 [ 457.478363] device nr0 entered promiscuous mode 12:11:25 executing program 2 (fault-call:2 fault-nth:6): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 457.588575] hfs: unable to parse mount options 12:11:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e007a0032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 457.711288] FAULT_INJECTION: forcing a failure. [ 457.711288] name failslab, interval 1, probability 0, space 0, times 0 [ 457.772116] protocol 88fb is buggy, dev hsr_slave_0 [ 457.777283] protocol 88fb is buggy, dev hsr_slave_1 [ 457.828285] CPU: 1 PID: 13114 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 457.835287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.844701] Call Trace: [ 457.847333] dump_stack+0x197/0x210 [ 457.851001] should_fail.cold+0xa/0x1b [ 457.854934] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 457.860690] ? lock_downgrade+0x880/0x880 [ 457.864892] __should_failslab+0x121/0x190 [ 457.869171] should_failslab+0x9/0x14 [ 457.873006] kmem_cache_alloc_trace+0x2cc/0x760 [ 457.877712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.883276] ? check_preemption_disabled+0x48/0x290 [ 457.883291] ? 0xffffffff81000000 [ 457.883311] __do_execve_file.isra.0+0x325/0x2150 [ 457.896650] ? __phys_addr_symbol+0x30/0x70 [ 457.900991] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 457.901012] ? __check_object_size+0x3d/0x42a [ 457.910519] ? 0xffffffff81000000 [ 457.914009] ? prepare_bprm_creds+0x120/0x120 [ 457.918546] ? strncpy_from_user+0x21b/0x2d0 [ 457.922985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.928541] ? 0xffffffff81000000 [ 457.932049] __x64_sys_execveat+0xed/0x130 [ 457.936323] do_syscall_64+0xfd/0x620 [ 457.940155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.945418] RIP: 0033:0x45a639 [ 457.948631] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 457.967641] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 457.975401] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 457.982698] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 457.989993] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 457.997296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 458.004592] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 458.011907] ? 0xffffffff81000000 [ 458.160389] kauditd_printk_skb: 7 callbacks suppressed [ 458.160401] audit: type=1400 audit(1574251885.834:169): avc: denied { sys_ptrace } for pid=13093 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 12:11:26 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:26 executing program 4: stat(&(0x7f0000000980)='./file0/file0\x00', 0x0) getegid() socket$inet_tcp(0x2, 0x1, 0x0) clock_gettime(0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local}, 0x8) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[], &(0x7f000095dffc)) unshare(0x60020000) 12:11:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00f00032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x20, 0x2, [@IFLA_GRE_REMOTE={0x14, 0x10, @local}, @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}]]}}}]}, 0x54}}, 0x0) prctl$PR_GET_KEEPCAPS(0x7) 12:11:26 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xd}, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x8000000000000c2, &(0x7f00000002c0)=[{&(0x7f0000000540)="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", 0x0, 0x8}], 0x600000) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r1 = open(0x0, 0x0, 0x1) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) dup2(r1, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f281ab19f01dea1af56603ae52bb5d8981a539b56de71d901630e949f38ae55a7249cd4b42e375bce9beba0778fb94c809ee5f1273a9a82dc736c48bb798a9"}, 0xd8) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r2, 0x1) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_open_procfs(0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(r4, 0xaea3) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000007, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e21, 0x8, @local, 0x4}}, 0x0, 0x6, 0x0, "e4b80b549026321cd9e8af965a413c51a8f280ab19f01cea1af56603ae529684cef0ffffb56de71d901630e949f394e55a72491c12756a00bce940000778fb94c809ee00040000a82dc736e48bb798a9"}, 0xffffffffffffff90) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, 0x0, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x82) dup3(r3, r5, 0x0) 12:11:26 executing program 2 (fault-call:2 fault-nth:7): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 458.417505] netlink: 'syz-executor.3': attribute type 16 has an invalid length. [ 458.425814] FAULT_INJECTION: forcing a failure. [ 458.425814] name failslab, interval 1, probability 0, space 0, times 0 [ 458.441226] batman_adv: Cannot find parent device [ 458.452074] CPU: 0 PID: 13148 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 458.459058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.468441] Call Trace: [ 458.470641] IPVS: ftp: loaded support on port[0] = 21 [ 458.471221] dump_stack+0x197/0x210 [ 458.471255] should_fail.cold+0xa/0x1b [ 458.484000] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 458.489131] ? lock_downgrade+0x880/0x880 [ 458.493309] __should_failslab+0x121/0x190 [ 458.497571] should_failslab+0x9/0x14 [ 458.501394] kmem_cache_alloc_trace+0x2cc/0x760 [ 458.506092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.511658] ? check_preemption_disabled+0x48/0x290 [ 458.516714] ? 0xffffffff81000000 [ 458.520275] __do_execve_file.isra.0+0x325/0x2150 [ 458.525138] ? __phys_addr_symbol+0x30/0x70 [ 458.529480] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 458.534520] ? __check_object_size+0x3d/0x42a [ 458.539034] ? 0xffffffff81000000 [ 458.542627] ? prepare_bprm_creds+0x120/0x120 [ 458.547147] ? strncpy_from_user+0x21b/0x2d0 [ 458.551572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.557121] ? 0xffffffff81000000 [ 458.560595] __x64_sys_execveat+0xed/0x130 [ 458.564853] do_syscall_64+0xfd/0x620 [ 458.568699] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.573905] RIP: 0033:0x45a639 [ 458.577109] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 458.596033] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 458.603765] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 458.611063] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 12:11:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00ab0132000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 458.618355] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 458.625664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 458.632963] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 458.640281] ? 0xffffffff81000000 12:11:26 executing program 2 (fault-call:2 fault-nth:8): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000332000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 458.824538] FAULT_INJECTION: forcing a failure. [ 458.824538] name failslab, interval 1, probability 0, space 0, times 0 [ 458.845060] netlink: 'syz-executor.3': attribute type 16 has an invalid length. [ 458.859434] CPU: 0 PID: 13168 Comm: syz-executor.2 Not tainted 4.19.84 #0 12:11:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000532000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 458.866429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.875807] Call Trace: [ 458.878435] dump_stack+0x197/0x210 [ 458.882096] should_fail.cold+0xa/0x1b [ 458.886027] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 458.891210] ? lock_downgrade+0x880/0x880 [ 458.895409] __should_failslab+0x121/0x190 [ 458.899672] should_failslab+0x9/0x14 [ 458.899688] __kmalloc_track_caller+0x2de/0x750 [ 458.899705] ? __lock_is_held+0xb6/0x140 [ 458.899725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.917781] ? selinux_cred_prepare+0x49/0xb0 [ 458.922310] kmemdup+0x27/0x60 12:11:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32=r7, @ANYBLOB="080000e7000000"], 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000080)={'team0\x00', r7}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', r8}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xffcf, &(0x7f0000000100)={&(0x7f0000000000)={0x94, 0x20000000000036, 0x829, 0x0, 0x0, {0x1, 0x1000000, 0x1000000}, [@nested={0xffffffffffffff80, 0x0, [@typed={0x7c, 0x1, @ipv6=@loopback={0x4000000000000}}]}]}, 0xec0}, 0x1, 0xffffff7f0e000000}, 0x0) [ 458.925528] selinux_cred_prepare+0x49/0xb0 [ 458.929886] security_prepare_creds+0x77/0xc0 [ 458.934500] prepare_creds+0x32a/0x400 [ 458.938408] ? 0xffffffff81000000 [ 458.941876] prepare_exec_creds+0x12/0xf0 [ 458.941889] ? 0xffffffff81000000 [ 458.941905] prepare_bprm_creds+0x74/0x120 [ 458.941918] ? 0xffffffff81000000 [ 458.958169] __do_execve_file.isra.0+0x33e/0x2150 [ 458.963038] ? __phys_addr_symbol+0x30/0x70 [ 458.967387] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 458.972437] ? __check_object_size+0x3d/0x42a [ 458.976938] ? 0xffffffff81000000 [ 458.980422] ? prepare_bprm_creds+0x120/0x120 [ 458.984946] ? strncpy_from_user+0x21b/0x2d0 [ 458.989385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.994947] ? 0xffffffff81000000 [ 458.998452] __x64_sys_execveat+0xed/0x130 [ 459.002739] do_syscall_64+0xfd/0x620 [ 459.006577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.011779] RIP: 0033:0x45a639 12:11:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000632000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 459.011794] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 459.011802] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 459.011822] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 459.011830] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 459.011837] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 459.011851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 459.041655] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 459.063472] ? 0xffffffff81000000 [ 459.130523] device nr0 entered promiscuous mode [ 459.286990] IPVS: ftp: loaded support on port[0] = 21 12:11:27 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:28 executing program 2 (fault-call:2 fault-nth:9): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000732000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:28 executing program 1: getpid() pipe(&(0x7f00000002c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffa1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) stat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x25) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r2) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0xff000000}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000340)={0x0, 0x4, 0x2}, 0x0) 12:11:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000140)={0xffffffffffffffff}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x39, &(0x7f00000000c0)={0x0, 0x8, 0x2}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x2}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) fremovexattr(r1, &(0x7f0000000040)=@known='system.posix_acl_default\x00') connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 12:11:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="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"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r6, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000001020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r8 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r8, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x74000000, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="02ca01f7000004e3d4e5f6710ff30c6a2886c49fe9ffdba1230311008e55f475c1110400000000000001ffffffff0064fde275db93eef16b31949db9c90e000019890be090d5cb8cb5f413b1b779d1dcb006ca687b9f674e5347712206b74df2761671c403f5365e9e3f3adedf4d35bc9a2a4f2b82a6d772b3fff2c4cd0cd0d17654536cb48f8e75090432b26df07191f6251ee99dad8942ed1a36f023a5fdf7a5260ee1b3204ed0aec3fc5f2df6c76698ebd907183cff18ab7588f1813db833d577e0e6df", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 12:11:28 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 461.062696] FAULT_INJECTION: forcing a failure. [ 461.062696] name failslab, interval 1, probability 0, space 0, times 0 [ 461.089655] CPU: 1 PID: 13200 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 461.096642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.106012] Call Trace: [ 461.108619] dump_stack+0x197/0x210 [ 461.108648] should_fail.cold+0xa/0x1b [ 461.108670] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 461.108691] ? lock_downgrade+0x880/0x880 [ 461.125530] __should_failslab+0x121/0x190 [ 461.129791] should_failslab+0x9/0x14 [ 461.133616] kmem_cache_alloc+0x2ae/0x700 [ 461.137882] ? kernel_text_address+0x73/0xf0 [ 461.142314] ? __kernel_text_address+0xd/0x40 [ 461.146836] __alloc_file+0x27/0x330 [ 461.150657] alloc_empty_file+0x72/0x170 [ 461.154741] path_openat+0xef/0x45e0 [ 461.158482] ? save_stack+0xa9/0xd0 [ 461.162127] ? kasan_kmalloc+0xce/0xf0 [ 461.166024] ? kmemdup+0x27/0x60 [ 461.166044] ? selinux_cred_prepare+0x49/0xb0 [ 461.166060] ? security_prepare_creds+0x77/0xc0 [ 461.166074] ? prepare_creds+0x32a/0x400 [ 461.166086] ? prepare_exec_creds+0x12/0xf0 [ 461.166099] ? prepare_bprm_creds+0x74/0x120 [ 461.166119] ? __do_execve_file.isra.0+0x33e/0x2150 [ 461.173993] ? __x64_sys_execveat+0xed/0x130 [ 461.174012] ? do_syscall_64+0xfd/0x620 [ 461.174031] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:11:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000a32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000e32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 461.174047] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 461.174071] ? mark_held_locks+0x100/0x100 [ 461.187102] ? kasan_kmalloc+0xce/0xf0 [ 461.187117] ? kasan_slab_alloc+0xf/0x20 [ 461.187130] ? kmem_cache_alloc+0x12e/0x700 [ 461.187142] ? prepare_creds+0x3e/0x400 [ 461.187160] ? prepare_exec_creds+0x12/0xf0 [ 461.196617] ? prepare_bprm_creds+0x74/0x120 [ 461.196632] ? __do_execve_file.isra.0+0x33e/0x2150 [ 461.196645] ? __x64_sys_execveat+0xed/0x130 [ 461.196668] ? do_syscall_64+0xfd/0x620 [ 461.205046] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.205072] do_filp_open+0x1a1/0x280 [ 461.205086] ? may_open_dev+0x100/0x100 [ 461.205105] ? __lock_acquire+0x6ee/0x49c0 [ 461.215138] ? __kmalloc_track_caller+0x5dd/0x750 [ 461.215154] ? __lock_is_held+0xb6/0x140 [ 461.215175] ? __do_execve_file.isra.0+0x78a/0x2150 [ 461.215193] do_open_execat+0x140/0x660 [ 461.215217] ? unregister_binfmt+0x170/0x170 [ 461.227366] ? lock_downgrade+0x880/0x880 [ 461.227388] ? do_raw_spin_unlock+0x178/0x270 [ 461.227409] __do_execve_file.isra.0+0x15a4/0x2150 [ 461.227426] ? 0xffffffff81000000 [ 461.227443] ? prepare_bprm_creds+0x120/0x120 [ 461.227459] ? strncpy_from_user+0x21b/0x2d0 [ 461.227478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.240092] ? 0xffffffff81000000 [ 461.240114] __x64_sys_execveat+0xed/0x130 [ 461.240137] do_syscall_64+0xfd/0x620 [ 461.240158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 461.240170] RIP: 0033:0x45a639 [ 461.257969] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 461.257978] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 461.257996] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 461.258005] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 461.258014] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 461.258024] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 12:11:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_user\x00', 0x275a, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x900, 0x0) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000100)={0x0, 0x0, 0xab36, [], &(0x7f00000000c0)=0x1}) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x543302, 0x0) write$binfmt_script(r3, &(0x7f0000000580)=ANY=[], 0x0) fallocate(r2, 0x0, 0x0, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r2}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000002c0)={{0x3, 0x6, 0xfffffbff, 0x4ed, 'syz0\x00', 0x1}, 0x3, 0x200, 0x9, r4, 0x2, 0x5, 'syz1\x00', &(0x7f0000000240)=['@eth1eth0,system', 'stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00'], 0x58, [], [0x3, 0xca, 0x4, 0x3]}) 12:11:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000f32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 461.258032] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 461.258053] ? 0xffffffff81000000 [ 461.498743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13206 comm=syz-executor.4 [ 461.532502] net_ratelimit: 22 callbacks suppressed [ 461.532594] protocol 88fb is buggy, dev hsr_slave_0 [ 461.543757] protocol 88fb is buggy, dev hsr_slave_1 12:11:29 executing program 4: syz_emit_ethernet(0x2b, &(0x7f0000000040)={@link_local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x11, 0x0, 0x0, @multicast1, 'b'}}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='clear_refs\x00') getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x401}, &(0x7f0000000180)=0x8) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xc080, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000080)=0x7064) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={r1, 0xf587, 0x10, 0x6, 0x1f, 0xb41}, &(0x7f0000000200)=0x14) 12:11:29 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 461.565807] audit: type=1800 audit(1574251889.244:170): pid=13217 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="cpuacct.usage_user" dev="sda1" ino=16930 res=0 12:11:29 executing program 2 (fault-call:2 fault-nth:10): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00002032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001740)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r3, 0x80685600, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) sendto$packet(r0, &(0x7f0000000000)="30eef7966679b1dd3615135f7152b6281ce9d3d805c6f175c3598e51c2b2cc2e60971a1c7970712445c02f838d7c86ae388e", 0x32, 0x810, &(0x7f0000002940)={0x11, 0x1c, r6, 0x1, 0xff, 0x6, @broadcast}, 0x14) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0x84c6, 0xb706}) setsockopt$inet6_dccp_int(r3, 0x21, 0xe503b93b169e0576, &(0x7f0000000240)=0x7e, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000100)={0x0, 0xeff3e969}) [ 461.932241] protocol 88fb is buggy, dev hsr_slave_0 [ 461.937390] protocol 88fb is buggy, dev hsr_slave_1 [ 462.013646] FAULT_INJECTION: forcing a failure. [ 462.013646] name failslab, interval 1, probability 0, space 0, times 0 [ 462.028224] CPU: 1 PID: 13242 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 462.035291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.044730] Call Trace: [ 462.047345] dump_stack+0x197/0x210 [ 462.051177] should_fail.cold+0xa/0x1b [ 462.055082] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 462.060461] ? lock_downgrade+0x880/0x880 [ 462.064646] __should_failslab+0x121/0x190 [ 462.068958] should_failslab+0x9/0x14 [ 462.072782] kmem_cache_alloc+0x2ae/0x700 [ 462.076930] ? rcu_read_lock_sched_held+0x110/0x130 [ 462.081950] selinux_file_alloc_security+0xb4/0x190 [ 462.086965] security_file_alloc+0x63/0xa0 [ 462.091243] __alloc_file+0xcf/0x330 [ 462.094994] alloc_empty_file+0x72/0x170 [ 462.099607] path_openat+0xef/0x45e0 [ 462.103346] ? save_stack+0xa9/0xd0 [ 462.107515] ? kasan_kmalloc+0xce/0xf0 [ 462.111426] ? kmemdup+0x27/0x60 [ 462.114799] ? selinux_cred_prepare+0x49/0xb0 [ 462.119309] ? security_prepare_creds+0x77/0xc0 [ 462.123995] ? prepare_creds+0x32a/0x400 [ 462.128069] ? prepare_exec_creds+0x12/0xf0 [ 462.132400] ? prepare_bprm_creds+0x74/0x120 [ 462.136834] ? __do_execve_file.isra.0+0x33e/0x2150 [ 462.141888] ? __x64_sys_execveat+0xed/0x130 [ 462.141905] ? do_syscall_64+0xfd/0x620 [ 462.141927] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.150323] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 462.150343] ? mark_held_locks+0x100/0x100 [ 462.150361] ? kasan_kmalloc+0xce/0xf0 [ 462.168467] ? kasan_slab_alloc+0xf/0x20 [ 462.172517] ? kmem_cache_alloc+0x12e/0x700 [ 462.176848] ? prepare_creds+0x3e/0x400 [ 462.180836] ? prepare_exec_creds+0x12/0xf0 [ 462.185213] ? prepare_bprm_creds+0x74/0x120 [ 462.189646] ? __do_execve_file.isra.0+0x33e/0x2150 [ 462.194692] ? __x64_sys_execveat+0xed/0x130 [ 462.199119] ? do_syscall_64+0xfd/0x620 [ 462.203108] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.208488] do_filp_open+0x1a1/0x280 [ 462.212298] ? may_open_dev+0x100/0x100 [ 462.216264] ? __lock_acquire+0x6ee/0x49c0 [ 462.220519] ? __kmalloc_track_caller+0x5dd/0x750 [ 462.225351] ? __lock_is_held+0xb6/0x140 [ 462.229417] ? __do_execve_file.isra.0+0x78a/0x2150 [ 462.234438] do_open_execat+0x140/0x660 [ 462.238415] ? unregister_binfmt+0x170/0x170 [ 462.242814] ? lock_downgrade+0x880/0x880 [ 462.246957] ? do_raw_spin_unlock+0x178/0x270 [ 462.251441] __do_execve_file.isra.0+0x15a4/0x2150 [ 462.256360] ? 0xffffffff81000000 [ 462.259814] ? prepare_bprm_creds+0x120/0x120 [ 462.264323] ? strncpy_from_user+0x21b/0x2d0 [ 462.268739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.274288] ? 0xffffffff81000000 [ 462.277745] __x64_sys_execveat+0xed/0x130 [ 462.281976] do_syscall_64+0xfd/0x620 [ 462.285779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.290967] RIP: 0033:0x45a639 [ 462.294173] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.313314] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 462.321030] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 462.328293] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 462.335550] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 462.342828] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 462.350090] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 462.357362] ? 0xffffffff81000000 [ 462.361082] protocol 88fb is buggy, dev hsr_slave_0 [ 462.366264] protocol 88fb is buggy, dev hsr_slave_1 12:11:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00003f32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:30 executing program 4: ustat(0x0, &(0x7f0000000040)) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x243, 0x0) accept$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x600000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x88001) sendfile(r2, r3, 0x0, 0x800000000024) 12:11:30 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:30 executing program 1: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:30 executing program 2 (fault-call:2 fault-nth:11): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000100)=0x54) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1000) r2 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r6}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000300)={r6, 0x3, 0x4, [0xb44d, 0x1a, 0x100, 0x81]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r6, 0x2, 0x89}, 0x8) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r7, &(0x7f0000000040), 0xc) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) [ 462.527749] FAULT_INJECTION: forcing a failure. [ 462.527749] name failslab, interval 1, probability 0, space 0, times 0 [ 462.599979] CPU: 0 PID: 13257 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 462.607009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.616410] Call Trace: [ 462.619039] dump_stack+0x197/0x210 [ 462.622709] should_fail.cold+0xa/0x1b [ 462.622729] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 462.622751] ? lock_downgrade+0x880/0x880 [ 462.622780] __should_failslab+0x121/0x190 [ 462.622795] should_failslab+0x9/0x14 [ 462.622808] __kmalloc_track_caller+0x2de/0x750 [ 462.622893] ? pointer+0x970/0x970 [ 462.622915] ? stop_one_cpu+0x114/0x170 [ 462.631938] ? multi_cpu_stop+0x4d0/0x4d0 [ 462.632026] ? kasprintf+0xbb/0xf0 [ 462.632043] kvasprintf+0xc8/0x170 [ 462.656497] ? bust_spinlocks+0xe0/0xe0 [ 462.656524] kasprintf+0xbb/0xf0 [ 462.656543] ? kvasprintf_const+0x190/0x190 [ 462.664471] ? get_iowait_load+0x140/0x140 [ 462.664497] __do_execve_file.isra.0+0x8f1/0x2150 [ 462.671998] ? 0xffffffff81000000 [ 462.672013] ? prepare_bprm_creds+0x120/0x120 12:11:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00004832000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 462.672030] ? strncpy_from_user+0x21b/0x2d0 [ 462.672052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.672064] ? 0xffffffff81000000 [ 462.672079] __x64_sys_execveat+0xed/0x130 [ 462.672100] do_syscall_64+0xfd/0x620 [ 462.672123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 462.672134] RIP: 0033:0x45a639 [ 462.672154] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 462.692329] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 462.692347] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 462.692355] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 462.692363] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 462.692369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 462.692376] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 462.692397] ? 0xffffffff81000000 [ 462.748151] protocol 88fb is buggy, dev hsr_slave_0 [ 462.749145] protocol 88fb is buggy, dev hsr_slave_1 [ 462.752088] protocol 88fb is buggy, dev hsr_slave_0 [ 462.765012] protocol 88fb is buggy, dev hsr_slave_1 12:11:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00004c32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:30 executing program 2 (fault-call:2 fault-nth:12): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x5, 0x8000a0ffffffff, 0x0, 0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2000000}, 0x10}, 0x70) 12:11:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00006032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 463.088601] FAULT_INJECTION: forcing a failure. [ 463.088601] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 463.117539] CPU: 1 PID: 13287 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 463.124519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.124525] Call Trace: [ 463.124549] dump_stack+0x197/0x210 [ 463.124572] should_fail.cold+0xa/0x1b [ 463.124592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 463.124614] ? __might_sleep+0x95/0x190 [ 463.124635] __alloc_pages_nodemask+0x1ee/0x750 [ 463.124651] ? mark_held_locks+0x100/0x100 [ 463.124671] ? __alloc_pages_slowpath+0x2870/0x2870 [ 463.124692] ? find_held_lock+0x35/0x130 [ 463.124714] ? percpu_ref_put_many+0x94/0x190 [ 463.124729] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 463.124750] alloc_pages_current+0x107/0x210 [ 463.124768] __get_free_pages+0xc/0x40 [ 463.124782] pgd_alloc+0x8b/0x3f0 [ 463.124795] ? pgd_page_get_mm+0x40/0x40 [ 463.124809] ? __lockdep_init_map+0x10c/0x5b0 [ 463.124825] ? __lockdep_init_map+0x10c/0x5b0 [ 463.124847] mm_init+0x59e/0x9d0 [ 463.197337] mm_alloc+0xa6/0xd0 [ 463.197357] __do_execve_file.isra.0+0xa49/0x2150 [ 463.197374] ? 0xffffffff81000000 [ 463.197392] ? prepare_bprm_creds+0x120/0x120 [ 463.197408] ? strncpy_from_user+0x21b/0x2d0 [ 463.197428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 463.206406] ? 0xffffffff81000000 [ 463.206425] __x64_sys_execveat+0xed/0x130 [ 463.206448] do_syscall_64+0xfd/0x620 [ 463.206470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.206486] RIP: 0033:0x45a639 [ 463.255794] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 463.274701] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 463.282514] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 12:11:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) 12:11:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00006832000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 463.289781] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 463.297059] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 463.304320] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 463.311606] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 463.318895] ? 0xffffffff81000000 12:11:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) memfd_create(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f00000017c0)=[{&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)}, {&(0x7f0000000180)}, {0x0}], 0x4) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$USBDEVFS_BULK(r4, 0xc0185502, &(0x7f0000000340)={{0x7, 0x1}, 0xfb, 0x32a, 0x73, 0x8, &(0x7f00000015c0)="59be431ee6d91f2195abcc47e1d3d6fdee478ef298ec05f5d420948db1cd31daa429fc41a9807d5409877bceb0ea1bb4483062757a6875455f4e0fd9cbd655bc1fc50050b6aaff15e97764068015e54dcc94cb94f66ac86732934dcb99c4f938693aef4551b0fd9d9f3e15e7154b2c5c4924b3"}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000200)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0xa8, r5, 0x725, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xf22}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xf}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x27b, 0x2, 0x80000000}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_ID={0xfffffe28, 0x1, 0xfff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x32a}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x8024) 12:11:31 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 463.414985] device ifb0 entered promiscuous mode 12:11:31 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x40) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='fuseblk\x00', 0x0, &(0x7f00000003c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@blksize={'blksize', 0x3d, 0x400}}]}}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'nlmon0\x00', 0x4000}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r2, r1, 0x0, 0x60d) 12:11:31 executing program 2 (fault-call:2 fault-nth:13): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00006c32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:31 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x638, 0x8085) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x1000, 0x0, [0xfffffffe]}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = userfaultfd(0x180800) fdatasync(r2) r3 = socket$netlink(0x10, 0x3, 0x8) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000340)={0x7, &(0x7f00000002c0)=[{0x80, 0x98, 0xa1, 0x1}, {0x7ff, 0x26, 0x2, 0x80000001}, {0x2, 0x9, 0x1, 0x1}, {0x7, 0x0, 0xf}, {0x9, 0x3f, 0x0, 0x6}, {0x8000, 0x81, 0x0, 0x4c}, {0x8, 0x9d, 0x2, 0xfffffff8}]}, 0x10) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="2c0000006400010700"/20, @ANYRES32=r6, @ANYBLOB="08ed166ef2800000"], 0x2c}}, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/23, 0x17, 0x1, &(0x7f00000000c0)={0x11, 0x2, r6, 0x1, 0x3, 0x6, @dev={[], 0x2b}}, 0x14) [ 463.709329] FAULT_INJECTION: forcing a failure. [ 463.709329] name failslab, interval 1, probability 0, space 0, times 0 12:11:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00007432000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 463.758476] device nr0 entered promiscuous mode [ 463.795360] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=13331 comm=syz-executor.1 [ 463.809262] CPU: 0 PID: 13325 Comm: syz-executor.2 Not tainted 4.19.84 #0 [ 463.816227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.825597] Call Trace: [ 463.828208] dump_stack+0x197/0x210 [ 463.831865] should_fail.cold+0xa/0x1b [ 463.835774] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 463.840921] ? lock_downgrade+0x880/0x880 [ 463.845095] __should_failslab+0x121/0x190 [ 463.849348] should_failslab+0x9/0x14 [ 463.853163] kmem_cache_alloc+0x2ae/0x700 [ 463.857340] vm_area_alloc+0x20/0x110 [ 463.861156] __do_execve_file.isra.0+0xbd3/0x2150 [ 463.866042] ? 0xffffffff81000000 [ 463.869516] ? prepare_bprm_creds+0x120/0x120 [ 463.874035] ? strncpy_from_user+0x21b/0x2d0 [ 463.878501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 463.884056] ? 0xffffffff81000000 [ 463.887529] __x64_sys_execveat+0xed/0x130 [ 463.891793] do_syscall_64+0xfd/0x620 [ 463.895618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 463.900820] RIP: 0033:0x45a639 [ 463.904025] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 463.923114] RSP: 002b:00007f2df00e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 463.930845] RAX: ffffffffffffffda RBX: 00007f2df00e1c90 RCX: 000000000045a639 [ 463.938134] RDX: ffffffff81000000 RSI: 0000000020000000 RDI: 0000000000000004 12:11:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00007a32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 463.945421] RBP: 000000000075bf20 R08: 0000000000001000 R09: 0000000000000000 [ 463.952698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2df00e26d4 [ 463.959994] R13: 00000000004c0f94 R14: 00000000004d3ac8 R15: 0000000000000005 [ 463.967309] ? 0xffffffff81000000 12:11:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0001ab32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 463.992163] audit: type=1400 audit(1574251891.664:171): avc: denied { create } for pid=13327 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 12:11:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000f032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 464.110273] audit: type=1400 audit(1574251891.704:172): avc: denied { write } for pid=13327 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 [ 464.145738] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=13341 comm=syz-executor.1 12:11:31 executing program 2 (fault-call:2 fault-nth:14): r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0xc4800) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0xffffffffffffffc2}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x4cb], 0x0, 0x100004}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:11:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) memfd_create(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = dup(r2) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) writev(r2, &(0x7f00000017c0)=[{&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)}, {&(0x7f0000000180)}, {0x0}], 0x4) umount2(&(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$USBDEVFS_BULK(r4, 0xc0185502, &(0x7f0000000340)={{0x7, 0x1}, 0xfb, 0x32a, 0x73, 0x8, &(0x7f00000015c0)="59be431ee6d91f2195abcc47e1d3d6fdee478ef298ec05f5d420948db1cd31daa429fc41a9807d5409877bceb0ea1bb4483062757a6875455f4e0fd9cbd655bc1fc50050b6aaff15e97764068015e54dcc94cb94f66ac86732934dcb99c4f938693aef4551b0fd9d9f3e15e7154b2c5c4924b3"}) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r4, &(0x7f0000000200)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0xa8, r5, 0x725, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xf22}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xf}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x27b, 0x2, 0x80000000}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_ID={0xfffffe28, 0x1, 0xfff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x32a}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x8024) 12:11:32 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:32 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_emit_ethernet(0x3e, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6000ecff00080000fe8000000000000000000000000000aafe8000000000000000000000000000aa0000000000089078efb0bf5eaedd8f48a416aa3146fa5facc9a412a581bb22281825d45bf94bfc49b53f84d5e36d8ba74136814527ae51b0801e4fa7a76c3a42e7cd1b4546e888106cbec4464bec027139c17228e6f80d306a4e6e11de79fd507d45b561d851721ccaa2494d8c91cab5049671c86445c2bbd026e12e5442299e68773bb5e4d156883b5432f57a617126e4760c2da054857d000000009652584bfcc57122"], 0x0) 12:11:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000000a000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:32 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:32 executing program 1: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:32 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x300) 12:11:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000000f000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, 0x0, 0x24000020) eventfd2(0x9, 0x311a9a65ee39b2a8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000004c0)) r2 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x8000, 0x400000) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000180)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000000)=0x72, 0x4) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$sndseq(r3, &(0x7f0000000380)=[{0xd8, 0x9, 0x81, 0x8, @tick=0x3ff, {0x8, 0x6}, {0x95, 0x9}, @quote={{0x2, 0xff}, 0x0, &(0x7f0000000280)={0x1, 0x5, 0x9, 0x4, @time={r5, r6+30000000}, {0x1, 0x9c}, {0x5e, 0x3}, @raw8={"28618598fc45bfae21ea13c5"}}}}, {0xb3, 0x20, 0x9, 0x27, @tick=0x6cfa, {0x7f, 0x3}, {0x16, 0xff}, @quote={{0x4, 0x7}, 0x1000, &(0x7f0000000340)={0x2, 0xff, 0x1, 0xfd, @time={0x0, 0x989680}, {0x3, 0xfc}, {0x3, 0x1}, @ext={0x66, &(0x7f00000002c0)="c5c9adced779a4f52a2d35d4274309c98496e3a3a235412a72a23ea1d498cbede93353c44e3d95ea2e0157517f020298184238d5251fbb5d1714c96d01b4a228ea6072b7ab7ec3610557711b6df02befc948200acb767b2af2dcc5803fa900f13fa96e0d5d8b"}}}}, {0x1, 0x2, 0x3e, 0xe0, @time={0x0, 0x989680}, {0x4, 0x5}, {0xff, 0x5}, @raw32={[0x401, 0x8, 0x6]}}], 0x90) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$TCSETSF(r7, 0x5404, 0x0) ioctl$TCSETS(r7, 0x5402, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000200)='mounts\x00') preadv(r8, &(0x7f00000017c0), 0x3f5, 0x0) 12:11:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000014000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:32 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x500) 12:11:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000232000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 465.457781] device nr0 entered promiscuous mode 12:11:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaab9380180c200000391000c00810043000800450000280000ac1423bb0e0390780000000000000000000000de00000000"], &(0x7f0000000100)={0x0, 0x3, [0x0, 0xa, 0xd77]}) 12:11:33 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x600) 12:11:33 executing program 3: r0 = open(0x0, 0x0, 0x0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xde8, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) r2 = getpid() r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f0000000140)={0x0, 0x9, 0x2022}) sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x101400) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xc4, r4, 0x1, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0xffffffffffffffef, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xf6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0xc4}, 0x1, 0x0, 0x0, 0x91}, 0x4000801) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) userfaultfd(0x0) kcmp(r2, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 12:11:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000332000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 465.888894] device nr0 entered promiscuous mode 12:11:33 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:33 executing program 1: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:33 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000140), &(0x7f0000000240)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000440), 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f00000004c0), 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x30000000000000, 0x2000) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f0000000400)=0x5) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000380)) syz_open_procfs(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)) socketpair$unix(0x1, 0xf, 0x0, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x20000000000001e4, &(0x7f000039a000)}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newqdisc={0x28, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x6}}}, 0x28}}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x8001, 0x2, 0x0, 0x7ff, 0x1, 0x9, 0x5d}, &(0x7f00000002c0)=0x20) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0xfffffea6) fcntl$setownex(r6, 0xf, &(0x7f00000003c0)={0x2, r4}) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000000480)={'veth1\x00', 0xffff}) r7 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r7, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r7, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r7, &(0x7f0000000000)='./file1/file0\x00', r7, &(0x7f00000001c0)='./file0\x00', 0x2) 12:11:33 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x700) 12:11:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000432000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xb, 0x11, r2, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x1000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0x1000) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)=0x1000) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)=ANY=[], 0xfc28) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r9, &(0x7f0000000200)=ANY=[], 0xfc28) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0xfffffea6) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0xfffffea6) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r12, &(0x7f0000000000), 0xfffffea6) r13 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r13, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r14 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r14, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESOCT=r1, @ANYRES16, @ANYRESHEX=r3, @ANYRESHEX=0x0, @ANYRES32=r2, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="6be45c2e8b0b5b62c8815c89e954fbfaf39e80a0d27c78d4c67ed7df975051369b7dfe29b17e810614bd3382060bc0a7c9dd4db751c56f1eae044650241bf12fafc5ff2c7423ef949e17c2f468f6141764d4b582050a0a4e9d4e917cd02b3c609fdd1d1461c6ca337d0d5f3c5e35381bba15c0b4e57dab32662cd19b0bf944d4c0755da060e996a00fd73d65", @ANYRES32, @ANYRES16=0x0]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRESOCT=r5, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESHEX=r6, @ANYRES32=0x0, @ANYPTR64, @ANYPTR64, @ANYPTR64, @ANYRES32=r7, @ANYRESDEC=r8, @ANYPTR64, @ANYRES64=r9, @ANYBLOB="907f9b37eefadae7c4378aafbe20968214123a96d300c4107d1048323fcc2f57ea093b4de7b64f0da3281efddb1b330a94b25aa47f3cdcfb98750217fe9b6bedec22d7"], @ANYRES64=r10], @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRESHEX=r11], @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYPTR64, @ANYRESDEC=r12, @ANYRES32=r13, @ANYPTR, @ANYBLOB, @ANYPTR, @ANYRES16=r11, @ANYRESDEC=r14]], @ANYRES64]) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 466.246633] device nr0 entered promiscuous mode 12:11:33 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x900) 12:11:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000532000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:34 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0xa00) 12:11:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000632000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:34 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0xb00) 12:11:34 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) epoll_create1(0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)={0x8000}) syz_open_procfs(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x7, 0x6}, 0x0, 0x2000, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, 0x0) setresuid(0x0, 0x0, 0x0) setresuid(r2, 0x0, 0x0) r3 = getpid() r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000001300)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x41c1, 0xc0099, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x4, 0x0, 0x0, 0x0, 0x32a9, 0xfffffffe}, r6, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffffe}, r4, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x800000000000001, 0x2) ioctl$int_in(r7, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) write$UHID_INPUT(r7, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)=0x1000) utimensat(r8, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180), 0x0) ptrace$pokeuser(0x6, r3, 0x2, 0x0) r9 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r9, 0x5452, &(0x7f0000000040)=0x4) write$UHID_INPUT(r9, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x80000, r9}) ioctl$DRM_IOCTL_ADD_CTX(r10, 0xc0086420, &(0x7f0000000280)) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={';yz', 0x2}, &(0x7f00000001c0)="0e", 0x1, 0xfffffffffffffffc) time(&(0x7f00000000c0)) bind$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x14e24}, 0x1c) 12:11:34 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000732000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:34 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0xc00) 12:11:34 executing program 1: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 466.892078] net_ratelimit: 19 callbacks suppressed [ 466.892086] protocol 88fb is buggy, dev hsr_slave_0 [ 466.892122] protocol 88fb is buggy, dev hsr_slave_1 [ 466.897105] protocol 88fb is buggy, dev hsr_slave_1 12:11:34 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0xd00) 12:11:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000a32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:34 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x15, &(0x7f0000001b40)=ANY=[@ANYBLOB="850000000700000025000000e5ff00009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939340c5f89f8b5c13a24800a26b3c68cea54994e702d609331ab3c70aa6b06880205ae34f6209c4c3e23930ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fa47ef6943a143669ef5fc545ab790ef72fd2ca305f386142d7835f213e72c7002a21731859eba975d"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x34) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f00000000c0)) 12:11:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000e32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:34 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0xe00) 12:11:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000f32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:35 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1002) [ 467.337756] device nr0 entered promiscuous mode [ 467.405904] device nr0 entered promiscuous mode [ 467.452104] protocol 88fb is buggy, dev hsr_slave_0 [ 467.457329] protocol 88fb is buggy, dev hsr_slave_1 [ 467.772120] protocol 88fb is buggy, dev hsr_slave_0 [ 467.777483] protocol 88fb is buggy, dev hsr_slave_1 [ 468.172161] protocol 88fb is buggy, dev hsr_slave_0 [ 468.177287] protocol 88fb is buggy, dev hsr_slave_1 [ 468.572196] protocol 88fb is buggy, dev hsr_slave_0 12:11:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000000)={0x0, @reserved}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000140)={{0x1, 0x1f, 0xff, 0x20, 0x8, 0xff}, 0x6}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xd) 12:11:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00004832000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:36 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1003) 12:11:36 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625df08300200000040847bc2fdffe8cd918b03504129d8000000000c9852de7b616f7a2b09a401f4e1cab40b5dc2404c31c7e436dad756eace77a560d07705dcbe4b3bfed4884200005ff882fb560b33d41af2776e5dd2a19a41058fea3454bb"], 0x82) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) r3 = dup(0xffffffffffffffff) r4 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r4, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getsockopt$sock_buf(r4, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000000)=0x0) wait4(r5, 0x0, 0x40000000, 0x0) r6 = getpgid(r5) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r10 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) r12 = gettid() ioctl$BLKTRACESETUP(r11, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x3ff, 0x81, 0x1, r12}) r13 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) r14 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r14, 0x0, 0x0) r15 = getpgrp(0x0) waitid(0x0, r15, &(0x7f00000002c0), 0x8, 0x0) r16 = getpgid(r15) r17 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r17, 0x8904, &(0x7f0000000000)=0x0) r19 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) r20 = openat$cgroup_ro(r19, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r21 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r22 = inotify_init1(0x0) r23 = gettid() fcntl$setown(r22, 0x8, r23) r24 = getpid() r25 = socket(0xa, 0x3, 0x8) r26 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r25, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r26, &(0x7f0000000080)={0x0, 0xfffffffffffffe90, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r25, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r28 = gettid() waitid(0x2, r28, &(0x7f0000000040), 0x4, &(0x7f0000000480)) sendmsg$key(r25, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r27, @ANYRESDEC=r28]], 0xfffffffffffffe56}}, 0x20004850) r29 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r30 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r31 = dup2(r30, r29) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r31, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r31, 0xc08c5334, &(0x7f0000000200)) r32 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r32) timer_create(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, @tid=r32}, 0x0) kcmp(r32, r32, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r32, 0x0, 0x0) r33 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r32, r33, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r28, r31, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r34}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r24, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r23, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='ppp0eth1]*em0\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r21, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r20, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r18, r17, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r16, r14, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r12, r13, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r8, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000040)='GPLvmnet0\\]GPL&systemeth1\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, 0xffffffffffffffff, 0x0, 0x9, &(0x7f00000000c0)='*\x00\x00\x00/Ppp\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r6, r3, 0x0, 0x3, &(0x7f0000000100)=',)\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r34}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000000c0)='}bdev\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r2, 0x0, 0x3, &(0x7f0000000080)='&\xf1\x00', r35}, 0x30) 12:11:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x30}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x641, 0x220000) recvmsg$can_raw(r1, &(0x7f0000000540)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/134, 0x86}, {&(0x7f0000000380)=""/226, 0xe2}, {&(0x7f0000000480)=""/9, 0x9}], 0x3, &(0x7f0000000500)=""/59, 0x3b}, 0x2000) r2 = socket$netlink(0x10, 0x3, 0x12) ioctl$FIBMAP(r0, 0x1, &(0x7f0000001600)=0x40) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) recvfrom$ax25(r3, &(0x7f0000000580)=""/4096, 0xfffffda9, 0x40, &(0x7f0000001580)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x5}, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000001}, 0xc, &(0x7f0000000180)={&(0x7f00000016c0)=ANY=[@ANYBLOB="a11f309477b8857b8be4f8af8d4170d0c2bb8ccddb27faa9abd2c2c7632177fb72041466182748b064e8c7544b46e08224654d93aa98c9fcda22fbab381571edd47508dcd892ad8d04c3a87d56e4c470b2f90c4be02a4bba6eb3d96971478809cbf48f0c2f2ee15dc308e8fda7015a73d0d5115b5a6ecfff13ea472babbce5b62d4ae1b9e8d950c5a875384cfc478de0", @ANYRES16=0x0, @ANYBLOB="010029bd7000fedbdf25020000000c00030000000000000000000800010000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r4 = syz_open_dev$vcsn(&(0x7f0000001640)='/dev/vcs#\x00', 0x8, 0x40000) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f0000001680)=0x4) 12:11:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00004c32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:36 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1004) [ 469.130106] audit: type=1400 audit(1574251896.794:173): avc: denied { create } for pid=13549 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 [ 469.194276] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 469.202485] FAT-fs (loop1): Filesystem has been set read-only [ 469.209777] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF 12:11:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00006032000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 469.225376] audit: type=1400 audit(1574251896.874:174): avc: denied { write } for pid=13549 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 [ 469.437397] device nr0 entered promiscuous mode 12:11:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00006832000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625df08300200000040847bc2fdffe8cd918b03504129d8000000000c9852de7b616f7a2b09a401f4e1cab40b5dc2404c31c7e436dad756eace77a560d07705dcbe4b3bfed4884200005ff882fb560b33d41af2776e5dd2a19a41058fea3454bb"], 0x82) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) r3 = dup(0xffffffffffffffff) r4 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r4, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getsockopt$sock_buf(r4, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000000)=0x0) wait4(r5, 0x0, 0x40000000, 0x0) r6 = getpgid(r5) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r10 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) r12 = gettid() ioctl$BLKTRACESETUP(r11, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x3ff, 0x81, 0x1, r12}) r13 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) r14 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r14, 0x0, 0x0) r15 = getpgrp(0x0) waitid(0x0, r15, &(0x7f00000002c0), 0x8, 0x0) r16 = getpgid(r15) r17 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r17, 0x8904, &(0x7f0000000000)=0x0) r19 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) r20 = openat$cgroup_ro(r19, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r21 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r22 = inotify_init1(0x0) r23 = gettid() fcntl$setown(r22, 0x8, r23) r24 = getpid() r25 = socket(0xa, 0x3, 0x8) r26 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r25, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r26, &(0x7f0000000080)={0x0, 0xfffffffffffffe90, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r25, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r28 = gettid() waitid(0x2, r28, &(0x7f0000000040), 0x4, &(0x7f0000000480)) sendmsg$key(r25, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r27, @ANYRESDEC=r28]], 0xfffffffffffffe56}}, 0x20004850) r29 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r30 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r31 = dup2(r30, r29) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r31, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r31, 0xc08c5334, &(0x7f0000000200)) r32 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r32) timer_create(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, @tid=r32}, 0x0) kcmp(r32, r32, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r32, 0x0, 0x0) r33 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r32, r33, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r28, r31, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r34}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r24, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r23, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='ppp0eth1]*em0\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r21, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r20, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r18, r17, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r16, r14, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r12, r13, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r8, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000040)='GPLvmnet0\\]GPL&systemeth1\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, 0xffffffffffffffff, 0x0, 0x9, &(0x7f00000000c0)='*\x00\x00\x00/Ppp\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r6, r3, 0x0, 0x3, &(0x7f0000000100)=',)\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r34}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000000c0)='}bdev\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r2, 0x0, 0x3, &(0x7f0000000080)='&\xf1\x00', r35}, 0x30) 12:11:37 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1005) 12:11:39 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r0, 0x388, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r6}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000300)={r6, 0x3, 0x4, [0xb44d, 0x1a, 0x100, 0x81]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000200)={r6, 0x1, 0x1000}, &(0x7f0000000280)=0x8) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)=ANY=[], 0xfc28) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) r10 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r11 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r10, r11, &(0x7f0000000240)=0x202, 0x4000000000dc) r12 = socket(0xa, 0x1, 0x0) close(r12) r13 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r13, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r12, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r14}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r11, 0x84, 0x77, &(0x7f0000000300)={r14, 0x3, 0x4, [0xb44d, 0x1a, 0x100, 0x81]}, &(0x7f0000000340)=0x10) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f00000000c0)=@in={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000001300)="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", 0x1000}, {&(0x7f0000000180)="554784b78b47f3492e72bc727816aa748bf74c9f72d8f41f", 0x18}], 0x2, &(0x7f0000000340)=[@init={0x18, 0x84, 0x0, {0x9479, 0x101, 0x1, 0x200}}, @init={0x18, 0x84, 0x0, {0xa2a, 0x3, 0x1f, 0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x8006, 0xfffffff7, 0x8, r7}}, @sndrcv={0x30, 0x84, 0x1, {0x400, 0x5b, 0x200, 0x8000, 0x1ff, 0x0, 0x9, 0x4e0, r9}}, @init={0x18, 0x84, 0x0, {0x7, 0xfe00, 0x5, 0x5}}, @sndrcv={0x30, 0x84, 0x1, {0x346a, 0x81, 0x2, 0xfff, 0xffff7fff, 0xffff, 0x9, 0x140, r14}}], 0xe8, 0x40000}, 0x8000) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r15 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r15, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r15, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x62) setsockopt$inet_int(r15, 0x0, 0x12, &(0x7f0000000000)=0xa4, 0x15a) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000040)={0x51, 0x2c8e, 0xdf, 0x6, 0x9}) recvmmsg(r15, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 12:11:39 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1006) 12:11:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00006c32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:39 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:39 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) connect$can_bcm(r0, &(0x7f0000000140), 0x10) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) r4 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x1, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0xfc28) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0x1000) r7 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r7, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) io_submit(r1, 0x2000000000000335, &(0x7f00000005c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x8, 0x5, r2, &(0x7f0000000280)="4c0bd83904745f87919d42f2c0e6c9e111f8ff13424cc565ee78b2c6ea7edf5d40bab3bc8a94be00848c90f38406d90816aa3c607350095d83c5077de649ca0e384dbbe3ea43cd54cd9692e982e8fd3c5766822ec06f6caaa8b321df6239f5a8a1e96a88fc5ce74c729f6e0554a917c25a857a0d1d1378432eca5a7ac4200ffba7cbba3efb70e2d2705b0711a140c58beac3691f338dab4f92", 0x0, 0x80, 0x0, 0x5}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x8, r3, &(0x7f0000000340)="69c5c4453e9b97b1d8750c9f81c6bb983648556d126785989f7c07b53fee19f61badc2092a865c05e0286cd091593221a326c1848498a6231939b39f82b20974ddcb06840ed0f0a121c2ca87d34aa8f18aecdf2a5a2165cea608025125237aba7ea2be6e6f8c3b6e34c7c18f5118cd9d5ce49c6f37168b11847b1c04155276c486889b2a3e10eec6f2680b0dbcd0800f548fd0c4dac32b95ca999dcc63110b33b0c7862f4fdae6c60f09d0c6667af9e2a1d2b8925996cda911ba879f482e02d223a8f74813a8669d53a5b698d8f7e0", 0x0, 0x3, 0x0, 0x1, r4}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x2, r5, &(0x7f0000000440)="68595e2a4e59d254c67e55949928c6e30b5f1f12089d6217bace39e78b0dd8a969d278121f32edfce912e47569a9b7d75ba5149030cee2445940fe1b98924594c54bbb5c7243fc668af4cb03ada073b2c43972a7e1b565ae99766e0b309dc2b55df1b653e5327aa43dce804f2b036da0715b529889ec4088a13908dc8c022094d087c050f0038d6821f57907dc7d64734da7b0e9b0c88afc3d77c8557c68535a6090ed94851293e501b669b2de0b3bc4822e499ba9a53dfbe7f5d29c30dd876425b3594edd75d4a22bf6d080f7e6e1ab41e03091a62369b67a7409c448fd27", 0x0, 0x2, 0x0, 0x0, r6}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0xfffe, r5, &(0x7f0000000540)="073bd1432495362e8aec21728df33668eb01298d1afb1b2ecd59c5f0483c", 0x0, 0x20, 0x0, 0x0, r7}]) [ 471.942084] net_ratelimit: 19 callbacks suppressed [ 471.942092] protocol 88fb is buggy, dev hsr_slave_0 [ 471.952266] protocol 88fb is buggy, dev hsr_slave_1 12:11:39 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1007) 12:11:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00007432000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x8) mremap(&(0x7f0000398000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000244000/0x3000)=nil) 12:11:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00007a32000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:39 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x102f) [ 472.213689] device nr0 entered promiscuous mode [ 472.293444] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! [ 472.332090] protocol 88fb is buggy, dev hsr_slave_0 [ 472.337234] protocol 88fb is buggy, dev hsr_slave_1 12:11:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000003f000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:40 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1048) 12:11:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x8) mremap(&(0x7f0000398000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000244000/0x3000)=nil) 12:11:40 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='\xff\xff\xff\xe5\x15\x00', 0x840, 0x0) ioctl$int_in(r0, 0x800000800c5012, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x24}, 0x368080e1}}, 0x400, 0x7}, &(0x7f0000000080)=0x90) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e21, 0xf2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x50d1}}}, 0x84) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r3 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r7}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000300)={r7, 0x3, 0x4, [0xb44d, 0x1a, 0x100, 0x81]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000380)={r7, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0x1}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)=0x1000) open_by_handle_at(r8, &(0x7f0000000100)={0xb5, 0x9, "782648b1005d81fe1eef10fd195af076b9341b008b12b2fb782f7e55da75b510ea64e562b98585876da666f461aaa8ab7adde0abdf12b873a16e5562fb8d7be3270879ae342e4a913569f2fe0588dfab96d4b2a13a4d52371f8f9d467b6ed144cf2f5bbfb00faf4616bdc58e0592a3019e434c0884d5793e8d614935897cc30ee41b2c71fdadc89a27c6b08ee6ce6fa3724cf7c9ce1518eece941f85a947d6f1a3ea49a66421a7609c1da747f3"}, 0x2) [ 472.732139] protocol 88fb is buggy, dev hsr_slave_0 [ 472.737342] protocol 88fb is buggy, dev hsr_slave_1 12:11:40 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:40 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x104c) 12:11:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6c4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000180)=""/152) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0xc5b, 0x1) read(r3, &(0x7f0000000240), 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r5 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r5, 0x0) write$binfmt_aout(r4, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) fallocate(r4, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r4, 0x0, 0x8}) socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000380)={0x1, 0x5, 0x6, 0x2, 0x2}) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = syz_open_dev$mouse(&(0x7f00000006c0)='/dev/input/mouse#\x00', 0x0, 0x82) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x3c, r9, 0x439, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}]}]}, 0x3c}}, 0x0) sendmsg$IPVS_CMD_FLUSH(r7, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x82900500}, 0xc, &(0x7f00000007c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c7a94b62f475d088498fd3c605f732e6db0c10a8be6f5ed9f70dcbc8b5a4f9560c3064e88df7242762876e77efca05497eb3aafe1db9b6afda055c1a46fa1ff67f09e61412d292bc04cd1922d6b3cf6aeaa6de4a26321910272acde450eee9c5e2a6500f1fcde3552c6ff348e2f087fc8f99a5f6526b75a6c6a31d94808c5d15251e6e46594de1cb5f55b6ed4098ab1b0ee2553879620ca7efc1ac8facf19e9e19d98314772d22fe73807da8a3d44510da", @ANYRES16=r9, @ANYBLOB="000029bd7000fddbdf25110000000c00020452f90b00020000002c0001000c00070020000000230000000c0007001a4987fc100000000800010032e900000800020033000000080006000104000008001800ff07000008000400de7b2d720b46408d80190c1e567623353eb3059033141f6ca6667b5fa9ddac05412ce9f7e75d9da9895cc7ec0d0a02d82726f3b3aa0e940f985ab9f7bf3e3c416b7848e91336"], 0x64}, 0x1, 0x0, 0x0, 0xc00}, 0x24024c10) sendmsg$IPVS_CMD_GET_DEST(r6, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xdd98d0998996d549}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x80, r9, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff481a}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3ab9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xde51}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}]}, 0x80}}, 0xc4) socket(0x1000000010, 0x80003, 0x0) pipe(0x0) 12:11:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000052000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:40 executing program 1: r0 = socket$kcm(0x10, 0xa, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x74000000, &(0x7f0000000140)=[{&(0x7f0000000040)="2e00000020000502d21a80648c6394fb0824fc0004000b400c000300053582c137153e370a0001802f081700d1bd", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) 12:11:40 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0xfff}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, r0, 0x8, 0xffffffffffffffff, 0x14) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, 0x0, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000, 0x0, 0x4]}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x626, 0x25ed, "7d90a7d5496e927e6c5f28e3db389f571aad454c074b087bed0f20db3d9c28623fc48b0b996f08ef9d6c2c23ebfc1da1c1012e32bc0a0f11b213afe6ad0f04e8809b37651105f48cfde0c7254c94587eb243e39f0aa76cc10de504befbc2438af62a301864c85452f3e3d7d7796f169547810052864b3d01b5a11cb1d5e7ba25180437611b47c94a250ffd0f80805a9885216788fdfdb00bc6c58226edc498bd3928743faab787ab16af4acf12532f17e22fe1d92b8cafdce9b9cfdb1e889660af0ca006915ecab327cd164071259e94da38970143df5eb9c927669f43e366736e35283a5b9239c15d2f8aa0dbaaadfeda8ada6b0d0fc089c9ec62f10b9b7caf", 0x5, 0x8, 0xff, 0x20, 0x0, 0x4, 0x4, 0x1}, r4}}, 0x128) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r6, 0x800000000000937e, &(0x7f0000000000)="01000000000000001801000005008000a0000000000000002f") socketpair$unix(0x1, 0xc7fd48ea683e65b7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)=ANY=[], 0xfc28) bind$pptp(r8, &(0x7f00000003c0)={0x18, 0x2, {0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1e) r9 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x290983, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="6400000043954ddf11ffb4c9b893b397512a913748d3a38efb278434b9c94db27798bb95c8f3e3c2251c4b94dac0cfd3b94e799835852e1ca40cba0be9146bf7b1c10d974b67edba81b2dd020000006246f785606de92b04fe667651e7e1a3d273a484949596f88cb83eb9bbc5269ca3af3e399b1b988c59eb5952ffa745f18452971ff9d01abd7f372778cf48a37a7b888bc17d48966c59481e606a5af2e9d4b9675400564059932f17f49ba6399b3250795cbed0f08e1bf42155a6efef054a38f0ee9aa9a86f4bbbaf6d705498464395d6605ee0330815a6188303ef45b8ea2cb83768ab4ae7cb4ca917082e5ec6e84d3ecee11d06ada37294c2c8548dab857f0df7f9b62cbc9965939873b18dbf20"], &(0x7f0000000380)=0x6c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000340)={0x0, 0x1f}, &(0x7f0000000380)=0x8) sendto$inet(r1, &(0x7f0000000080), 0xffffffffffffff02, 0x0, 0x0, 0xfffffffffffffd37) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 12:11:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000000a000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:40 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1068) 12:11:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000000f000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:40 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_mount_image$ext4(0x0, 0x0, 0x101, 0xfffffffffffffe09, 0x0, 0xa82003c92d2080c1, 0x0) [ 473.132087] protocol 88fb is buggy, dev hsr_slave_0 [ 473.133926] protocol 88fb is buggy, dev hsr_slave_0 [ 473.137232] protocol 88fb is buggy, dev hsr_slave_1 [ 473.144137] protocol 88fb is buggy, dev hsr_slave_1 12:11:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000014000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 473.231834] device nr0 entered promiscuous mode 12:11:40 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x106c) [ 473.297659] IPVS: Error connecting to the multicast addr [ 473.335780] audit: type=1326 audit(1574251901.014:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0x50000 [ 473.365659] audit: type=1326 audit(1574251901.014:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 [ 473.396295] audit: type=1326 audit(1574251901.014:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 [ 473.427576] audit: type=1326 audit(1574251901.014:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 [ 473.466720] audit: type=1326 audit(1574251901.014:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 [ 473.549945] audit: type=1326 audit(1574251901.014:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 [ 473.617685] audit: type=1326 audit(1574251901.014:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 [ 473.685429] audit: type=1326 audit(1574251901.014:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 [ 473.986478] IPVS: Error connecting to the multicast addr 12:11:41 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000052000510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:41 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f00000000c0)="f2a60f20e06635002000000f22e0b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0xd}], 0x66f8248efc0ebf9, 0x0, 0x0, 0xfffffe24) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r4, 0x5386, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000180)={[0x0, 0x0, 0xf0, 0x2, 0x0, 0x0, 0x4ce, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = gettid() ptrace(0x8, r7) ioctl$PPPIOCSPASS(r6, 0x40107447, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x6, 0x3f, 0x1, 0x10001}, {0x0, 0x17, 0x7, 0x7fffffff}, {0x3, 0xff, 0x6}, {0x401, 0xfe, 0x5, 0x8000}]}) fcntl$setlease(r5, 0x400, 0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:11:41 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1074) 12:11:41 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000500), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb}, 0x1c}}, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000640)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) 12:11:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032020510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 474.134988] kauditd_printk_skb: 437 callbacks suppressed [ 474.135002] audit: type=1326 audit(1574251901.814:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0x50000 [ 474.240528] audit: type=1326 audit(1574251901.844:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 12:11:42 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x107a) 12:11:42 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032030510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:42 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1100) [ 474.380747] device nr0 entered promiscuous mode [ 474.389868] audit: type=1326 audit(1574251901.844:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0x50000 [ 474.518464] audit: type=1326 audit(1574251901.844:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 [ 474.677119] audit: type=1326 audit(1574251901.844:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0x50000 [ 474.738344] audit: type=1326 audit(1574251901.844:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 [ 474.783139] audit: type=1326 audit(1574251901.844:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0x50000 [ 474.812847] audit: type=1326 audit(1574251901.844:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 [ 474.840474] audit: type=1326 audit(1574251901.844:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0x50000 [ 474.865095] audit: type=1326 audit(1574251901.844:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13709 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45a639 code=0x50000 12:11:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffee2) ioctl$KVM_NMI(r2, 0xae9a) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$KVM_GET_EMULATED_CPUID(r5, 0xc008ae09, &(0x7f0000000000)=""/147) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:11:43 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) fchdir(r0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 12:11:43 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) close(r0) socket$pppoe(0x18, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r7, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) 12:11:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032040510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:43 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:43 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1200) 12:11:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032050510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:44 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x2f00) 12:11:44 executing program 4: r0 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x80, 0x4) write$FUSE_POLL(r1, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x3, {0x1}}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x2, 0x2) r3 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x10001, 0x200) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000340)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x4, 0x0, &(0x7f0000000200)="9936651101e510381afc920e6d05e706cfc06e6ee1a0d1987aadfb29d593121639ddf5dd3daa250b", 0x28, 0x9, 0x5, 0x0, 0x10000, 0x9, &(0x7f0000000240)="7626823f8e5ac986ceb2d0b9c7931e1e546ee2654a897f25683179237617b739b08b95449bbc733fb6628b7fe0f8df2fe292f3fbc29d9722487059b156869d8c3223dd860334db983de840eede4331c3004cb2d3dc71de15c0cbbcb4846172be7ba942121a9a1eb438e026c4edaac7dbb770e6f739f43c567f1ca4dfbdb8210d7482ce8f6a8cadf960ae4ee4fea2e93e835cc05484af06c78aa627a2419eab8c778488888d49e58ebc722cac0df419f99cc61cc8048b5c3c46f34c033c3fa2f06a2d9f9edd84c9d90fcfb31cd9fd5452dbf78312e198ccf8822c188c6b5f30be5293"}) r4 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x7ff, 0x40000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='loginuid\x00') getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ubi_ctrl\x00', 0x200000, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r6, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x2c, r0, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfd5}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc00c0d5}, 0x1) connect$inet6(r4, &(0x7f0000000640)={0xa, 0x4e24, 0x8, @loopback, 0xeb2}, 0x1c) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000680)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x80082102, &(0x7f0000000700)=r7) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000780)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x5400101}, 0xc, &(0x7f0000000900)={&(0x7f00000007c0)={0x10c, r8, 0x832, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x105}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x10001, @mcast2, 0x7}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x484}, 0x44090) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000980)='/dev/hwrng\x00', 0x200003, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r9, 0x0, 0x485, 0x0, 0x0) r10 = syz_open_dev$adsp(&(0x7f00000009c0)='/dev/adsp#\x00', 0x1, 0x103102) ioctl$sock_inet_SIOCGARP(r10, 0x8954, &(0x7f0000000a00)={{0x2, 0x4e20, @broadcast}, {0x6, @random="5d6330bc5c7b"}, 0x68, {0x2, 0x4e22, @multicast1}, 'ipddp0\x00'}) r11 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/vga_arbiter\x00', 0x40000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r11, &(0x7f0000000c40)={0xc, 0x8, 0xfa00, {&(0x7f0000000ac0)}}, 0x10) r12 = add_key(&(0x7f0000000e00)='.dead\x00', &(0x7f0000000e40)={'syz', 0x0}, &(0x7f0000000e80)="9351ea0706c92acad94048be22f13d161af4f011b942f61fa518ace9b7ea4cd46ac2e4055a157252fb555087a1064add4d786a68c623db0c928ddff2ef7df78f80f26943c8d8cce14b8b08da63595ba8771b8d9bee8f4522a531fc9e4f63f6610ee1ef462c55542565a345b8a7a80c6bc08b", 0x72, 0xfffffffffffffffb) add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x2}, &(0x7f0000000d00)="a6a5485ceedff71be285aa05e9ae445cb3cd526aa44216ed3ef77fb5c8849520e96dac60a8b3ba4e27881811927abd9623ddab602ab033cacbccd978e2bef4f5cf9e3faa3c801f9b303926034e957802d245686c1458ad27813e070d13a4681a57ba4305afffb54e5cf3b79d2d5b0517ae7e2e46777fcb3827f66e2e7c3fae0282d21fa0d2ebaf3ec3aeda3259cc47228022620a0a0eb97f16769684b7023148ab827882f576f4b5e24020edda1bb2f55aab817d6a360b38a89044b1995b1b3c0fd9d2470980a72a13aab92b2b1309e1a62c40f2a54003aca73dcb61", 0xdc, r12) r13 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/dsp\x00', 0x400101, 0x0) ioctl$KVM_GET_MP_STATE(r13, 0x8004ae98, &(0x7f0000000f40)) 12:11:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032060510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:44 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x4000) [ 476.591052] device nr0 entered promiscuous mode 12:11:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032070510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:44 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 476.908547] device nr0 entered promiscuous mode 12:11:44 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f000002eff0)={0x5, &(0x7f00000002c0)=[{0x1000, 0x1, 0x20, 0x40}, {0x200, 0x0, 0xc6, 0x34}, {0xd3, 0x30, 0x2f, 0x101}, {0x0, 0x81, 0x4a, 0x2}, {0xf64, 0x2, 0x51, 0x5}]}, 0x10) getpeername(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000400)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x200441, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000340)=0x5, 0x4) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RAUTH(r1, &(0x7f0000000200)={0x14, 0x67, 0x1, {0x5, 0x0, 0x8}}, 0x14) inotify_init1(0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f00000001c0), 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$TUNSETLINK(r4, 0x400454cd, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r5, 0xc08c5334, &(0x7f00000004c0)={0xfffffffc, 0x1, 0x1, 'queue0\x00', 0x5}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r6 = epoll_create1(0x0) epoll_pwait(r6, &(0x7f0000000000)=[{}], 0x1, 0x100, &(0x7f0000000040), 0x8) 12:11:44 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) mmap$usbfs(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, 0x40010, 0xffffffffffffffff, 0x3) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:44 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2c0000006400010700"/20, @ANYRES32=r5, @ANYBLOB="080000e7000000"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newtfilter={0x74, 0x2c, 0x400, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, {0xc}, {0xe, 0xc}, {0x2, 0x4}}, [@TCA_RATE={0x8, 0x5, {0x6, 0x3}}, @filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0x28, 0x2, [@TCA_TCINDEX_CLASSID={0x8, 0x5, {0xffe0, 0xffff}}, @TCA_TCINDEX_SHIFT={0x8, 0x3, 0x8}, @TCA_TCINDEX_POLICE={0xc, 0x6, @TCA_POLICE_RESULT={0x8, 0x5, 0xfffffffa}}, @TCA_TCINDEX_CLASSID={0x8, 0x5, {0xfff2, 0xd}}]}}, @TCA_CHAIN={0x8, 0xb, 0x40}, @TCA_RATE={0x8, 0x5, {0x7}}]}, 0x74}, 0x1, 0x0, 0x0, 0x40040}, 0x73ca952667255e3d) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) r9 = dup3(r6, r7, 0x0) dup2(r9, r8) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) socket(0x0, 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(0xffffffffffffffff, 0xae03, 0x1367) 12:11:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000000320a0510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:44 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:44 executing program 3: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000000320e0510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:44 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x6) r2 = dup(r0) execveat(r2, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000000320f0510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 477.292463] net_ratelimit: 20 callbacks suppressed [ 477.292471] protocol 88fb is buggy, dev hsr_slave_0 [ 477.299024] protocol 88fb is buggy, dev hsr_slave_0 [ 477.302545] protocol 88fb is buggy, dev hsr_slave_1 [ 477.313985] protocol 88fb is buggy, dev hsr_slave_1 12:11:45 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f00000001c0)=0x0) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0, 0x638a071, &(0x7f00000002c0)=ANY=[@ANYBLOB='alldw_utime=00000000000000000000306,fsname=alldw_utime,uid<', @ANYRESDEC=r2, @ANYBLOB=',obj_role=alldw_utime,dont_hash,euid<', @ANYRESDEC=r3, @ANYBLOB=',euid=', @ANYRESDEC=r3, @ANYBLOB="2cda151cba736d61636b6673686574302c00430e3bc91e660534"]) r4 = semget$private(0x0, 0x2, 0x0) semop(r4, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff8}], 0x2) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000100)) r5 = socket(0x10, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0xfffffea6) r7 = accept4(r6, &(0x7f0000000580)=@ethernet={0x0, @local}, &(0x7f0000000600)=0x80, 0x100000) ioctl$sock_inet_tcp_SIOCINQ(r7, 0x541b, &(0x7f0000000640)) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) setresgid(0x0, r11, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0xfe, 0x1000000000000000}], 0x0, &(0x7f0000000480)={[{@gid={'gid', 0x3d, r11}}, {@errors_continue='errors=continue'}, {@errors_recover='errors=recover'}, {@case_sensitive_no='case_sensitive=no'}, {@fmask={'fmask', 0x3d, 0x1}}], [{@euid_gt={'euid>', r12}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic'}}]}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000380)={{0x10000, r8, r9, r2, r11, 0x20}, 0x7fff, 0xfa, 0xfffffffffffff73e}) 12:11:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032480510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:45 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) dup(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) execveat(r1, &(0x7f0000000040)='\x00', 0xfffffffffffffffd, 0x0, 0x400) [ 477.703983] device nr0 entered promiscuous mode 12:11:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000000324c0510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 477.742631] device nr0 entered promiscuous mode 12:11:45 executing program 1: getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0xe9484f786a3bb8e4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socket(0x10, 0x400000000080803, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240), 0x8) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000001200)=@assoc_value={0x0, 0x6}, &(0x7f0000001240)=0x8) getpgrp(r0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x3ff}, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x0, &(0x7f00000000c0)="0800a1") r4 = socket(0xa, 0x80002, 0x7a) write(r4, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000080), 0xfffffffffffffcfa) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r5, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 12:11:45 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 477.852094] protocol 88fb is buggy, dev hsr_slave_0 [ 477.857230] protocol 88fb is buggy, dev hsr_slave_1 12:11:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032600510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 478.172102] protocol 88fb is buggy, dev hsr_slave_0 [ 478.177368] protocol 88fb is buggy, dev hsr_slave_1 12:11:45 executing program 3: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:45 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2c0000006400010700"/20, @ANYRES32=r5, @ANYBLOB="080000e7000000"], 0x2c}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@mcast2, @rand_addr="1d3c3a2eabca157eb8e0c7543e0da241", @local, 0x9, 0x5, 0x0, 0x100, 0xfffffffffffff2ae, 0x13c0200, r5}) dup(r0) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x14, r8, 0xc4c2c822e4e11799, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xc4, r8, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1, @ipv4={[], [], @empty}, 0x6}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x44944}, 0x40000) openat$cgroup_ro(r6, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) execveat(r6, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032680510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 478.235446] device nr0 entered promiscuous mode 12:11:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000000326c0510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:46 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:46 executing program 4: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(0x0, 0x0) r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300)='devlink\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/195) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1040}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="64197526", @ANYRES16=r0, @ANYBLOB="000427bd7000ffdbdf2506000000080001007063690014000200303030303a30303a31302e300000000008000300000000000800040001000000080001007063690014000200303030303a30303a31302e300000000008000300020000000800040000000000100001006e657464657673696d000000100002006e657464657673696d30000008000300001000000800040003000000080001007063690014000200303030303a30303a31302e300000000008000300030000000800040002000000"], 0xc8}, 0x1, 0x0, 0x0, 0x440}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc0000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x48, r2, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x35}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4084001}, 0x8000) unshare(0x600) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}}) 12:11:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032740510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 478.454830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=13916 comm=syz-executor.2 [ 478.470369] device nr0 entered promiscuous mode 12:11:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e000000327a0510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 478.572265] protocol 88fb is buggy, dev hsr_slave_0 [ 478.577469] protocol 88fb is buggy, dev hsr_slave_1 [ 478.592560] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=13940 comm=syz-executor.2 12:11:46 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x1) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x16, r2, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$setperm(0x5, r3, 0x3000000) 12:11:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000610d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:46 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0xf8e2d87a3384a75d) dup(r0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x2002) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:46 executing program 1: r0 = perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f84247308000000cb95c665a50bd1a286b2445614306acda1162de35df5c7e4f74f462a06b0c4bd9d3025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ed1000000000000000035716ed0be9fb90437e907d4ee63c572e67fb888108744339e535a893509d12bb3d06a2e00000000000000000000994015217ac85c8aa22f0ac28a5579a000000000691e2f9d24659e9fa115c35cceffc17fea1a6cf1ae411af37f145b7802d2c3abc05a559f1c9dde2bd110f86068a12faa494e3ad8b25301c1221c549914011e096c0acfbc519109393fe1a8b1"], 0x5) r3 = open(0x0, 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[], 0x0) write$P9_RREADDIR(r4, 0x0, 0xe850f50af522f5d) r5 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev={0xfe, 0x80, [], 0x14}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x5, 0x0, 0x0, 0xa}, {0x0, 0x10000000}, {}, 0xfffffffc, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x1, 0x0, 0x0, 0x0, 0x20}}, 0xe8) close(r5) r6 = socket$inet6(0xa, 0x1, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000380)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, r8}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}, 0xe8) close(r6) r9 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local}}, 0xe8) close(r9) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local}}, 0xe8) close(0xffffffffffffffff) r10 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local}}, 0xe8) close(r10) r11 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local}}, 0xe8) close(r11) r12 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r12, 0x29, 0x23, &(0x7f0000000380)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x8, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1, 0x0, 0x2}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}, 0xe8) close(r12) write$cgroup_subtree(r2, &(0x7f0000001900)=ANY=[@ANYPTR64=&(0x7f0000001780)=ANY=[@ANYRESOCT=r0, @ANYRES32, @ANYRESHEX, @ANYRES32=r5, @ANYRESOCT=r6, @ANYRES32=r9, @ANYRES16=r3], @ANYPTR64=&(0x7f00000018c0)=ANY=[@ANYRES16, @ANYRES16=r4, @ANYRESHEX, @ANYRES64, @ANYRES32, @ANYPTR64=&(0x7f0000001800)=ANY=[@ANYRES16, @ANYPTR64, @ANYRESHEX=0x0, @ANYBLOB="f75e45aaea4717d16eaebee092ca3602202274cf10ae1d7599c287f46b0f9d15c630c3015ecf5839e76a7f1b27f71fe0cabeed3ce045b68a70e84e8ffb78bda0080cae1990acb4bd34a59ee593aa8b52750d8b4788ab8ead6c47de1a91caf10d0d11010d89810b24523f480303ecc7586573", @ANYRESHEX=r10, @ANYRESHEX, @ANYPTR64], @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=r0], @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYRES64=r11, @ANYRESOCT]], @ANYRES16, @ANYRESHEX=r11, @ANYRES16=r12], 0x26) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000380)={@local, 0x55e6, 0x1, 0xff, 0x0, 0x0, 0x1}, 0x20) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000240)) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r14 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r14, 0x400, 0x0) close(r14) r15 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r15, 0x89a1, &(0x7f0000000180)={@remote, 0x27}) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r15, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r16}) sendmsg$can_raw(r14, &(0x7f0000000300)={&(0x7f0000000200)={0x1d, r16}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x4, 0x1, 0x1}, 0x16, 0x3, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={r17, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r14, 0x84, 0x9, 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r13, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000740)=@v2={0x5, 0x0, 0x14, 0x7ff, 0x1000, "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"}, 0x100a, 0x2) [ 479.101842] device nr0 entered promiscuous mode 12:11:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x299}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000049000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x3) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001640)='/selinux/status\x00', 0x0, 0x0) accept4$rose(r3, &(0x7f0000001680)=@full={0xb, @dev, @remote, 0x0, [@netrom, @null, @null, @rose, @netrom, @null]}, &(0x7f00000016c0)=0x40, 0x80400) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 12:11:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000910d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:46 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) ioctl(r0, 0x7, &(0x7f0000000080)="22b7e5cfff79316db9f370feec924f529dd74a56411c8a0cfd0f3ba23b163c0bdcb523dd35214fb33bfd87bbd6377b9ad9cf6b783aa8e9bbf41ef8f4d2ead55643f24f4b8a6a0929bd780bf8919d27f2b5c7d4f96ba596e1e044c36a9617a7c29fab8e6932e078316b99beee7323c56ac7731a7e011b23d6b5ba3ecd462016494ea8327227077980f4cd6f85ca04bdc851168ce18cdabed235d79fcd265305") execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000040)={0x1, 0xffff, [{0x6, 0x0, 0x4}]}) 12:11:46 executing program 4: r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x2, 0x0, 0x0, 0x81, 0x0, 0x8001, 0x1000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0x4}, 0x18200, 0x5, 0x20, 0x2, 0x11655f44, 0xfffffff7, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, 0x0, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000, 0x0, 0x4]}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x626, 0x25ed, "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", 0x5, 0x8, 0xff, 0x20, 0x0, 0x4, 0x4, 0x1}, r4}}, 0x128) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="3000000010008992000000000000000096a9be7d00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001000120008000100767469f60300020022736bc93390cb385379abdac735ac2aa88c0e0622d45dce1d0242eff205f791d4490512778af7274e9b04a96cf6ebea389da4a0495d9f1d67"], 0x30}}, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r6 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(r6, 0x800000000000937e, &(0x7f0000000000)="01000000000000001801000005008000a0000000000000002f") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x290983, 0x0) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r10 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r10, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES64=r10], &(0x7f000095dffc)=0x2) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="6400000043954ddf11ffb4c9b893b397512a913748d3a38efb278474b9c94db2c0cfd3b94e799835852e0ca40cba0be9146bf7b1c10d974b67edba81b2dd91915b846246f785606de92a04fe667651e7e100d27ca19eb31ea48494958d62a3ec7d50b93c8f38753e"], &(0x7f0000000380)=0x6c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000340)={0x0, 0x1f}, &(0x7f0000000380)=0x8) sendto$inet(r1, &(0x7f0000000080), 0xffffffffffffff02, 0x0, 0x0, 0xfffffffffffffd37) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 12:11:46 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 479.227203] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:46 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r0 = creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x480200) r2 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0xfc28) close(r4) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r7}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000300)={r7, 0x3, 0x4, [0xb44d, 0x1a, 0x100, 0x81]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={r7, 0x1f}, &(0x7f0000000140)=0x8) ioctl$FS_IOC_FIEMAP(r0, 0x40086602, &(0x7f0000000440)={0x6c0}) 12:11:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000f10d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 479.349752] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 12:11:47 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu8\xf6\xa5\x16\'J\x1f\x03Q\xfba\x94n\xac\xf1\f\xf2\xea\xef\xffa\x94\x1eh;<\xacfY\t\xbe(l\x90\xcbm\xc9\xd3f\xb3\\IK\xbe\xddX\x04\b$/Ta\xce\x9b\xfd8\xef\x17^\xbb\x7f\x05L\x83\x81kge\x13\xc3\xa6:\'\rXv\xbd;\x1bD\xfdGlK\xe6\x17\x8e\xc2\xc52e\xd2*\x7f\n\xa5[\xb5{\x06F\x19j\x02i\x9c]$k\xa2\'F\x16\xcfX\xa8\xba\xea\xa6\x18\xd1]\x10\x9bN\x1f\x16\x1bYq\xc0ud\x03O?\xee@\xb5\xbd)@\xd4T\x16\xc3\xc4L=\xc1l\xf1\xb0L\xc4`F&\xbd\x12Q\x10\xb1\x86\xd0\xbb|N\x83\x87\x81\x04k\xa0 \xfaq\a\xa0\xb6\xa2\xdfC\xc0Ws\xd0P\xb9\\L\xcb4\x1d\xf7\xfb\xf1\x8fs', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) write$P9_RAUTH(r2, &(0x7f0000000140)={0x14, 0x67, 0x2, {0x46, 0x4, 0x2}}, 0x14) [ 479.441817] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:47 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pwritev(r0, &(0x7f0000000500)=[{&(0x7f0000000080)="5222acbf229bd337b0ac6ffa89968c77a683ff3aa769e8f8aa5902ca", 0x1c}, {&(0x7f00000001c0)="e078d9562443b350d537a2c12065c7da3b43213549e4740ff2aa628669a8452eb62db56c13f84371669601f3c43230cb9c3d47205d3f2fa2e640226e3bba7c7c0a3161f5c50e9567d2551e45ef9509f4ff7dc546c3a2f96c36b25bc144f3b01d86a82d8ab9ccb46e042c5d8610d6ad6f18bce9bd0b578e628b2a154b164a25af24ed", 0x82}, {&(0x7f0000000280)="8260ba2b3c63308b6ab85366ad9d9755a3a9c1c33c595e7957355be3b843b035c1b49b98e1529b34d412fa9bdfadd37e5d47b7898eed43f70a710b0d92267f0bc81568d0f88051543f0f98a2eb8028d3379aeb3feb39b01d6c1ea5788a0dbd8aecbe8bb907ac1731866d5e8e7068f07563d303478128b3e3cd83f49d4c95854555be47ee6a4f", 0x86}, {&(0x7f0000000100)="302081cb126d145b8ff882c25e6aecbb70", 0x11}, {&(0x7f0000000340)="5b0d9c8cdc5282df4132eca5c601a94bcef8b50e1f61fae4a41cc8e7a44d6742989a369f0ded1a224ad9557c08d36f1172595626bfc4ea146f6d3ac135e0d57aa22eeb75141881cfe375feadb0a5282988dff8ca9b013450990247243a08adf4702aab44eceb23517ab18e4ce72324c23d541ff960344c44b971437cb46f8b8e195f922bbcc0a9b6a9167848036f45f9f68b6fd5e78fe5de6e564c2a4a1e9371aeda4221e77f0478cd0c7b8749e7706c8479de7ceae12fb1211d7b8774235ba65deb947e3c585606b58e1c24abffb4961da039dd2f7330f2dfa3328f7adcbf05fab785e58ac9208c45537354d230a47f758da7f0d6c9cf7f", 0xf8}, {&(0x7f0000000440)="52e82c0645a176dc701933aa51194bef6e584ae29637176d33607b92a021769e21cbe253ccf78d1a50e15611a7539ea55f731bf4eb42d242a0870597732414c206ffe94b4968979c097694fc8cd68fd3019b7023f7afec135f8507c3e4554c1e43db66d2dd959bd83c3c029836435d3477efd645f414cd6adae6d22b46bfb66b0bc8f15485b80363b56133896b89a9064c70b3ed50d5dd028c98f3730577ed0928658a177383af572443ecbb43657f2cfa9a62db7d2fba32d18373a919c3", 0xbe}], 0x6, 0x7fffffff) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001d00070f00000000000000000700c3ea", @ANYRES32=r1], 0x2}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 12:11:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032002510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 479.675441] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 479.689452] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 12:11:47 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1000) write$UHID_INPUT2(r1, &(0x7f0000000040)={0xc, 0xec, "c3152633579b473ccdbf0b2843e7f3a9241493243df4b044edcbcfb244a2a75564193eb415ee38e0d27e0f5ba86e7e172a788799e8c2c5b5e6092814fd2de276fffb51fdf2984dec2ca308d427c7142aed88c247dc81fb0b457ad2eb0e7b2a91c280ca703cb9c961b1923f9ef8038017fa0ffbbf1f847c5dccc216df59f076cd0a35b87e7a9c757878640abbac2afb779f4600a4573f1f05a6d4531a6b6a570f72d38d58e855923573596e18b386acc14810eff273eecec3192b61f8df3e50df3b5064d4051de2415a9b2f1d8ada877c1921b984318638afd0cd1600488e52a5df68dd25eabd891cdacbca38"}, 0xf2) r2 = dup(r0) execveat(r2, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:47 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 479.739903] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 479.815093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14009 comm=syz-executor.3 12:11:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032005210d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:47 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xc8102, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d000010) [ 479.956543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14009 comm=syz-executor.3 12:11:47 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) [ 480.060014] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14009 comm=syz-executor.3 [ 480.158896] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14009 comm=syz-executor.3 [ 480.227629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14009 comm=syz-executor.3 12:11:47 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000610d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:47 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:47 executing program 4: syz_emit_ethernet(0x12aa, &(0x7f00000014c0)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x1274, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x85010000, 0xa0008000]}, @mcast2, {[@dstopts={0x5c, 0x12, [], [@jumbo={0xc2, 0x4, 0x6}, @enc_lim={0x4, 0x1, 0x6f}, @padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x7}, @enc_lim={0x4, 0x1, 0x5}, @hao={0xc9, 0x10, @local}, @ra={0x5, 0x2, 0xf802}, @generic={0xff, 0x63, "762ad3024be110ef8606605d0d96c415ad011f20ebc544b117f34481bddb1faa80a9178b386e47ea3b81c5226f92ef72f2b23c37dee49e863aa3aced3f6b720cdcfa1f3d30e378b32dfc8b1129dfe72ccf9a489b7133af1da8a1261f25f2a9bdb9eb45"}, @pad1]}, @routing={0x2c, 0xc, 0x58d60550b65978f6, 0x7, 0x0, [@rand_addr="e5935f4b961419fd862e4ae9efca6835", @dev={0xfe, 0x80, [], 0x18}, @loopback, @ipv4={[], [], @remote}, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}, @dstopts={0x6c, 0x16, [], [@padn={0x1, 0xa}, @generic={0x5, 0x99, "f8b339f989604f50f29bade92d8a448743a9de0fb3e8bb06efa654aeb96f303822afdaa194e2a1f364afb973cedb93faa21e92b566b79d618d6c0410e26a9389a3aa3cf2329626b3b93b82bfc947d1a79ec1c415bbb3e8d898b1bb572582f7c3425748c378b9f6f289156975e870e954d1454e257e9a9fffe8776b2fa1b146572f69f689de4d9807d71a62c4ae3683e5d5005fd7742c15ed92"}, @calipso={0x7, 0x8, {0x1ff, 0x0, 0x3, 0x7}}]}, @srh={0x1, 0xa, 0x4, 0x5, 0x1, 0x60, 0xff7f, [@remote, @dev={0xfe, 0x80, [], 0xc}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @local, @dev={0xfe, 0x80, [], 0x21}]}, @srh={0xf0f324f9568c6eb9, 0x8, 0x4, 0x4, 0x7, 0x48, 0x1, [@remote, @ipv4={[], [], @empty}, @ipv4={[], [], @multicast1}, @remote]}], @udp={0x4e22, 0x4ea0, 0x100c, 0x0, [@guehdr={0x1, 0x0, 0x0, 0x8, 0x100}], "b79c68ca80f8ad1bb9f1c010878f2bd6b791d9dc6274a9e3f0b170051a00280d7442659f74e743dabcdb3a26fac8a931e2267cd80fb38a955f7fe43b6436ec1b95f25fbc06e45b7db90e61c58ab413e57312a4d709b5de3dc799f6be71bbb76e70443aa9f38f4e7e9afab8840e669fc02c17983b2bf8ba9f5f5e43e7940d544bfbbf4f63374590f86b6779aa09a1545afe053467d943be6cf42b867acecb7a462e5e3553bba1e21a0582d0d3fcead074630e3f42b2539adaa925b7091b1f81cf9d21b9220a9e7239d588b13df59b3be6cc199c36880df15655036d1537afc67a0dcf99a513013d8a697458376b9acabe98a8e8d076b373a240b3f6388e131fc39e52c9e6dc2b3de7553702597ab54d3eaef3d4a6fb057affaa6ffa680818304f836922925daee0b9aa102af277c5807f46119333f80d99c2091f5f4277c8d9d20de97da48683401704843303ed5115928d2e670e102a681bf7de13269b52032523d4078f2b3246118a70eba36e2b703e05422436dcf74a9a9b635ad811c86df54cc0db7341b4dd0dea38b2469a765c8061b5409326832812278e561733c2b50f6bbb874be63a5dc712ad7450006879702978115e8ddb4da4865f3dd520c74a294ed0d39bb6f824e2681700b2f3a99c1c9b7698d843d59edd0be5afa7fe0d6fa004ab90a49ee2c6d95fd12b3dc138258ed7e104ae943afbe133399d0ce3a53218833a5f28d5e77577c56c1ddd453460f3d8526b1e345b6639ec2708635345981ccf7d7d3eb4299d3f3395fe9db01bf8bad715f6b1cc24e9dbc8ee98e77298583e4da0df8f7a91439634cecca83732daa1cbf17d06636a0b9a8dde61be739962cc2ef5f8e706bd45220db8ee9ab5c728bab6fcb16904d41636c2fa7605a39638e5806ae1981e1fd20675d68955a1bafa501bc898eb26cb4a3d8dce74177d8691f173c17246778100e2208953e0cc46a728210f939000c5772561086ce60cb7d6e9b5642104eddb5ae89e3ee44c3bc0877740e60bfe9471978341acff95c048f597dcebdacf1ed4ce0a44848fb84952676da538136ae85c4fbb04e64bfa083c7f54ed0c34c04f77540063030d99f6b41a9526c27c127b70c11e9d7d7638fcc603fe15927476bda7953cc29e65fdfe8f2c64366cb4064ca67ff342a0aa354c7696058a71bb0ab30aae5250202604813d56f0e635705643ee33844a2b075abc57f579f494d75a31a15161d28f38db73c1d811bf029bf4ed80bdf0920721f6b3e616ac24d98f0e18e58dc147edededcb24157ff6149edaa5b7e2db25d418011d7a8d073a986d1e6f67e34ec1c0d2616892191e20dacf8270e09df8c134b0ee32d06bcbfd299fbec347d602954dacda117df6db2cd99bfdfc3776f54bf817f514a9b5d4371c5a4cb3727e82bcf3f2990b1dc9564d1c7e005247e6f6989a9cc27afe62d2292d84faa44624616978374c6282aca8ccfe6bc19b9d1bda60a0d92d6141dd6965f95e320aa05229369d306ae299e39f74ae6ab84c5c84a0217146630a6d2f3010c71052e9137fdfc56edd6c6e72056de78e204f44aeebe28ced2c0aa9b355d92a465e463db866f8f067094c8f1d4bcdcb5fb30bb598db3e88daf38b210cdda78e3d41501d8bbff08590a5d112aca0eec21a8b5c3201c056afdfd45f8623626220d5a4186be94d17aaf27d5033f81b59f8b79fd1887a02702d237f45fbcb5e481319c2d53fb502aab0afcf66b55b8a22c7ae92a393d97d99fc0c524f71496277460e72b91dce3eecccd54db8b00ff9d19ccf078118fdaf0b50310b6f209c0f3c17bf62f6825329077fec7b6809222784e2bcbe85c01b6b866ad55e4304396c610dee03599df585ba1944ed14ede9b81e5071f8f2a4a22493d53632f0b2d730bf8a4f7d888c1a66c925b12a8fb672dbd5692331f9af38ce83c51068e6a8edc6f27a1b4f70c799af4fe69a8723bec4497c9ca658d9b6fed7037567a00513931c606040d570b34bd59dddedd8f11b4d70141343438df69c7e029030c5f148a8b12b5f7d253e66e1541076d6e3569ddc134998902be7079e6d9742b14d3aa829710feed011d072dadbd40065fff307d3dc1e4aaf0db055fda694b2d1a6834ccc07affc57bdaa88219ac586e9f91d7486c9588be4e81870ffaa64c1e5d76b323e16346a0aee76e8fb4c71cc239273023abb2f16e642d2d71f4bea3b2fdbad3875ed24ad817b81cc961e01d316b070c0fa15983ba8ebff9113ebd0b3313a01bda3bdef3aaabdab642224e187c8cf3e0d7b2d7edb094fd0cf7210ff63c174a58d18450403ee1ed53fd39a37fcfc5dcb69559693f1e5ddea0de3740ff0bfc7e8649c2daf76fad9637a09280ea0a6d1829ff632910fcaf821cc37ecf60f2351e35f4b7e80db24952ca1757b43706e9d33634e1698ba80cd69ed52c4e1fea3e08d0af2b63d8ff7d669a06d975eff4bfedc58f3f73c6fa1dbc7694d1864aef3f120ffe47a6a5b8cff2a3b15ed2c2557a3b92fedbac9ca87b3f0ac49774aa45b497f41d6e9e92e2ffd5302be1755563f350b634e970feb09db76f1ea6c79944c698e3f6082cf48d9bb8188d9c9fb9a0b969108c398b5d33f250e5a4a301a0d266621b923725ba6ae6109cecf00b7a600e9ea11b7745abf422bd5a9142e75129338f0da1cb7453e3e00d223f97a8febdf2a7dc8b59c27c0c173def1ab59040d5b406204d6b7a381f43e7be0929d8d54ddd3b5d11dba7d206eec7d059e9dfe44d396835acfb6bde08d53843b330011a839b208553a20e7a40c1d44646ff94154d85446212a4090b409f094029ca1aa7b85c69f51546f52e4e7d08d6778700dc59f51116f7454577c45128f133eebf55287e50c6e70f88eae9e1af6c7ba177e5cea49ec61e0181a47efc51ad2005aee2087b2e65c542082795a1704f26f565906a379de34d45e85dffdda4d51cdbe6cde933f70611b7fcd7e5689117e2e6e7ccd418ee25d0f72940c90eaad30f50fb7040744daa8837bfd408fc7d2097933c19c7d6c1c2827ebdf64adb914d0f585fb98a5073a2a964cce2b8010d7f16fe4b5bfc78c63f2b6da4aa93c4240750fad2d1bbecb015d196ff24b6df4cf8fcc6350bf8edf91588f0df527dd1a51a02a8025c71411a4ff884e91c7305d23f74c3264d21cdf40209a3e23d6c2e15d18ffa7f63db2a3bd9bb7bd327692f4fe7776ac926a426e2b3b7e03e54dbd4b4b96908611b39622f007a10563227566dfc7ff35fa18a46a4558ecf0d3b244cabb6b42fe87ecf91ead3a7879d29a1458b36c96e158910115bdd91392af7950c3b8718acd55a5047fd1d22b11cd26bbc5449b69316d60d0b43f54dc86da597e80c4266c5a93d471fabdd018d93c1bc08196f7a73fb4134e8785b1926ca92d3ee2c99020ce8900d289d06abf37d7e83f24aaff3c6f1a470133469bac6595a8e70299b0bb6a7fc1555894268a6bad89ce4b9d8aa52aba5381df8524cf7515a1ac76c39f8f830a51a879f048cde9cc3753b3c365cf9f92b8ff04ecc1b7cd8cd0c702811c71db1d44fd9aa7f5bdc2ffe549a1d2087203b5517d14a894525a3f26b50dd4901504006f3df84048f6fb2353393b50ea338fcae54a1a7dc0bd5fe5f075f9a212c810de34cbacc07f79d494dfcf892f2a64835360413f40d77b082edc8ba95b4f0e405cde58a06611486676974ade2b30e29793f5f715ee4626838d12394ad883875f84f446dd22af4d6a34787374477f3deab77e1d5e5b9ee832212ce1da53965196603cc535e4d9d114e6044542d538e77ad52d79b0bda4c94516d4c28d7577bea94eae877195611a79e3eb31f880c81f3738c04f38b6a4991f783e747c7b929a5c2ec2975c88099fccb6a5687e7f3dd2502087bec4a11833ac4d7af16784b9eaca3838bf392f820d85f90ce09ef3f001279be5d0608d5dcf076b3c278916e1b5a01f731d7e71c20345a5ac1b859ca1f466c38f4ecf50cf55ec23016e8bdb7b6a5856def7ee1a050f4f27154e98f1ee442de3fa140bcd5bbe9caa57c12da12ed25bc10503ffdbf795ad7fc0d08921d2fba0aa9f4c84dbe5152db334e29574bbb7f44b2a18e81d904b8aa502791811d7b88177285f8b350fa0211d78432ee08a7dc5d6b19dcb99d318bbcd36859547e978aa276151830ef76c818e37c7fdb45f063d1fdaad4b82e9b6976cd29a0629dfa92b0a1e62c7c672e7f4d3626cf61fed22b30baaba0d08ce7ed63b38bf0a7323d14e6f7d4a1d0d1a7549faf488310f9f0b5c50f2118e2f614f0b958d9f9b67c1280511396c05d5dce7a32ee10f7a4fae5b80e8f13d658618c97d913987c414bb0b70f3a053a3a3413819e75223de242b24feb76c083f171eb8222377b531f0ab1afc1155e3e3b0d1d39b1fee18d0b563ca6271e095bb018a1dbe81f4f89335143287ac3f1aab932e51d5d434cda51a36d7fc10e8978dccd2e13981ed6f337fa84b81d9954595a9dbf0307b1bfc1c2bdae896b643d41f0baee33501ec017359450ed02517f0dda314dc469758dfe0e4562ad5888001b794565de218d815f22e97f79a3317f09c91a96d43a9a51d7389b03e2d2050fb857714dd1c6d46d7b4755cd7da31290815acf1019f021d1312a1c5b9318a35b22ef7df2e5b4d3f375d6af719e18acaa3ce33f9a765e0571b1413256b76b399ab0166ef56cb8e5fda90426fe694403829f409203741bc05b60356af183a338bfddbac420deebe4fd1a31bf77c44867631a9574bcb069c15df3aeadb755335d08f1266bd57cda8008d0bc1b68b664841402219d19289faa97e0f74ebb451fbcabe8c6e9674f782efb96a460e9c9b8b5eb7e85c22be053bef784baee901a160d084609ab82b1746cab3ee0b7007cb91ca4fa17ac94b8e8dc219a3a22ba0d0d62816ccd538c25c0768e201b3e0f7d574d504dd9daa841116fa6e89aee58b42c54bff0d2cdc34124623be2f4b4232b65580dc31951735fa94b075b73ef221ae8bcff4a1e9c5adcfd687b25afc1a6fe193dbb8c0266360bd92153decbd713439bb371526b8e99013387a5e44f4bd517595166071744ee3292efa55f97d6522f23efa4631c287f6727a7b102a2628fd88b77da80af5228c08e34681e1422753cc379704610ba65660943bb046fb13e0868ca1d664ef4e6085aeb77bddba1c37735785a6c73ae24e24c2826e92ca805ba8f24e6e61cda6af5b4aa5cede966b0d5407939ecf061445e27cf02169f6c9e612f743b434316e544a065f9a6951d5d378ac2786502c9887cd8285554fb8d4b34c0ff0d4a9fa270e9690d40dfc388add07bd0b62d1b07ee305fe862dee32f96764d80ae0a9e91d0db02d433fe90933d9e8f92aa0e7e0784d36e79624cefc4dc347c67cad97b6c60c4428b66896b026eff86294934d1784457896a8076c83b40c6751abd3a7d0252d3ab955ede8f432ea72c5919cd785516a517005aecb56543f541b4610f223c427f98f8d8eb2efe05a88bd69ac9fea247eda481aa3ecd85c08de97db66375ab20c36b8af50c46b668a941f38a33c544519efe58847bd4da0b077ac8079afe771240a297985c441e3bb8e33ef291ba3db946dab1b48e9d512b094ca393df51ad21be1f75b2a0c446b1c1be387561bf2893bfd4b946a5b20dc3c1bb9ec499f21be2182770094ca3a6c26ae17cd7c423f6e1e90864a3f540bd525686675f4bff46e831ef576d2dbd8339bc7355c6a7b611435547ae1314a5a10fe6bb348cb1bb12b06daf9003ac6fa9c1e996fdd4882d0782213ad0ab71b77a7fb63ce677231f79c955c73"}}}}}}, 0x0) [ 480.277260] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14009 comm=syz-executor.3 [ 480.341850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14009 comm=syz-executor.3 [ 480.371052] kauditd_printk_skb: 3810 callbacks suppressed 12:11:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000910d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 480.371066] audit: type=1800 audit(1574251908.044:4440): pid=14041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16563 res=0 [ 480.397981] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14009 comm=syz-executor.3 [ 480.500593] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:48 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0xfea2, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 12:11:48 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xc8102, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x80001d000010) 12:11:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000f10d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:48 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) r2 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000400)={@mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @loopback, 0x3, 0xff, 0x1ff, 0x280, 0x0, 0x1, r4}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = socket(0xa, 0x1, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r6, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r8}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000300)={r8, 0x3, 0x4, [0xb44d, 0x1a, 0x100, 0x81]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000080)={r8, 0x3}, 0x8) r9 = dup(r0) execveat(r9, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) bind$llc(r9, &(0x7f0000000040)={0x1a, 0x307, 0x90, 0x9, 0xff, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) 12:11:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$inet6(0xa, 0x400000000001, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='f\x00\x00\x00\xf3\xff\xff\xff\xff\xff\xff\xff', 0x5114f7941f3d736c, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000080)={0x0, 0x1, 0x8001, 0x7, 0x6}) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bond0\x00\x05H\xfeL \x00\x00\nz\x03', 0xffb}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000000)={r6}, 0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000350053d1f949"], 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000400f1ffffff0000000008000100687462001c00000000180000cd037d7f399599a070000000000000007ec283f61e"], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="34000000240007017000"/20, @ANYRES32=r11, @ANYBLOB="0000ffff00000000ecbe2217871f0cd376bc0dc25ea3c6e304000000"], 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'bond_slave_1\x00', r11}) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000240)={'team0\x00', r11}) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000)={r6, 0x9}, &(0x7f0000000080)=0x8) r12 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r12, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0xe, &(0x7f0000000140)={@remote, r13}, 0x14) write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="a7720180000000000000b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625df08300200000040847be2fdffe8cd918b035041291559f3ee3a46069062af9680d512f4d8a5c51817c3ff01acf61e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f"], 0x69) [ 480.622056] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032002510d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:48 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 480.850689] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:48 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032005210d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$sndpcmp(&(0x7f00000017c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x1) bind$xdp(r0, &(0x7f0000001800)={0x2c, 0x1, r1, 0xf, r2}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2d, 'rdma'}]}, 0x6) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x18, 0x119, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 12:11:48 executing program 3: r0 = socket(0x5, 0x2, 0x3f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000000340)) openat$cgroup_ro(r3, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05"], 0x9b}}, 0x0) socket(0x0, 0x0, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x8, 0x0) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f00000003c0)={0x0, 0xfff, 0x8, [0x800, 0xffff, 0x2, 0x800, 0x4, 0x29f, 0x101, 0x5]}, &(0x7f0000000400)=0x18) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000006c0)={r6, @in={{0x2, 0x4e23, @multicast1}}, 0x89e8, 0x8, 0x401, 0x4}, 0x98) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006cffff1f000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="2b692e892dbe0376642e646d61202d72646d61203ab684f1d43b0aae10e20f244c1c998db4a005591b8e85a5efd0421a157e5171b32e18054b6279b4b7112b3329c17a665290729bb1c0017d04917ac04d1469c3319ac92a3df635670d1e47378b09d0f6a17930fb5c1d0ed6c435bb65e179b8e5f3961de40bee0368bfb866614492932f52d98d7600d6f2589c773460024203a52fa04fb95cd3b4ee676f8e12b4db5de052d717d3e721f27f637ef10386cb00a8d5206636a6396d34a11ce8703f91d41a77"], 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000000c0)={0x0, {{0xa, 0x4e22, 0xffff, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x8}}}}, 0x108) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xa6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)=0x1000) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000540)=0x4, 0x4) 12:11:48 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x10400, 0x0) ftruncate(r2, 0x8) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000502d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 481.562057] device bond0 entered promiscuous mode [ 481.566989] device bond_slave_0 entered promiscuous mode [ 481.572721] device bond_slave_1 entered promiscuous mode [ 481.579505] 8021q: adding VLAN 0 to HW filter on device bond0 12:11:49 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) getsockopt$inet6_tcp_int(r2, 0x6, 0x9, &(0x7f0000000100), &(0x7f0000000180)=0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) getsockopt$inet6_dccp_buf(r3, 0x21, 0xcc, &(0x7f0000000040)=""/113, &(0x7f00000000c0)=0x71) [ 481.617374] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 481.639253] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 12:11:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000503d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 481.694676] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 12:11:49 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r1, 0x388, 0x2) ioprio_set$pid(0x2, r1, 0x7) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) sendfile(r3, r0, &(0x7f0000000040)=0x40, 0xff4) sendfile(r0, r2, 0x0, 0x40000007f) 12:11:49 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0xcc) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000000c0)=0x2, 0x4) r2 = dup2(r0, 0xffffffffffffffff) ioctl$TIOCGSERIAL(r2, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/43}) 12:11:49 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000040)={0xf}) 12:11:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000000c0)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='pids.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) ptrace$cont(0x20, r1, 0x0, 0x0) 12:11:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000504d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 482.002930] SELinux: failed to load policy 12:11:49 executing program 4: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) dup2(r1, r0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x101, 0x521080) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000280)={0x0, 0x6}) syz_open_dev$dmmidi(0x0, 0x0, 0x193000) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000540)={0x0, 0x0, [0x0, 0x0, 0x7fffffff, 0x8b1]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)={0x80, 0x7ffffffc, 0x6, 0x6, 0x1, 0x5}) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) [ 482.025095] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:49 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000505d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:49 executing program 1: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r1, 0x388, 0x2) ioprio_set$pid(0x2, r1, 0x7) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) sendfile(r3, r0, &(0x7f0000000040)=0x40, 0xff4) sendfile(r0, r2, 0x0, 0x40000007f) [ 482.215191] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000506d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x202, 0x4000000000dc) r4 = socket(0xa, 0x1, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r6}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000300)={r6, 0x3, 0x4, [0xb44d, 0x1a, 0x100, 0x81]}, &(0x7f0000000340)=0x10) r7 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r8, 0xc0585605, &(0x7f00000003c0)={0x3, 0x0, {0x7, 0x2, 0x200c, 0x5, 0xb, 0x7, 0x2, 0x4}}) openat$cgroup_ro(r7, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x3, 0xffffff81, 0x6, 0x101, 0xf85, 0x2f6d, 0x8, {0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x80000000, 0x7fffffff, 0x7, 0x10000, 0x1000}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r6, 0x3, 0xfff, 0x7, 0x4, 0x4, 0x1, 0xffffffff, {r9, @in={{0x2, 0x4e23, @loopback}}, 0x0, 0x1, 0x80000000, 0xd2, 0x6}}, &(0x7f0000000280)=0xb0) r10 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r11 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r10, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r11}) ioctl$KVM_IOEVENTFD(r10, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, r11, 0x4}) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 482.332152] net_ratelimit: 18 callbacks suppressed [ 482.332160] protocol 88fb is buggy, dev hsr_slave_0 [ 482.336797] SELinux: failed to load policy [ 482.337226] protocol 88fb is buggy, dev hsr_slave_1 12:11:50 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:50 executing program 1: openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) r0 = socket(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x1, @remote, 'bridge0\x00\x00\xf2\xff\xff\xff\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x3) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) r3 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x0) fchdir(r3) creat(0x0, 0x0) io_setup(0x0, &(0x7f00000019c0)) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)="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", 0x1b4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x272) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0x1000) [ 482.413388] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000507d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 482.589811] device nr0 entered promiscuous mode 12:11:50 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) r3 = mq_open(&(0x7f0000000080)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x800, 0x2, &(0x7f00000000c0)={0x7ff, 0x100, 0xfffffffffffffff8, 0x7fffffff, 0xfff, 0x2, 0x5c1a, 0x2}) r4 = dup(r3) ioctl$TIOCGWINSZ(r4, 0x5413, &(0x7f0000000040)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x10, r4, 0xb6000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0x1000) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x50, r7, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r5, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x130, r7, 0x410, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x11}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2b}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1b}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8c5e}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4ec}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x28d67e31ed6acf26}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x18}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xab7c}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x40000}, 0x50) execveat(r4, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 482.714263] IPVS: Error joining to the multicast group [ 482.732085] protocol 88fb is buggy, dev hsr_slave_0 [ 482.737271] protocol 88fb is buggy, dev hsr_slave_1 [ 482.742791] audit: type=1800 audit(1574251910.414:4441): pid=14192 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=143 res=0 [ 482.807769] audit: type=1804 audit(1574251910.414:4442): pid=14192 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir427069130/syzkaller.vLLSD0/161/file0/file0" dev="loop1" ino=143 res=1 [ 482.845411] IPVS: Error joining to the multicast group [ 483.142104] protocol 88fb is buggy, dev hsr_slave_0 [ 483.147283] protocol 88fb is buggy, dev hsr_slave_1 [ 483.532124] protocol 88fb is buggy, dev hsr_slave_0 [ 483.532143] protocol 88fb is buggy, dev hsr_slave_0 [ 483.532220] protocol 88fb is buggy, dev hsr_slave_1 [ 483.537298] protocol 88fb is buggy, dev hsr_slave_1 12:11:52 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8040005}, 0xe0ab88a46b6712e7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$netlink(r3, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe, 0x8000}, 0xc) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KVM_NMI(r4, 0xae9a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xc000000000, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 12:11:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000508d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:52 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:52 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000180)={0x4, 0x0, [{0x0, 0x5, 0x0, 0x0, 0xa76, 0x7, 0x5}, {0x0, 0xcf, 0x3, 0x100, 0x30a, 0x0, 0x9}, {0x0, 0x7, 0x2, 0x0, 0x3, 0x1, 0x4}, {0x2, 0x9, 0x0, 0xffffff1a, 0x4, 0x655, 0x6}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000100)={0x0, 0x1f, 0x0, 0x0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000300)='gre0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000300)='gre0\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x80200, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000300)='gre0\x00') fchdir(r0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x1000) fcntl$setown(r4, 0x8, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10d8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)=ANY=[@ANYBLOB="7dbb614f9e3de0d52af94112722cdf24ab6a822556a5fa992bc1", @ANYRES16, @ANYBLOB="000027bd7000fddbdf250a0000001c0009000800020008000000080001000400000008000100030000000800040604000700"], 0x38}, 0x1, 0x0, 0x0, 0x809}, 0x8000) 12:11:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000003300070100000000400000e00200f400ffd38d9b0800010004001d0004000800"], 0x24}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1000) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0xc303, 0x4) [ 484.975080] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000b0000040000000006f28be1400a54842"]) 12:11:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000509d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:52 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x9) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x10001, 0x4) [ 485.047699] md: invalid raid superblock magic on mtdblock0 [ 485.098726] md: mtdblock0 does not have a valid v0.0 superblock, not importing! [ 485.151129] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 485.163212] device nr0 entered promiscuous mode [ 485.167817] md: md_import_device returned -22 12:11:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000003200050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 485.204841] md: invalid raid superblock magic on mtdblock0 [ 485.232889] md: mtdblock0 does not have a valid v0.0 superblock, not importing! 12:11:52 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000040)="568c1334f88cdbc32e226f68d90e0717a4219295ab844ecb8b8d3647e7b6922b65cc25bfdba3957f0a0188780ce2789563480e19ef4bbe3181b03da8b44e9516d15637db70a819c558c502d3f6da665d95d95e40e1898b89f8ef0075a95f52329218ef0ee882ee01bd33ebebf2d664f951f200762bb344c1bd69df633e448804b6189a821b25b52aae154db5a63e37f89d864f8294c8613a0f6b4f2c983cda92cde3774dfdbb2e36802eca828a030cc526039929b13945fa99e92ed258e06902a5fd41884d761291636e178c70661398a4261f9753d9d32a1bdc"}, 0x20) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 485.290090] md: md_import_device returned -22 12:11:53 executing program 4: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) open(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local}}, 0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) close(r1) close(0xffffffffffffffff) close(0xffffffffffffffff) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev}, 0x0, @in6=@local}}, 0xe8) close(0xffffffffffffffff) r2 = socket$inet6(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local}}, 0xe8) close(r3) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in=@dev, 0x0, 0x32}, 0x0, @in6=@local}}, 0xe8) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r6 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r6, 0x400, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f0000000180)={@remote, 0x27}) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) sendmsg$can_raw(r6, &(0x7f0000000300)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={&(0x7f0000000240)=@canfd={{0x0, 0x1, 0x1}, 0x16, 0x3, 0x0, 0x0, "337c58eef63ed8872c57e0e1d1675d06371dd2c6deac5e554abb552b6bda03ab4883f77b51d51ebeb6592059bbd1a3b8c106e56c52156fa40ef1ddd43f3d1e77"}, 0x48}, 0x1, 0x0, 0x0, 0xc}, 0x20000000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000440)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1f, {0x0, @in={{0x2, 0x0, @broadcast}}, 0x4, 0x400, 0x0, 0x4, 0x800000b}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000280)={r8, @in6={{0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7f, 0x0, 0x6, 0x9, 0x20}, &(0x7f0000000100)=0x98) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000340)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x1002, 0x0) [ 485.351371] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:53 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000180)=0x4) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x6, 0x3a21, 0x3, 'queue1\x00', 0x8a7}) 12:11:53 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000180)={0x4, 0x0, [{0x0, 0x5, 0x0, 0x0, 0xa76, 0x7, 0x5}, {0x0, 0xcf, 0x3, 0x100, 0x30a, 0x0, 0x9}, {0x0, 0x7, 0x2, 0x0, 0x3, 0x1, 0x4}, {0x2, 0x9, 0x0, 0xffffff1a, 0x4, 0x655, 0x6}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000100)={0x0, 0x1f, 0x0, 0x0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000300)='gre0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000300)='gre0\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x80200, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000300)='gre0\x00') fchdir(r0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x1000) fcntl$setown(r4, 0x8, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10d8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)=ANY=[@ANYBLOB="7dbb614f9e3de0d52af94112722cdf24ab6a822556a5fa992bc1", @ANYRES16, @ANYBLOB="000027bd7000fddbdf250a0000001c0009000800020008000000080001000400000008000100030000000800040604000700"], 0x38}, 0x1, 0x0, 0x0, 0x809}, 0x8000) 12:11:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000003200050bd25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000003200050cd25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:53 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x6) r1 = dup(r0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'lo\x00', 0x4000}) bind$isdn(r4, &(0x7f0000000080)={0x22, 0x2, 0x1, 0x3, 0x8}, 0x6) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000100)) r6 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0xfffffea6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r6, 0x369, &(0x7f0000000140)}, 0x10) [ 485.557897] md: invalid raid superblock magic on mtdblock0 [ 485.594432] md: mtdblock0 does not have a valid v0.0 superblock, not importing! 12:11:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000014}, [@ldst={0x0, 0x3, 0x0, 0x0, 0x1801}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1d}, 0x48) r0 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x2, 0x22000) sendto$isdn(r0, &(0x7f00000004c0)={0x6a9d, 0x10000, "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"}, 0x1008, 0x48c00, 0x0, 0x0) [ 485.688632] md: md_import_device returned -22 [ 485.734471] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000003200050dd25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:53 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\b\x00\x17\xe4\x93\xf4\xe4p\xa2(\t\x00\x81\xafu', 0x2) dup(r0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x480, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1b00) [ 485.804533] device nr0 entered promiscuous mode 12:11:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000000180)={0x4, 0x0, [{0x0, 0x5, 0x0, 0x0, 0xa76, 0x7, 0x5}, {0x0, 0xcf, 0x3, 0x100, 0x30a, 0x0, 0x9}, {0x0, 0x7, 0x2, 0x0, 0x3, 0x1, 0x4}, {0x2, 0x9, 0x0, 0xffffff1a, 0x4, 0x655, 0x6}]}) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000100)={0x0, 0x1f, 0x0, 0x0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000300)='gre0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000300)='gre0\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x80200, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000300)='gre0\x00') fchdir(r0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x1000) fcntl$setown(r4, 0x8, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10d8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)=ANY=[@ANYBLOB="7dbb614f9e3de0d52af94112722cdf24ab6a822556a5fa992bc1", @ANYRES16, @ANYBLOB="000027bd7000fddbdf250a0000001c0009000800020008000000080001000400000008000100030000000800040604000700"], 0x38}, 0x1, 0x0, 0x0, 0x809}, 0x8000) 12:11:53 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 485.909686] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:53 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) write$P9_RCLUNK(r1, &(0x7f0000000040)={0x7, 0x79, 0x1}, 0x7) 12:11:53 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe80000000000000a8aaaafffeaaaaaa"}, r3}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100}}}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0xc4b, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4ce]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 486.000674] md: invalid raid superblock magic on mtdblock0 12:11:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000003200050ed25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:53 executing program 3: fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:syslogd_exec_t:s0\x00', 0x24, 0x7) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/cachefiles\x00', 0x40102, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000001600)) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) r6 = timerfd_create(0x0, 0x0) r7 = dup3(r6, r5, 0x0) r8 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000040)={0x10002000}) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000001640)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}) dup3(r2, r0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)=ANY=[@ANYBLOB="f40000001a00980b27bd7000fedbdf250a140001fd06fd5c00060000c00008004dd08b9a19eb7b8f33fa6b1e27ec9a222fbd9350f76ba418aa0adfc9670de29131d8cf00e4d4761a8d724bf24e72aab79b0b3fd4ca8100470e1131178c4dd59c738033de5170c6e82d7bf6b5e88fede69b0fa8d3f3fb962cb96e3fcc0f81a3212e3473a7714ccdd2ab90530da88af50a9f74383ae5423bef6bc3ce2a8ec7d553738232ddf6347757affd976855729567dd586836cfb4f1d9b3dc1295b97ce4e3edc0ff29b810e52a6a963a2363af37d6869ca1294d0a212e5f01000008000100", @ANYRES32=0x0, @ANYBLOB="08001500010000000800150006000000"], 0xf4}, 0x1, 0x0, 0x0, 0x8000}, 0xc801) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) getpid() r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)=0x1000) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r10, &(0x7f0000000200)=ANY=[], 0xfc28) r11 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r11, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r11, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r12 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r11, r12, &(0x7f0000000240)=0x202, 0x4000000000dc) [ 486.043753] md: mtdblock0 does not have a valid v0.0 superblock, not importing! [ 486.080053] md: md_import_device returned -22 12:11:53 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) dup(r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x4a0000, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 486.145218] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000511d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:53 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:53 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, @perf_config_ext={0xfff, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000100)={{0xff, 0x80}, 0x1, 0x7, 0x9, {0x1f, 0xa3}, 0x1, 0x7}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1000) recvfrom$packet(r1, &(0x7f00000005c0)=""/64, 0x40, 0x40000100, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000005580)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@local}}, &(0x7f0000005680)=0xe8) recvfrom$packet(r2, &(0x7f0000000600)=""/118, 0x76, 0x40000021, &(0x7f00000056c0)={0x11, 0xf7, r4, 0x1, 0x6, 0x6, @random="afd2041eebf7"}, 0x14) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200c94706000000000000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7260000ffffffff2d640500009ec29129a800000065040400010000000404000001007d60b7030000000080006a0a00fe00000004850000000d000000b70000007f3bc8db482393"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300040d698cb89e40f008001fffffff00004000633277fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) mkdirat$cgroup(r0, &(0x7f0000000480)='syz1\x00', 0x1ff) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x300000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0xc010) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r6, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8882cc00}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0x3c, r7, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000098}, 0x4085) 12:11:54 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) read$rfkill(r2, &(0x7f0000000040), 0x8) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 486.291828] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000512d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 486.429873] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e0000003200052fd25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:54 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r1 = shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000100)) r4 = fcntl$getown(r3, 0x9) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$USBDEVFS_CONTROL(r5, 0xc0185500, &(0x7f00000001c0)={0x0, 0x3, 0x7fff, 0x1, 0x21, 0x8001, &(0x7f00000000c0)="a39339d814bfa6e3ad75e1ba553dc9e3c9631b23baaf6ae3283e35fb79f3874f22"}) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x4, 0x3, 0x5ba, 0x3f, r4}) setsockopt$sock_timeval(r2, 0x1, 0x76724b21dda991b3, &(0x7f0000000240)={0x77359400}, 0x10) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000880)=ANY=[@ANYBLOB="463af87bed7fe479eb5956042df94a2efa5e3340c2bab5dfd47962aab5b84bc3cf46a6307347bec2a44a0b880cf01047ece1b86f93223983ba31fde68a8ed7670a25d06a538f8aeeb433e8b1acfc9961750600e12152338fb5d3da9b03f1469085721d0de3a8e49cc2b7d476afbb239052965dc09cbab85631617053f0aae539ca3b6d539e0d7db763b6b12f25729f46787acbb1063f8b6db28cd579101f6ed3227eed24f012280e07eb78acb34873f9c765a869b9a9c9958f78b7eaecad1d51853bdb6130d9485e3034faa6aff70ca5f229fb46fddba4f0181d636700d527953f95e8bb2c014b29b431884bae4499ab3af56ea33b1da585768427ea5c4a6177405687080256163ff2975881601a918c78ccc30948e0b3aba605", @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="9e9bb768feb61a009da40ddd9b718dd1dc2c2893e10063a0c394f0f837c280a0ade869b3296400"/52], @ANYRES32=r1], 0x3) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0x1000) openat$cgroup_ro(r6, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video36\x00', 0x2, 0x0) r7 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r8, &(0x7f0000000d40)=ANY=[@ANYBLOB="ffd934aa54cdfc17009c37dfb755c6d450726f13c9f79a076b92e304fcffffffefffffff0000"], 0x26) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, 0x0, &(0x7f0000000140)) sendfile(r8, r8, &(0x7f0000000240), 0x7fff) open(&(0x7f0000000000)='./bus\x00', 0x40001, 0x15) 12:11:54 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) unshare(0x2040400) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe2$9p(&(0x7f0000000000), 0x4000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x9, 0x4) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\x0f'}) 12:11:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000552d25a80648c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:54 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) r6 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x8, 0x4001) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f0000000100)) ptrace(0x10, r7) ptrace$pokeuser(0x6, r7, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r7, 0x388, 0x2) fstat(0xffffffffffffffff, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) setresgid(0x0, r10, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0xfe, 0x1000000000000000}], 0x0, &(0x7f0000000480)={[{@gid={'gid', 0x3d, r10}}, {@errors_continue='errors=continue'}, {@errors_recover='errors=recover'}, {@case_sensitive_no='case_sensitive=no'}, {@fmask={'fmask', 0x3d, 0x1}}], [{@euid_gt={'euid>', r11}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic'}}]}) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r13) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r14, &(0x7f0000000200)=ANY=[], 0xfc28) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r15, &(0x7f0000000200)=ANY=[], 0xfc28) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r16, 0x4030582a, &(0x7f0000000040)=0x1000) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfd, 0x101}, 0xc, &(0x7f0000000b00)=[{&(0x7f0000000100)={0x18, 0x2b, 0x2, 0x70bd26, 0x25dfdbfc, "", [@typed={0x8, 0xa, @uid=r4}]}, 0x18}, {&(0x7f0000000400)={0x10, 0x33, 0x200, 0x70bd2c, 0x25dfdbfd}, 0x10}, {&(0x7f0000000140)={0x10, 0x23, 0x1, 0x70bd2d, 0x25dfdbfe}, 0x10}, {&(0x7f0000000940)={0x1c0, 0x36, 0x8, 0x70bd25, 0x25dfdbff, "", [@nested={0x1b0, 0xe, [@typed={0xdc, 0x81, @binary="8662a69bbcf6c4427d576489fc0f280a9fb1486b6844e689968c0013bd377eeb3d8eb7c198ed1bcc96aee01bfcb81bf1736159018ac74f1061a0a51a27fb12f9f957c2382b4b75569eac6d2b60867873a96535426ea5d7625f5fa350cef9e015ad543439a59fe8106a5270785cac15732c2807e4ce0aa57daa700f3ddf5537a13a8d70d1d0eb3f529ff1de06108cd8f5481d72b6b55e418884777dc2b298444901171241dbf24afc60d61306746e3f9230890d22645e7dccde38c6e6c53aad68bce3c8d5452ad30326ea16f7cf5225ff37d44eecbe28"}, @typed={0x30, 0x83, @binary="da81fec613d3c539ff4d776371ef2a1fd592c3eb621f8a63bd23b13fcfff7ae261203fa81564269b49"}, @generic="0acd19fbcf9bd2923de9d9051c913bb608cd1d73cdb7", @generic="9304a775cbeb3f984f7f27ed99520e75ad47570d00237ca4c681bfbabfd57184570daf7833ca5312e0f47efbd9f158ab23015b581fdc18a3a439f4f6", @typed={0x8, 0x27, @uid=r5}, @generic="e562690e85301f564fd9b43076877604129ea14398cae283aa6ae4b41075d65d3d409e4d515d08d25a6007a0389b6943a7f5807373e5c035cf56216ae87f92f922af482b", @generic]}]}, 0x1c0}, {&(0x7f0000000bc0)={0x210c, 0x38, 0x8, 0x70bd25, 0x25dfdbfb, "", [@generic="80ba8c047e17e4043a65f50f7de0efb8ab300d9db5d330296c41fb5a3d0b9b777bb3a8d5fd8abbc60dbfbc8fd2d30bc2e47e9a4a5948e992730146661e2efc928ad0ffc7c28164884fb7dbd04361dc65ffbbea18a2ed343074ada71fc8b0744fb2dcdc8e5a9b2ed933f9e8ead625edebbab67ae0a274ae4e70667fb3bda9d828cbaed9a53e55eeeb1f16b4b40e6980d5aef12120b4d38c59601f17eff25a9b90cc926538ecb769f34a5447030e28ac2c314f48307668a2d3eb5bb04a0e6ef8515af754d019f77e1baec09d9f429e2056e8e808b53bd9dd3b52531248f0ebd091d6a8fb7f284fb78a3777cc1f5868bc852e29838690cdfd9cb06950fc35615ee2a4dc3686ff90fb095f487ea4187c263f12c9bba316c0f2d64f36c6cb2383555df73d6196abd8378fa6391f342024d1d525e4708c9ed2d0e59910e6a6a6c9a25de8e3b66f984607119f2436571d4c85dd14b3ab80c58995374e89b62847a7d2cb901e907cdb8e5054bbd86bcad1077f73ca943dfccd02b09300ce42d0a1ec2fbb04b58515b334b29728758310ef74b1a5453f7c9008039181f0c68c7f9f4d01d055d6deba73c3493aa0b82c17126efe61128c4d240e5e3bc100facd7acd623a8d20b04b2122cf13c5d547b4d02626129c8b4eed3d56c02f0b38d6cef362e0ce253a7ae51ba9a71e2fbb926551e7c99c7183ae3bb15e544afb6f9ae0daa4888812d508deb3fc184302af4e0b9394ff43e28c0ec0ea96756758479fe7ccf67584f99a73d15bdbb12a367d44b6393f08448a2c4e5ecc7f2a6a31b155824b10501b5a1e1e046cb94f43e796a56741f5fc94894b527090b54363c70bccc0efcbc51a0597a0b72997a98ecf9d4399330937607dfb9dbc46500cb7bc95b732a9d66d7ffb27726a3a8788c9bd53bc5e14a4acaf14399f00df5d9dc726996edca13eeb063b7544063f116c8ce138cb97d0e07bb3008c3fee81a8a7f3bde748d8f5c787beb03def1aa7c03d376fbae8e5a3a0bb4df5439b91ed96d11d842c54fb7179ff4fdd4b64f42c9345ab4f22ed8adc5ce3b67c165b9a99ef36017f4fd28158ac82596903e8e72768c8479450b69def0351b5b9621e39541c9eeb2f5d609819018d519ed9e0dfdae214901518e43e296a16cc6ce1a3280c35b8ec7c898f8ca72510991a3327cd861b36b4a2a87e74dab4ccd54a83a2a49439b7ecf351e6a29ca353de386582d87020b04dc3108a71d86cf2042cce5344ceea8a7fdd06630fbcb75e9457ba5d34671e879b5df5b5eb52cda842a5df97ff080c586e63ce396304de470a97f8f00e992564ae664bcfc5faedc3c91bef21c5ccc8a6a4da6aeff3df77b247431f1dbcc90ff8fcaf955313a9fd47fa88457bece8aa70d1383dfcb9868fd07651abc9b04422496845f9af64eae52ba5941cc8f4fc2f24c79c16ae6c2a2a5db30b52f4160d5c3870a2387cea94c7abe36cf6500df586a489488e1e316b513eded569ae3f5b233064c1761131bf401429dcedc71e369b1120c9ebe6d7a10a383b06e7c7bed2b454e8a80fefe07370c1811dc86ed92cdb6632243c885919623cdfab526156a1ad7cb99c415c79369ce7366a47256d6fe587089462f756674ef0eb9f9f9fae208014c0fd22bd9c4ec4fce8c0a61929b39189b94db27700fca3e80261c3e303b85850400408357b580073d056ea6880c3dd892cba330bbf91bf08c860bba74b5d755676411e0323fc16d72f42e1dc630cd5c7b59166c8fcea177d4221fbafb67371732e25f59b115e333fe4b0f0aba90ee2e96f01b4d551a3d6ec671bd923070668bb06ff67ad7e4ca5dd5e3f4b4076beb550f658ea1071b11b855b215b11f8cd33be13443073c1d2269e332270fa9bd62d41b490157283aabf8ff17541e2f4b17b476142b676c23384c0b552628160ad08b6d4377b91488df6ca2b8505af9641f422fa83dada785c6a17f642c98cb6724098ab16fcda767bc4ed86104b27004f83769c2178a121c07d1a5dcd42c8ace4d96d914a8caf65c15e5e171be874a044ea462b61cc2752b4c97933860468783c6f454391eaaad11eacdfac36d8c2d8a0742a4c3d44a4e42b83c43496b4007635e7f5337ca42dbfdb5bab2fea9f154382947124aa46521aca92592221b9fab8c3ccdfd6fc5e58a0f0a53dd6dca0ff45ce73904fbbd17acf3f669f07563c9fefcfad0c9671ef5b8df6ffec217d5d070a85b6b1008babfeba6ff8160ea19d47f9a33e05f65141eafa51a29cefdeec213fbd1f9586ad3f795d69d664240e3d35de23d642e377f023a0ed9138cb0747788fbde679580cb465260f38d93622d513a51ce57e6b89a10c45c99b49ed60f009e8daa2a45922282d9ab68feeca74d7695d9b61a43f880750422bf9b9214494019b6038c215a1396d23d683e07be08ac1a07baa1d6a68ea2541b5f1a82485e85a0a25b928e185ee63e16e06e34af35c4631be287cbeaf349b0c331c6e63d4366220f64aa7f2553a417c84d7436bd503c8c9d50c4dbfd722474ebeb395bbe605bcb210130ce3df32dab1a1637693c14520c32258a04b83c6910b8e472f00c3fe87fc6525234eb5751358a4ce2e2f025ac014e04c6b436654a7e8d1ec3a38095053bb6a176c2aebec52482d90874ce08a952f21a68f973a83911c33563d7ffd31453c47dfdc424a256f6f46caef771748bd36450edcd1431c2516429594fb9233cee1d9daf9c29cfd63de6b67ce6b5e5b8bdf151b56356f95acd8594581630b56cb1bd8e2c2e6f6feca84c6ebae0c83c5f5afa3160cfa913381fa19a0af6581902003959ea5a045426282abcce7eaed119ecc4abd643fde6064dfa55b8df3951a5c95b534c49e3750565c8a4e793ba69de247fa64dcf17f049f03dbe2ef5f544aa30db31b37af8bff75fb1737e61cbf4e7df82256579ecd8903f95e810fac6c831ec1374ca5dd9028abbd8e527bc6b4c474bce35a59a0f2e335eeb34ffd18cf179d43a852711689b96e717b2b0e5cf1030816874aee6989448d43ee6b6763ede0cf64a3b2f64b69b453d083d25e94bb9c2114e954764e32a5b2656e33eb6dd41e5343edf70e687c41d6940f58a33598d92d7220ded14a0386f8b4810757ad577f9b49ffaaa20475e9f216aebd6a8fa14135eff11bc539d7199fb815feb7b653fc55b3951d6f18aef6599132f2d7d13b95363de813092f4152872c1df5ba48dbf6fa786eef1787680bfa1b6e932601caff78f8f759744da588928156446fbdd0a738437fbc7a7d2bed277586bb5dcfe915ea1fb8d186a099b0402aedc05b6c041958a2b14b38dc8c316b71ff41cb0308b2b5dce9b30b54122b34ded9fdb650fc17e56b078b4dafdb335fb9c5f7bad31c98e0734ff6114939d0072d2411e6f561adb6192a932dcd9b63f62fa664ff28a90ea3f2bc43fe7a12fac0e217b2d222924399863a0da22bc345fd56339d63eec795333490583a75bc2429a8814a91ad85ec9598898c08bc3756cf254508543838edafbcf08f42dd880606256cec3d67c1e67d7ccfce5e105f4689e5820576ceff11329ac171eeb235d40c9b27c6ee690409760f18e2d5a52ca430f394eb6018a367d60f94c524871c14e35461f0f73257961a51dab9406b4c700c596d0550f383c556dc598cb60bb0ade741163620df5f0a1980bd5d71cbe2fc33ecf7d5ab497ea2e6a360168b163df11111cd8c34601e65476a11ae5243a46888bf2d52395dedde5edfcfe37ccdb47a373a9cb4560f1dc0a6948e87a59d49aecc1e640b2da644dea6d96f8131fb579f5c54b0b6116bacc7cfda3e62218ea2bdb74f34937887e607ff7ce094ae950ef833b1a531b6320665d9dc86026fc32e2b96a5d390a682b08d021ce278f59101c599bd91ac6c42180851526fe7daab92dbd689f8cb81f904e2fb67d1451c90b511acf8186e734bed53551f91cfd96af30c681cf4cbfb8643327c97ede92cd92c2459b2fbec99b8983eb0d6b936ca9a700e2b9211cb7f99738d850c6ca0f31784eb28225724bba4efd878ecf9c9a464010a3e1a33ed075b7495470293c78cb31d6a2950e1b11d8640781b5492789df322370c7fa4f48dff60965d3fc486fcf8cb36e9de039c0f09042522dd9c4961a8badcefbdf5fa843f2508e05e6515273f4e89d8b9dfbf7731c09d815824a85ebe2dc3115b957bb91a1d61a4b98e4ab633bad79c914cebe3759ecc7207072e4389c96eb2f9a86004d2cbe7d829d2984ba9943558bbb6ba85083067a62db0104691f4f7f4402290d51550bbfa0e966e61eca652bdee3ccaed133c9e6836757371e0d6b368e0957b5d3be12187e578cb45958f1db4ea6686788173d8ca0623f5a66330fb4a9eba4f25d2a647fba165fc1452a07633987f4f334180f10955dbcbb0525e0ed0ab28cef3bbb522733a5de77bda380ea666e122570c65eaa45fe4696db9584e5dbd3c42cac1ed1687af1ab7ffba08058b6e709c26e5957be738f804f14868d88f56e3538f92cf5b017c6a52541255a21d05f416d9e44a3e889dbcd7e00a3c8176cf8f8a09f5d4a640e16eafbe9baf3ed4dee8c9dcd87f65cbb568e08d5a9c4296c9e38548d054fcac41ea84fcf70300a84eaefe6f2293717b67b1783595586054bcc6e360c9e7d74016aee20b9e30504ba5f633fc81dc1f953970b8fc03aa5ea1f281b552d41b3c1a49ca230980d809640d124cae63a0bbfd0ee7e88f73c025c2887a0d09290e76f5ac7e1987a728c9b9dc4b26923ddaf89a6b8840a7a62d77ff2b63004838247b58da9af75b66640b06e91a9c1ae10f0a42040937526fe6a12a9b31dda99a3fe1819249104299deb10058aad5fb62ff9eec41e6e4516fc833989d39ef3599731b8754d8ec1c763391fae77b9ff77f6a4747fa450fb7551c93bd51f3fb714d7991401c65488afe7466d15781ac10496deffad3590ca3e0d3bcbe79d376c93d6fdda48f3c64d8589186209a66f28f4df576da488a4b2cb6d4f3be9e48323e942b73cfe17cd8b8831f301a337c3d142066682f65be0da0386141ace121b04e1ae280d9248327ecb7db46efeddd652af0a18d4322780dadd2ee8b020d6e171e7a4a79e4d0a6339223a918e07842ff153990b5a3a5bdc5ab7b9f1d0adc6c213be2f9d50631d9ea2c4df8eb663cf6511484d68cb1ce4e0cd7311accec9c6577d7fc0296f0bbd04ecce18c9b8c9021a95e1c7309e8a588ef7472952850bba8cfa8a1aafb3f523dfa36f2e5fccc17ed6d31b58b7c70631f883f7b85043d23b66f5aada1de81a5e1c0e9f063c3f99e734a08d7381ef12485d202e34cd1240e9a4b6dfe5ff59f148a59c6ace65f2a2e15f95c5eb857159d942dac413020dd04edf6855ea8f6f2459bdf5d8159f1f9b2b4221688d2b4118bb95de2f4049500a9bd8533e9c6a64a9e157da95077362094abfd89cd80ae364104108188fa7210d27326357fed4dce2da67405b1d297dab10bdd39b1ebc6e09548dbc8ea84fdd5a65ca2c8fd10d1cc5288c863dbccebc2001069a317028f0e77e9d6eed7ac9adde8f149262fc1f0d67cf1578cb03b7ed9fee814da78b7ffa4d7a360c28d064f23069d2bd36d9269b667bf0f979d3c4e049ce13a0d82994466c892e4a1646ae5282f1835a55531e4570b5a7befa3868ced57bfd1506ab8e3e28bdc332fd0928e5e2b7b1ce547b8bab13b35c86be0954d2acee495ae6d9c4c3686f9dcc88fdf7ffd641e4b93cf7a40abed8ab1a4dfd22b0858a3e575f0a6f0f1375453357a151642ecae266f901a13d176d4445b575ad6ed8156cecfa1d8", @typed={0x8, 0x2a, @fd=r1}, @typed={0x1004, 0x1f, @binary="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"}, @typed={0x8, 0x25, @ipv4=@local}, @typed={0x8, 0x78, @fd}, @typed={0x40, 0x94, @binary="af756ceee0f9ea4f7df68574a2e47a13638249f1f2218d77686fcc9e6ec5619e0974563cd282e8c7af6e728aa0333378884beb88b0a448bb1937b5"}, @nested={0xa0, 0x90, [@typed={0x14, 0x53, @ipv6=@remote}, @typed={0x5c, 0x65, @binary="95f33369eef390d256185cfdffa14bfa3dd278f11c20b41e333562ef6526722cf511884a9c815b1bebe9d9a42fda2f5f20a561383e7762cfc1eff7bb48e2edb0a66576bbb248c42f5533d3ea3c1c294405800e4c4949a685"}, @typed={0x4, 0x4}, @typed={0x14, 0x50, @ipv6=@ipv4={[], [], @multicast1}}, @typed={0xc, 0x54, @u64=0x7f}, @typed={0x8, 0x4d, @fd=r6}]}]}, 0x210c}], 0x5, &(0x7f0000002d80)=[@cred={{0x1c, 0x1, 0x2, {r7, r8, r10}}}, @cred={{0x1c, 0x1, 0x2, {r0, r13}}}, @rights={{0x1c, 0x1, 0x1, [r14, 0xffffffffffffffff, r15]}}, @rights={{0x14, 0x1, 0x1, [r16]}}], 0x78, 0x8004}, 0x40401) r17 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r17, 0xae60) r18 = ioctl$KVM_CREATE_VCPU(r17, 0xae41, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000800)=@ccm_128={{}, "e3ef5e743b1c0f5e", "c29d91aeade005bc1a7504bcfd8bfbed", "207bfa5a", "994efcc98012d678"}, 0x28) ioctl$KVM_SET_USER_MEMORY_REGION(r17, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r18, 0x4090ae82, &(0x7f00000002c0)={[0xc4b, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4ce]}) ioctl$KVM_RUN(r18, 0xae80, 0x0) ioctl$KVM_RUN(r18, 0xae80, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:11:54 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = semget$private(0x0, 0x2, 0x0) r2 = getpid() ioprio_get$pid(0x2, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000040)={0x800, 0x8, 0x400}) semop(r1, &(0x7f0000000100)=[{0x1, 0x9, 0x800}], 0x1) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000100)) semctl$IPC_RMID(r1, 0x0, 0x0) r4 = dup(r0) execveat(r4, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:54 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 487.127142] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a800a8c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:54 executing program 1: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000280)='./file0\x00', 0x2) 12:11:54 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r2 = socket$unix(0x1, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) sendfile(r2, r3, &(0x7f0000000080)=0x2, 0x4aeb7438) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x1000) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0x7, 0x4d, 0x2}, 0x6) [ 487.247260] bond0: Releasing backup interface bond_slave_1 [ 487.294659] device bond_slave_1 left promiscuous mode [ 487.300766] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) write$selinux_user(r0, &(0x7f0000000040)={'system_u:object_r:systemd_logind_exec_t:s0', 0x20, 'unconfined_u\x00'}, 0x38) r1 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r2 = dup(r1) execveat(r2, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80148c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80238c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:55 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000000c0)={0x1, r0}) r3 = msgget$private(0x0, 0x480) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000040)=""/6) [ 487.660607] kvm: pic: non byte write [ 487.676070] kvm: pic: non byte write [ 487.688384] kvm: pic: non byte write [ 487.692148] net_ratelimit: 20 callbacks suppressed [ 487.692157] protocol 88fb is buggy, dev hsr_slave_0 [ 487.692641] protocol 88fb is buggy, dev hsr_slave_0 [ 487.697231] protocol 88fb is buggy, dev hsr_slave_1 [ 487.702550] protocol 88fb is buggy, dev hsr_slave_1 [ 487.725234] kvm: pic: non byte write [ 487.810097] device nr0 entered promiscuous mode 12:11:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80258c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:55 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$rxrpc(0x21, 0x2, 0xa) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f0000000040)='1\n7.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) r1 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r1) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f00000000c0)) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) io_getevents(0x0, 0x0, 0x5, &(0x7f0000001000)=[{}, {}, {}, {}, {}], &(0x7f0000000040)={0x77359400}) r2 = inotify_init1(0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) 12:11:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000080)={0x8000, 0x9, 0xaf9, {0x77359400}, 0xfffffffd, 0x4}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0x4) write$P9_RLINK(r1, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) readahead(r4, 0x3, 0x200) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'erspan0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r3, &(0x7f0000000300)="0503d51389063e0000000100c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdb8, 0x80, 0x0, 0xfffffffffffffe57) 12:11:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) recvmmsg(0xffffffffffffffff, &(0x7f0000001f40), 0x0, 0x0, 0x0) eventfd(0x0) fstat(0xffffffffffffffff, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6e217b91c3b0d873722b41afb8ed58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1bae2728316e63e58afdf284732bd1e1970881ddd3c9f310f827c195f3c5d57c67a08466517ba1300000000858003ffffffffffffffff3e26b5ca26bb434dbd0e4885c214e577bb081876e63e7c2834573925db8b54b33da7b9c7aefca1f9c49c6400000000000000000000000061e2448f23a7e49736a335440c5b7681c58dc647494f0dbc811becd7c487d283b2d0574510c4fdbb54c61ba9e635c0b3a3df610d9975d1d9570b38026b259815dba598ffa069c01b3d386c15d34a5918d6909192ec97032c320044fa934bf944d6d5ce621d91c17f1c4377a54c7febb46f83a7847a97259b8f1fca2c2816023b60417388196a22091c9f82e8e0291f4082d92d0ae76b94a18647bb44cbe9366a08fb3f0502644307c51085f7215fd44635e5967f21e8f59bd021f309d910cb5d37cb16450244ef261a37255a06c97f19fa0e68836543174745684037cc7bba99aa1cbefcdd62f799a5fb35abc5af3ab43a5fc40eb352e6ff078fad68182845f1f6b7ff6c200c103b64608404b41fce73186e55193d3d96faab587448349b35e431914bfde3c07f1419dac11995aded30b44ead7142a7b397a913f6bac2eac41c32d10863c3e6dd9e88d44842951e15d6d631995f071434"], 0x18}}], 0x1, 0x4048000) recvmmsg(r1, &(0x7f0000003180)=[{{&(0x7f0000000140)=@l2, 0x80, &(0x7f0000001c40), 0x5, &(0x7f0000001cc0)=""/125, 0x7d}, 0x7fffffff}, {{&(0x7f0000001d40)=@nfc_llcp, 0x80, &(0x7f0000003100)=[{&(0x7f0000000380)}, {&(0x7f0000000480)=""/175, 0xa8}, {&(0x7f0000001f80)=""/70, 0x46}, {&(0x7f0000002000)=""/242, 0xf2}, {&(0x7f0000002100)=""/4096, 0x1000}], 0x31e, &(0x7f00000001c0)=""/2}, 0x2}], 0x2, 0x0, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) fstat(r2, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) getegid() socket(0x2000000000000021, 0x2, 0x0) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000240)=0xc) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='gid=']) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000240)=0xc) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="67f569643d", @ANYRESHEX]) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) 12:11:55 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r0 = dup(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000040)) execveat(r0, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0x3, 0x4) 12:11:55 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a802a8c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:55 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000040)={0x7ff, 0x3, 0x4, 'queue0\x00'}) r0 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000140), 0x2) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@empty, @empty}, 0x8) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:55 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a802b8c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 488.084823] 9pnet: Could not find request transport: rdma(Äort0000000000'0(000êgÑ]:‹?ÅšÎ3˜°c:á”HrÂã=NàËú'Vº²u¿†;Ø$͸´ùcËñ9ÑjÑ"ögó‰4¤xÇQ[o¨g6VèH¿@ 12:11:55 executing program 1: sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:55 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={@remote={[], 0x1}, 0x4, 'tunl0\x00'}) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000140)="500d43c53ed477822b155e3c655967b3a9ed8e92b3a90e2198886fe503825ae8f59433f3b89facf022f5f9daab88a37f5ae1010cd782739ea8e111406bc34950061305ed159c80198abe5634537a96c255e704120f03f97256a2004a93d6152b04ede816", 0x64}, {&(0x7f00000001c0)="0edcaae6b93362e2f00520fd81f64e2b1ead53a8953d84faa6fe39e23288742cb694e34f7f8a69ff08ef43315652cfa68eb6f029518dfab53e3a06090e79db59b168e8b96415e7239da53213c47a6c0b", 0x50}, {&(0x7f0000000280)="c39259a27f3e56ed33fd7522e25a727172e7324596d6c34735b90a070f46b80b5db81271d3209c692b219ca6759a43547a49ad788d4f3116a95ad25b55763a8f1f74f9f71bbf5e6cf5605aa49e19c5bf9c", 0x51}, {&(0x7f0000000300)="93ff3ccac524737a6a03989ffba94a2831ca5a4f3b93eedfd63eaeacfdbb26165dfd83ca970e3cb959662b7398fe34", 0x2f}], 0x4) 12:11:55 executing program 3: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = fanotify_init(0x0, 0x0) fanotify_mark(r3, 0x2000000000000011, 0x2, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) pipe(0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x35e98000) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x44ee) [ 488.252141] protocol 88fb is buggy, dev hsr_slave_0 [ 488.257338] protocol 88fb is buggy, dev hsr_slave_1 [ 488.292211] device nr0 entered promiscuous mode [ 488.407780] audit: type=1800 audit(1574251916.074:4443): pid=14480 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16785 res=0 [ 488.482339] audit: type=1804 audit(1574251916.154:4444): pid=14480 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515193472/syzkaller.83htGx/42/file0" dev="sda1" ino=16785 res=1 12:11:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f0000000080), 0x72a, 0x0, 0x0) dup2(r0, r1) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x9, 0x8}, 0xc) 12:11:56 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a802d8c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:56 executing program 2: r0 = memfd_create(&(0x7f0000000280)='\bx\xcd\xfb\x06\x90?\xb1\x00\x02\x00\x00\x00\x00\x00\x00\xb1\xeb\xa3\x11\x90\x92\xff\xb1R\xce(/\xf7%\xf6\f,s:\x15\x95\x95\xbfQ\xdcQ\xb29\xde]\xf0q\xd0\xfa0%S\xd7\xb27\xffp\x80\x8eL\x05\xb5\xa9\a\x00\x13+u\t\xf3\x9f\x18\xbe\'\xd8\xb6\xd1~Q\xbe\xab:-k\xc0\x86j\xd8|\v\xaf\xf8\xd0\xb1S\xe4\x8eG\x9blq\xdf\xb17\xbc\xaa\x9e\xb6`[f\xd1CC?\x8b\x06\x8a\x06\xc6t0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000380)={{0x0, 0x0, @descriptor="6238f67f71f61b23"}}) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000180)=""/53) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(r2, &(0x7f0000003500)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75a4e0159f860e33823bf454158c4784e6f2feb4b57843535af3a818af7d7a14d0b75b54d057ef622662eeb208b33f209975e2c243166812333fc26ba2af632dc3150afd5f94459908d3a17683c08e0a1c80638e5e3e864b8946f30fd18faa16f02b2830982be94b57f97e49980adf47df042c760c0230323e7ab4db2dca67b1904737328a374de84429e4c38866a2a3dca6af12e81d32530d2eb95141ec5c5d4a1bd2dbe72ccc3950e5e0487c3a8ecdc300b433fc5f1ec9ea680da4e37ef20000ebffdcffffffffffffff000000000066717604458f7c6d85c91bdffcd93ff4c69ae7b9c1d9d98a8e233bc47016e1a6b838be34fb767b39e5797fa3da88238bfa4906ccf2607aab4850ff940f5662a2865a135dbdf31c41c040e04863324e7a484acd32f647e97d6dfca5e0ea706d59c5f12b9d447490d6b7c14aa5560697a054f43521a847188aa6c3591c1004c6acf6cabfb0579bd98f7c887f5235f57b00"/385], 0x15) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000100)=0x0) syz_open_procfs(r6, &(0x7f0000000340)='net/mcfilter\x00') r7 = socket$inet_smc(0x2b, 0x1, 0x0) recvmmsg(r7, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000000740)=""/38, 0x26}, {&(0x7f0000000780)=""/204, 0xcc}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/50, 0x32}], 0x4, &(0x7f0000001900)=""/152, 0x98}, 0x2}, {{&(0x7f00000019c0)=@ax25={{}, [@remote, @default, @null, @null, @rose, @netrom, @remote, @bcast]}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001a40)=""/165, 0xa5}, {&(0x7f0000001b00)}, {&(0x7f0000001b40)=""/231, 0xe7}, {&(0x7f0000001c40)=""/203, 0xcb}, {&(0x7f0000001d40)=""/184, 0xb8}, {&(0x7f0000001e00)=""/10, 0xa}, {&(0x7f0000001e40)=""/152, 0x98}], 0x7, &(0x7f0000001f80)=""/74, 0x4a}, 0x10001}, {{&(0x7f0000002000)=@x25={0x9, @remote}, 0x80, &(0x7f0000003280)=[{&(0x7f0000002080)=""/233, 0xe9}, {&(0x7f0000002180)=""/58, 0x3a}, {&(0x7f00000021c0)=""/159, 0x9f}, {&(0x7f0000002280)=""/4096, 0x1000}], 0x4, &(0x7f00000032c0)=""/254, 0xfe}, 0x5}], 0x3, 0x41, &(0x7f00000034c0)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$VIDIOC_S_SELECTION(r8, 0xc040565f, &(0x7f0000000280)={0x8, 0x3, 0x3, {0xfffffff9, 0x1, 0x6, 0x80000000}}) r9 = add_key$keyring(&(0x7f0000000440)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, &(0x7f0000000140)={'syz', 0x1}, r9) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f00000001c0)) keyctl$get_security(0x11, r9, &(0x7f0000000080)=""/3, 0x3) r10 = dup(r2) write$FUSE_BMAP(r10, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r10, &(0x7f00000000c0)={0x14c}, 0x137) socket$inet6_tcp(0xa, 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="7472616e733d66642c72f20d011917a0fd9fe43109093d2194e850cb43e068fd7c29ab310762a3df39da922f18dbd4041b53ac7ca0d0a256264a72feb655dc2ef3def20721c17b0707edcf5ecc04c8632db758c817797aee73366bf1a8978f6247c2e4bccd649a5e1d15f65b2757ed413a6f7c0714eb5e5e256f8cdd5df85776b47f2f150981703416c45ad195a63397c0e443a5a139a0afda365485849840b462dd97ec561ea079c7b2ec12b48c5377da33e4c4df90b4a1a8dbdd7a1bb6d6c132f3de6258c167fcaa042132705b5ec89cc9026c2408941e603617bc95b77701e935491b73", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',privport,\x00']) socket$inet6(0xa, 0x2, 0x0) [ 488.720844] audit: type=1804 audit(1574251916.154:4445): pid=14480 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir515193472/syzkaller.83htGx/42/file0" dev="sda1" ino=16785 res=1 12:11:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80308c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3810c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf52\x14M\x16q\xa6\xcd\xf5\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19M\x90\'\xd8>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ysT<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xe1\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d623455e1ffb5ea3544438cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/mls\x00', 0x0, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000200)=0x20, &(0x7f0000000340)=0x2) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRESHEX=r1, @ANYBLOB="2c63616368e1b466736361676829a600009b7f5d609f1f386a239300000000643d178ef845ad0717af338b47c27ca3dc427abfba9924ecd76e2bb6c461477adad1471e1c67", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$KVM_NMI(r4, 0xae9a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f00000003c0)='y\x00', 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x4c, 0x0, 0x0, "3535612161354c0fb81a15fda9d281b4", "a4d60b5094548af077bcabee2adf4e35466eba17e1aaac20f41178deca0e6663f5edc458c3cbe8b58dd2d47817d51c61f4bdc7d839a191"}, 0x4c, 0x2) syz_init_net_socket$llc(0x1a, 0x2, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r5 = shmget(0x1, 0x3000, 0x1, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_INFO(r5, 0xe, &(0x7f0000000400)=""/142) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 12:11:56 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000080)={0x89, @multicast1, 0x4e23, 0x1, 'lblc\x00', 0xe81724f173c5051e, 0x39b9, 0x19}, 0x2c) r3 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) ioctl$sock_inet_sctp_SIOCINQ(r4, 0x541b, &(0x7f00000000c0)) [ 488.905282] audit: type=1804 audit(1574251916.304:4446): pid=14493 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir515193472/syzkaller.83htGx/42/file0" dev="sda1" ino=16785 res=1 [ 488.972108] protocol 88fb is buggy, dev hsr_slave_0 [ 488.977270] protocol 88fb is buggy, dev hsr_slave_1 [ 489.079592] 9pnet: Insufficient options for proto=fd [ 489.127277] 9pnet: Insufficient options for proto=fd [ 489.206962] 9pnet: Insufficient options for proto=fd [ 489.215472] 9pnet: Insufficient options for proto=fd [ 489.416949] device nr0 entered promiscuous mode 12:11:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)={0x168, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_TUN_PORT={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_PORT={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x24}}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}]}, 0x168}}, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xfffffeae}], 0x3, 0x0) getcwd(&(0x7f00000000c0)=""/129, 0x81) 12:11:57 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xa8-self)-\x00', 0x2) pipe(&(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f00000000c0)={'bridge_slave_1\x00'}) r2 = dup(r0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000000000008010000e00500000002000000020000000700000000000000000200000000000000000000000000000100000004000000060000000500000096580a996a511b821f01a274bad891b3bb51118432ef28fa7e4cf5968bbe4771162cccc0097bcca1583a3dbf3e63f82f071c798595069a1b971a38875d51ab5259563d51ecef01b4f9d1dfea37f4a1f3e6effe0ddf9ee0a6f0871b58218cc0005054eae2a8916e92edc74ae2f06d4a37a5333c8079cd3e92d97607cdb0585c66f28c1f6af7071db8363f094804a34a7ae5e373e6a7ba501a5524cbada0c6fe67b689fd2e0087bf764f6f00000000000000"]) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) execveat(r2, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) accept4$alg(r4, 0x0, 0x0, 0xd43206d638cdd39f) 12:11:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80588c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:57 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0xfe2e}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r1, 0x388, 0x2) prlimit64(r1, 0x7, &(0x7f0000000000)={0x100000000, 0xce}, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89b0, &(0x7f0000000580)='ip6_vti0\x00') 12:11:57 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:57 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x900, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0xc0a, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x5, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1}, 0x20) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x23}, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) socket$inet6(0xa, 0x0, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1}, 0x20) r7 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r7, &(0x7f0000000240)=0x202, 0x4000000000dc) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)=ANY=[], 0xfc28) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r9, &(0x7f0000000200)=ANY=[], 0xfc28) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$TCGETS2(r5, 0x802c542a, &(0x7f0000000080)) shutdown(0xffffffffffffffff, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0xa23e}, 0x200020000, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x14) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, 0x7, 0x6, 0x8, 0xfff, 0x101}) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000280)='anon_inodefs\x00', 0x1090, &(0x7f00000003c0)='\xc1&\xd8\xdc-\xbb\x06\xad\x19\xea*R\x82w,\xa3H\x17Du\x8f\xe7\xacT\t}\x99\x98i\xb0{\x15\x1a%&\xa7O(\xd4\r\x9dJ\xd4\xac\x89\xbd=P\x87\xdeD\x14\x16\xac\xac\xf3\xccyGW49\xf0\x9d;\xcd\xe5\xd5\x15\xb7(8g\xc4\xcd\xc9\x81\xdf8\x80q\xa9\xccI[0\xad\xadI\xbfu5') 12:11:57 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x24) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000080)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$SIOCRSACCEPT(r3, 0x89e3) [ 489.516999] audit: type=1400 audit(1574251917.194:4447): avc: denied { getrlimit } for pid=14540 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 12:11:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80638c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:57 executing program 3: r0 = open(&(0x7f0000000000)='.\x00', 0x40080, 0x10) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20000008) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000280)='./file0/file0\x00') r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f00000002c0)='./file0/file0\x00', r2, &(0x7f0000000480)='./file0\x00', 0x0) 12:11:57 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\x11\x1c\xfc\xae\xd6\xe0h\xa8\xc47\x81\x89o$\xbc\xf3G\xd5\xde?\x9e{p\xd7w6\x06\xb3\x95\xa2Om\xd0U\xad\xb4\x05\xe45\xcd\x94\xae\xea\xf6,!\xbc\xf5?\x90\xf5pF\f\x00\x00\x00\x00\x92\\K\xb1\x91\xdb\xbc\xaex\x96\xb21cJ\xc3\xab\a\x94\x98\xc8\x02\xfcE\xc3\\\xd2\t\x80\x96B\xe7\xb1\x7f\xfdP\xc3\x17k\xb8s\xa8\xcc\xeaP\xdd\xd2L\xe3\xcc*d\xf5\xf4\xf8\x18T\xa2]\xa4\xdc\x0e\xae\xd9a\xff\xae\xed\x12F\xec@q\xe6\xf0j\xd7f\xb9\x17\x97\xbc\xddp\"Qm\x83\\\xe1\x00O0\x7f\xfaP+\x93\xb5^o(\xa1\xd3\xf6*\x86\xfa`Er\x84L]\x0eq;\x86\xfe\xbd|h\xcf\xe7\x86\b\xbc\xed\xcd\xc1\\\x06\x00!\x19M\xd3o0EtY\x85\xc8\x86!q\x83\x1f\xc6\xe1\xfb\xc51\x80\x01:\xb4\x11', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) 12:11:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80698c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 489.845158] device nr0 entered promiscuous mode 12:11:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a806c8c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 490.028129] validate_nla: 10 callbacks suppressed [ 490.028140] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 490.107646] BFS-fs: bfs_fill_super(): Inode 0x00000002 corrupted 12:11:57 executing program 1: r0 = semget(0x0, 0x6, 0x0) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f0000000000)=""/25) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x511200) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000180)=@urb_type_interrupt={0x1, {0x1, 0x1}, 0x84, 0x100, &(0x7f0000000080)="456c507dd28702d9add65ec202466faf9d654231620e2aa077a871a6bf629e1d76f0cd934541d716dcc0f880758a3743d0f1404cd6422f044ad742adef825e5346eaa4adb1c93230b25de55951886bdc4027ffc71dc58f85de2bd5506ce9d5046a2d46f01d0a241a90b911628d6642a68652", 0x72, 0x7, 0x7, 0x0, 0x4, 0x82ed, &(0x7f0000000100)="301ec274831e36b85db4b00b25f42e310d07b65d7483319656dfcf72055c4a1937ec81df2761788d75cd49573f852803f6eb862caaea96608e67149ce562bce850c8f7721dc09c65edecb732159932efde99d1193da06280b638c44c84e860f6231db619a7d8aba54bd97dc9614b875c7ed0c8ce2fea012400055a"}) r2 = dup(r1) sendmsg$nl_crypto(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)=@get={0xe8, 0x13, 0x4600d422ed0e9592, 0x70bd2b, 0x25dfdbfd, {{'sha3-512-generic\x00'}, [], [], 0x4400}, [{0x8, 0x1, 0x7}]}, 0xe8}, 0x1, 0x0, 0x0, 0x40044}, 0x8000) r3 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000380)={0x2, 0xffffffffffffffff}) ioctl$FICLONE(r3, 0x40049409, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000400)={0x0, 0x5}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000480)={0xfff, 0x7, 0xc, 0xfff, 0x8001, 0x7, 0x2, 0x6, 0x0}, &(0x7f00000004c0)=0x20) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000500)={r6, 0x2, 0x59, 0xb594, 0xff85, 0x9, 0x8001, 0x1, {r7, @in6={{0xa, 0x4e24, 0x8, @mcast2, 0x3}}, 0x7f, 0x1, 0x1, 0x22, 0x9}}, &(0x7f00000005c0)=0xb0) r8 = syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x8, 0x40) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r8, 0xc0a85322, &(0x7f0000000640)) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000700)='/dev/sequencer\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r9, 0x6611) syz_open_dev$usbfs(&(0x7f0000000740)='/dev/bus/usb/00#/00#\x00', 0x2, 0x1000) r10 = open(&(0x7f0000000780)='./file0\x00', 0x6940, 0x100) ioctl$RTC_SET_TIME(r10, 0x4024700a, &(0x7f00000007c0)={0x8, 0x25, 0x10, 0xa, 0x3, 0x10001, 0x6, 0x8a}) fsetxattr$security_evm(r10, &(0x7f0000000800)='security.evm\x00', &(0x7f0000000840)=@md5={0x1, "5c6fc62c9a32f633a80b65d4b1a8f504"}, 0x11, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) accept$netrom(0xffffffffffffffff, &(0x7f0000000880)={{0x3, @default}, [@default, @netrom, @netrom, @remote, @default, @null, @null, @netrom]}, &(0x7f0000000900)=0x48) ioctl$SIOCX25SCAUSEDIAG(0xffffffffffffffff, 0x89ec, &(0x7f0000000940)={0x20, 0x1}) r11 = syz_open_dev$dmmidi(&(0x7f0000000980)='/dev/dmmidi#\x00', 0x100000000, 0x105080) ioctl$VIDIOC_ENUMSTD(r11, 0xc0485619, &(0x7f00000009c0)={0x3, 0x200000, "8c323fffed1a3b1dc16a27b1d4d7cfb349dc14212f493d27", {0x4, 0x1ff}, 0x7}) r12 = syz_open_dev$media(&(0x7f0000000a00)='/dev/media#\x00', 0x0, 0x40000) ioctl$SCSI_IOCTL_GET_PCI(r12, 0x5387, &(0x7f0000000a40)) r13 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000a80)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$cgroup_type(r13, &(0x7f0000000ac0)='threaded\x00', 0x9) 12:11:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) accept(r2, &(0x7f0000000080)=@can, &(0x7f0000000100)=0x80) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x1c, 0x2, [@IFLA_BOND_MODE={0x8, 0x1, 0x4}, @IFLA_BOND_AD_ACTOR_SYSTEM={0xa, 0x1a, @multicast1}, @IFLA_BOND_PRIMARY={0x8}]}}}]}, 0x4c}}, 0x0) 12:11:57 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) r5 = getuid() mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000280)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x8}}, {@common=@loose='loose'}, {@sq={'sq', 0x3d, 0x9}}, {@common=@dfltgid={'dfltgid', 0x3d, r2}}, {@timeout={'timeout', 0x3d, 0x2}}, {@timeout={'timeout'}}, {@sq={'sq', 0x3d, 0x3ceb}}, {@rq={'rq', 0x3d, 0x3}}, {@rq={'rq', 0x3d, 0x5}}], [{@euid_gt={'euid>', r4}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x11}}, {@obj_user={'obj_user', 0x3d, '.GPL-[)mime_typemime_typeem1'}}, {@context={'context', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, r5}}, {@smackfsroot={'smackfsroot', 0x3d, '-'}}]}}) r6 = dup(r0) execveat(r6, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:57 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:57 executing program 4: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a806f8c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 490.348824] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80708c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:58 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) openat(r2, &(0x7f0000000080)='./file0\x00', 0x20000, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) bind$x25(r3, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='-selfproc]\x7f\x00') [ 490.406496] audit: type=1800 audit(1574251918.084:4448): pid=14608 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17074 res=0 [ 490.507225] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 490.517470] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 490.522384] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:11:58 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x105000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000240)={{0x4, 0x5, 0x7, 0xe150, '\x00', 0x5}, 0x3, 0x400, 0x7, r0, 0x1, 0x800, 'syz0\x00', &(0x7f0000000180)=['/dev/kvm\x00'], 0x9, [], [0x3, 0x13e, 0x3f, 0x100]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x3264, 0x8000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0), &(0x7f00000003c0)=0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x5, 0x0) linkat(r4, &(0x7f0000000000)='./file0\x00', r5, &(0x7f00000000c0)='./file0\x00', 0x1000) [ 490.559349] audit: type=1800 audit(1574251918.144:4449): pid=14614 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17074 res=0 12:11:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80738c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 490.674406] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80758c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)) r1 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r2 = dup(r1) execveat(r2, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x1000) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) ioctl$KVM_SET_PIT2(r3, 0x4070aea0, &(0x7f00000000c0)={[{0x7, 0x8, 0x9, 0x7f, 0x7, 0x81, 0x6, 0x0, 0x1f, 0x80, 0x0, 0x4, 0xfff}, {0x9, 0xfcf2, 0x12, 0x9, 0x7, 0xcd, 0xff, 0x9, 0x3f, 0x4, 0x2, 0x0, 0x5}, {0x6, 0x8, 0x80, 0xb2, 0x6, 0x9, 0x4, 0x3f, 0x6, 0xbe, 0x7, 0x5, 0x6ca1}], 0x4}) rmdir(&(0x7f0000000180)='./file0\x00') [ 490.726841] program syz-executor.1 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 490.771554] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 490.805759] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:58 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) r4 = accept4(r3, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f00000001c0)=0x80, 0x800) connect$caif(r4, &(0x7f0000000200)=@dgm={0x25, 0x400, 0x40}, 0x18) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000000)={0x0, 0x2710}, 0x10) sendmmsg$inet(r2, &(0x7f0000001900)=[{{0x0, 0x8dffffff, &(0x7f0000000080)=[{&(0x7f00000000c0)="02", 0x1}], 0x1}}], 0x6, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 490.864064] program syz-executor.1 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 490.887349] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 490.901709] device nr0 entered promiscuous mode [ 490.908914] device nr0 entered promiscuous mode [ 490.922264] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 490.931320] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:11:58 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000500)='\x00\x00\x03\x00\x00\x00\x00\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\xee\xba\x064\xb2\x9c\x1a\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x1f\x00\x00\x00\x00\x00\x00\x00\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17yn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93\x03\x99\xbe\x18\xe3c\x8dn\xce\x10\xfc\x97\x85).(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafDd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\xa23\xc9hP1\xdc-\'\x90\x9e}\x89\xff\x8c\xcf\xfd\xffMp\xdc\x9e\xad\x9aj\x99\xd5\xc1\x8f\xb5S\xcb\rA\xc5\xc2\x16\x95\x9f\xa8\xc8\x86\v-\xb4\xb5c\x94\xc6\xcaT\x11,6\xd9\xe3 \xdb\x82\xac\x0e~~\x15\fn\xe2X\xe3%\xc7\x04q\x87\x8d\xe6\xee\xc0\x82w\xa9rX\v\x1f9\xcc-&8\x06W\x83\xa9\xca\xa5\xba\x7f\xae\xe4\xea\x00\x00\x00\x00\x00\x00\x00\x00\xbe\x14\x93,\xe7\x80\xfc2\xb5[\x1a\fR\xe5g\xa6\xfb\x93\xbfK\xcd\xf7\xf5\xee\xa5)\xb3Un\x87\xbbT\x85K\x9bjs\xa1\x87\f\xcf\x9a\x9e`5\x19c\xd1\xcf$B\'H\f\xaf\xc0K%\x14\xa5\x86\xfc\x91\xed\xac\xdd\xa5\x06\xdd\xa4\xec|mJ\x86\xf5\xcbuM\xc1\x1dl\xbd\x86\x85\x80\x02\xdc\x97\xe6\xa9\x02\x9c\xa8\xb42\x83P\x9a\xb9\xb6D\x83\x19\xbf\xbaAWF\x05\x1fh\xd5\x04i/H7\xa9\xc6\x89\x92\xc9u\x85\x82\xc2\xaak\x1b\xfd\x9d\x96\x1ei\xc3/7\xc2&\xd3\xd6YO#7\x11~\xd3\xe3H\xca(n\xb5\x1c\x12\xce\x04M\xe8\x00') r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000080), &(0x7f0000000140)=0x4) 12:11:58 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80788c6394fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 491.113569] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 491.168731] audit: type=1400 audit(1574251918.844:4450): avc: denied { map } for pid=14651 comm="syz-executor.1" path="/dev/ashmem" dev="devtmpfs" ino=645 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 12:11:59 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:11:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x8000, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000300)=""/174) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f00000006000000c0050000d80100b5f0000000f000000000000000d8010000280500002805000028050000280500002805000006000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e2ffffffffffffff0000000218fc1dff51d0704665a45ee1061ec843585b8611ce59"], @ANYBLOB="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"], 0x620) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac41f1de628e2a3166", 0xd1, 0x24008086, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e", 0x5c, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f00000000c0)) 12:11:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c0a94fb0124fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:59 executing program 2: r0 = memfd_create(&(0x7f0000000080)='[-\x00', 0x0) r1 = dup(r0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000180)={0x51, 0x0, 0xa0d, {0x40, 0x5000}, {0x101}, @rumble={0x7ff, 0x401}}) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000140)={0x10000, 0x13bd684c, 0x5, 0xfffffff7, 0x10, 0xffffffffffffffff}) r4 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x9, 0x80000) ioctl$VIDIOC_DECODER_CMD(r4, 0xc0485660, &(0x7f00000000c0)={0x4, 0x1, @start={0x267}}) 12:11:59 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x38) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vga_arbiter\x00', 0x202200, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) r5 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000700)=0xe8) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x6, &(0x7f0000000540)=[{&(0x7f0000000140)="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", 0xfe, 0x9}, {&(0x7f0000000240)="c649694617fc40b44e369c205e197ca6242028d4bb8e1e64e771ed4c0813e4a8e10364edb24e62a6146db609e287c4fee884a20ee6bac1b85a092efd697bc6ab1ef4c78fb637ce37e8b3a7f567bd6b728cfd6cd5b7fb203a574c3dddc9b179814ae14477f94e43abf0b5a707dfdb0a653dd1fcb3b427ee553b120c9e9e51cc8e51e025a310605427f3d1af7a239a83cd95a6f1d6e1314542", 0x98, 0x6}, {&(0x7f0000000300)="51ac16350c5823f4239dfb05fea320805654f09a34905341c02d00713a0a14f01c0d79682407b6c2721c98a65e52fd8b66bf4864fe1ff337796ec4bdee9484e3dda962d8d2b37ef7ac05c60740840eb23137c104b2e9e49a53dcf2d1a22cb9c305f543fd24be856f116dfa016c92439cade0fef32fcfa9c5b53ad0f8478b7917193d438aec04f3514538bd", 0x8b, 0x5}, {&(0x7f00000003c0)="c54c2f1620047eb8e27103f205652510799bcc54b2b09dabc8712554ade2477cd4fd55297c3b8af6e7cbfc0113bc39216fb3e80e52d9e0365da1eb9d777f23a306252d472aa46925c6ca1d3191ff260eab9be321ff14948d58902404e47db2228b7be7bc21253ab5f6485c545c674bc03fc67ca3c2140f013f0fb4db", 0x7c, 0xffff}, {&(0x7f0000000440)="95247311ab331cb22036ed56848eb2e80c6c637c967420619afcad32abfbc64ab282486f2a681e2f768112d7ff5c49b780f167dbf03ee6b9497a168406a0accac90d495d6d94018f95abd57eac2d4054a21309c2779af6df539ce60e7b1948cf6cee54f97ddab5d1b9d9621fd2c052a3928de13bb79f856246d5069389be5dba2da2feb6246d311af2656452164a1f67604e9b288cda2c3d45649f1b7765fa0ed9a57eaf85af58d245a990e51a1552693189c0930729157ebae05a4a446e772db7c05223aaa9fe8120602707f4d77ca9d0b8d7dccfada5f590e8aab1ba829de2b86f9dbc56f99fcb8f9ba6e91a311e8b580dee5cecaf", 0xf6, 0x5}, {&(0x7f0000000080)="7e77c3fc6c5c3e1cd96655e94b967dc17dbd3aa286", 0x15, 0x8d69}], 0x1040000, &(0x7f0000000740)=ANY=[@ANYBLOB="646174613d6f7264657265642c726772706c76622c6c6f63636f6f6b69652c646174960c26613d77726974656261636b2c75", @ANYRESDEC=r6, @ANYBLOB=',euid>', @ANYRESDEC, @ANYBLOB=',dont_appraise,fsmagic=0x0000000000000004,\x00']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x4b}) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r8) r9 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r9, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000840)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000000940)=0xe8) setresuid(r6, r8, r10) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 12:11:59 executing program 4: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 491.651122] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:59 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r3 = dup(r2) execveat(r3, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:11:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0300fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x1000) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x78d1, 0x180}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e21, @rand_addr=0x5}}}, &(0x7f0000000080)=0x84) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000000000000000002000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) [ 491.905683] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:11:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0224fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:11:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_mr_cache\x00') r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfc28) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) sendfile(r4, r0, 0x0, 0x4) [ 491.970809] device nr0 entered promiscuous mode 12:11:59 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93t\xe4a\xa2(\t\x00\x81\xafu', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 492.059333] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 492.087905] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 492.135564] device bond0 left promiscuous mode [ 492.162679] device bond_slave_0 left promiscuous mode [ 492.181317] device bond_slave_1 left promiscuous mode [ 492.261702] device nr0 entered promiscuous mode [ 492.515663] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:12:00 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="8500e6ff2995a2f3e3c0000006912b63fe3ce4c7dce5ecfc6233d2a809aab4d2ab"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 12:12:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0824fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:00 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='pids.max\x00', 0x2, 0x0) 12:12:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c0d4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000200)=0x9266b510e2dd8a4e) socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000240)={0x7b, 0x0, [0x200, 0x8, 0x5, 0x1ff]}) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') fcntl$setlease(r0, 0x400, 0x3) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) getsockopt(r6, 0x20, 0x4, &(0x7f0000000140)=""/161, &(0x7f0000000080)=0xa1) sendfile(r4, r5, 0x0, 0x1000007ffff000) getpeername$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) syz_open_procfs(0x0, 0x0) 12:12:00 executing program 4: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb2524fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 492.734293] net_ratelimit: 21 callbacks suppressed [ 492.734416] protocol 88fb is buggy, dev hsr_slave_0 [ 492.746051] protocol 88fb is buggy, dev hsr_slave_1 12:12:00 executing program 2: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:00 executing program 1: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = syz_open_dev$adsp(&(0x7f00000005c0)='/dev/adsp#\x00', 0x100000001, 0x193c82) ioctl$SIOCAX25GETINFOOLD(r3, 0x89e9, &(0x7f00000006c0)) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = socket(0xa, 0x1, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r6, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r8}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000300)={r8, 0x3, 0x4, [0xb44d, 0x1a, 0x100, 0x81]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000000c0)={r8, 0xfffffffb, 0x1, 0x3}, &(0x7f0000000100)=0x10) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x294ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 12:12:00 executing program 3: rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x2fb, 0x0, 0xfc76}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x1a0, 0xf0ffff) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) 12:12:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb5224fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:00 executing program 2: memfd_create(&(0x7f0000000100)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x6) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) r2 = dup(r1) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000280)=""/4096) execveat(r2, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) [ 493.133226] protocol 88fb is buggy, dev hsr_slave_0 [ 493.139205] protocol 88fb is buggy, dev hsr_slave_1 [ 493.159733] device nr0 entered promiscuous mode [ 493.169298] device nr0 entered promiscuous mode 12:12:01 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) dup(r0) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x400) 12:12:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0152fc0010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x200080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x1) r0 = open(0x0, 0x40002, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') fchdir(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x4, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 12:12:01 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) lstat(&(0x7f00000000c0)='.\x00', 0x0) r3 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='g', 0x524, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4a, 0x0, &(0x7f0000000140)) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) setsockopt$sock_int(r4, 0x1, 0x9, &(0x7f00000000c0)=0x3, 0x4) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000003) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, 0x0) ptrace$cont(0x20, r5, 0x0, 0x0) getpriority(0x0, r5) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000980)={{{@in=@local, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f00000008c0)=0xe8) r6 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r6, 0x0, r7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000900)) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r8, 0x5420, 0xfffffffffffffffd) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r10 = socket$netlink(0x10, 0x3, 0x0) fsetxattr$security_capability(r10, &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [], r9}, 0x18, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) fsetxattr$security_capability(r12, 0x0, &(0x7f0000000600)=@v3={0x3000000, [], r11}, 0x18, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r15 = socket$netlink(0x10, 0x3, 0x0) fsetxattr$security_capability(r15, &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [], r14}, 0x18, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0xfffffffffffffffd) r16 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r16, 0x5420, 0xfffffffffffffffd) r17 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r19 = socket$netlink(0x10, 0x3, 0x0) fsetxattr$security_capability(r19, &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [], r18}, 0x18, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:12:01 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 493.532134] protocol 88fb is buggy, dev hsr_slave_0 [ 493.537341] protocol 88fb is buggy, dev hsr_slave_1 12:12:01 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x121003, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000080), 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0003000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0005000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 493.809761] device nr0 entered promiscuous mode 12:12:01 executing program 3: syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x0, 0x0) socket$inet6(0xa, 0x4, 0x7f) r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000800)="24000000660007031dfffd946fa2830020200a00ffffffffa61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546d", 0x46}], 0x1}, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) 12:12:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80, 0x0, 0x0, 0x0, 0x2, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) write$tun(r0, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r3 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001400)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@dev}}, &(0x7f0000001500)=0xe8) lstat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r7) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) r9 = getpid() rt_tgsigqueueinfo(r9, r9, 0x16, &(0x7f0000000100)) ptrace(0x10, r9) ptrace$pokeuser(0x6, r9, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r9, 0x388, 0x2) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)=0x1000) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000002640)={0x0, 0x0}, &(0x7f0000002680)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000026c0)={0x0, 0x0, 0x0}, &(0x7f0000002700)=0xc) r13 = openat$nullb(0xffffffffffffff9c, &(0x7f0000002740)='/dev/nullb0\x00', 0x519402, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r14, &(0x7f0000000000), 0xfffffea6) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r15, &(0x7f0000000200)=ANY=[], 0xfc28) r16 = epoll_create1(0x40000) r17 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r17, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$TIOCGSID(r17, 0x5429, &(0x7f0000002780)=0x0) r19 = geteuid() r20 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) setresgid(0x0, r21, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="29656c827cba4609a828b98243fe115ab28c7e5953e70e6663fcf7eea134245186936df45ed6a7413dee7e6b382cb3c3157b53b38d4a7df002837c7d63d48dcdb6ba6b05bd5d60ac68b4b2e1b50208b507d38ec7e566aaeb6a39cf7c0b157f7cf540c8ccb71668222278a0226812c6a73765d8a06882491a7780466401d5b0fd6500999a50ac5f57f48074b1982469ce3f4305453e17a011d2e479433f47d5509ee39fab4ee6ec08f668d8afc4c5f82c7e8aff117f49ea8a65d6520baef4436d53b701a476a3d8285a1a01c47103e88e3ba9584dfade156043c6be4caccf3a9c731c16514b528d6de3799f7fd35d93b65a6f3463e3152650f8c0f8c000ec", 0xfe, 0x1000000000000000}], 0x0, &(0x7f0000000480)={[{@gid={'gid', 0x3d, r21}}, {@errors_continue='errors=continue'}, {@errors_recover='errors=recover'}, {@case_sensitive_no='case_sensitive=no'}, {@fmask={'fmask', 0x3d, 0x1}}], [{@euid_gt={'euid>', r22}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic'}}]}) getgroups(0x3, &(0x7f00000027c0)=[r21, 0xffffffffffffffff, 0xee01]) r24 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002800)='/dev/loop-control\x00', 0x2, 0x0) r25 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r25, &(0x7f0000000200)=ANY=[], 0xfc28) r26 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r26, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000002840)={0x0, 0x6, 0x4, 0x20, {}, {0xf2943fd3c521b48a, 0xc, 0x1, 0x8, 0x6, 0x5, "ee1aea4c"}, 0x3ff, 0x1, @fd=r26, 0x4}) r28 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r28, 0x4030582a, &(0x7f0000000040)=0x1000) r29 = syz_open_dev$sndpcmc(&(0x7f00000028c0)='/dev/snd/pcmC#D#c\x00', 0x92b, 0x101000) r30 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r30, &(0x7f0000000200)=ANY=[], 0xfc28) sendmsg$netlink(r2, &(0x7f00000029c0)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002580)=[{&(0x7f00000000c0)={0xb0, 0x38, 0x800, 0x70bd2a, 0x25dfdbfc, "", [@typed={0x8, 0x75, @uid=r3}, @generic="e46acdce163420fb80a9f9ad3cccb366104ec2896d81be3e4b69380127878bb55df89de406f768002d63bc2bccb08524f25a2dbf97c788876cc82b5015aaf13f2e6d3ff1b252cbcf0fef56b9fa387c260928034cd498ec97ff31f5b7ed8b5a4be75b9eb7136545bbe08555b3d2147f6e47a001f19db8b1177b40d2a3b3045691378702059e1735eed77b91c612c9d75653096c4ed9c4ae"]}, 0xb0}, {&(0x7f0000000200)={0x11cc, 0x33, 0x1000, 0x70bd25, 0x25dfdbfd, "", [@generic="143a37d403b6ceddaee127c8097004b895780bdbcf4d36e78329387e4970a4d10bfba687ed02cdddf4641b8ca89fcbd8565c78b7bcd1f9d611ff318beaf43a3fd8f0b3f76a392d564cef86ce00a374fd7d0f", @nested={0x10, 0x6f0, [@typed={0x8, 0x72, @u32=0x7}, @typed={0x4, 0x31}]}, @nested={0x1070, 0x4, [@generic="85dcdf6e04e34c2d3f2a4a686102d4856a30f1818cdb63fb2c2db47b0387560d76118749f6a25632538528f55c4deb80a4c6476a464da5d6c80b551de3a4665abae1937ecd79c6b7000d5b0ce4c8f826ae8c2042c52f624d0fef0b4cfcb0b61f0f2dbbe0a7399fe87e6e", @generic="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"]}, @generic="38439051537f9dc97e80dda728f9e81667df9fdf003f4e3d19b9e9e036cf93b01498c1ee84e12b5b0666450c8572e31615c2cc53e94223bdb51b4dde910f943588818b543ad18f4ef009d4fc3852c90eb7a38cd8a4f95bef66307cb60225c5538dcee082c73d4394ea1531e3519ce0c56ac6fe0a3917242f6004af9eba392a5256f729ca25582d92a06372262b338c759516996deb884e7d9980234dc575c230a7d6f2f1c4b1b21c4d5163f48a6f8de2433cdc2f90370de937872d16428328ad92bdd8b47d0c22f2bd9ae8b3b82cb800ee07c62e7e04c381ecf140b788119a30f91e51e0f7d70c81a8b9"]}, 0x11cc}, {&(0x7f0000001540)={0x228, 0x15, 0x2, 0x70bd25, 0x25dfdbfc, "", [@typed={0x14, 0x53, @str='memory.events\x00'}, @nested={0x160, 0x5b, [@generic="aa317b489a1a6bb535017ef5fd13c79b3e9e16e84e9f8a0e67b47e7ad635d5f9", @generic="dcdef813aa5bf7c8741da0f32f7ba076963f5e445be7e668d2f579ef0f70614e780f9b821c8362bfd932b9e2da21645bb740b2c8abd2a0cf4f92e61601a192a18c65dbd6ec91db02d61025a45b55b862cd411a50c6a42654d6a57642a09f17a5b230cb4dcb0b616eb6dd3e02a70ece6ccda237", @generic="a05d569327992715aff2e4f62045ed6cc3f1301218cbe3d2709ff7ed8979997752735c844590bc8738a478ed8691ef17f2dad1ad71ab522cbc0f484c2592f23b3cc0f1b4c2acbdf4807022bb501bb5be7d547784a06f0212e71d0961db9180ec5639788f1c384c998acfb57c908f561f0a6c881804958b210b95d243e93b19d9b9b468b3150be54b8d66f682e817160495c73b0feca8cd9537bb9cd2265aa6a1a7e2a75f55e38480ce1f1360bede220310df50e95d588fef71a19db528556cfdba31528a4751a4c8"]}, @generic="1247190eb85712b266a7a9e2548ad4c4491bf624cb22eb960b98a630af8f8af11c312325c3dd791de45d19cf79441000a196fcca810e87340a6a0de329d50baf618c4c8a8e1a3c3e1cfeee97324fc716145725f58b26fd1c836810f4aef8c8cd898decebc0a28600d21a5b2a2972c0f3f68707b43cdd679d0254479e43f16ec2649976f6e7c5", @typed={0x14, 0x31, @ipv6=@local}, @typed={0x8, 0x41, @uid=r4}]}, 0x228}, {&(0x7f0000001780)={0x1f4, 0x2a, 0x800, 0x70bd25, 0x25dfdbfd, "", [@generic="29e586b45bc65e2c3c876f68c6c3fdd6e76a439040e27ab4a776456de078d2d742a1bc1b4e7e03c16bb93bb721dd8a6e7baf2e6652e28f43df8f94269d5580c337d2e9e83ca16418c866b3bd5cc5521b94970837ffc721d02626ca4f618d0b0b2bb06e96d46c8931c7bc209c24b37f2c", @nested={0x174, 0x7a, [@generic="622a371e2a5d6acf2532ff902ad3db2df2eb43b6d18efd0d4128c465ad10c60ae7da54911214782b7615bafb42cf25f1be43521215ab9444db05fc566db0bf10fabd443f97451c3f756c1f14", @generic="ae9e52e0450dbe321395effb2fb75787e0c876b9edcca70107360939aa3720907b19c75799c1e879c978646450a47b612fc6e6deddf61fbec52bf8f150f9b3db9147f3d57f48c5a16a26235ed9454946e84af946b0530f5ff95fc98d7b04835cf2d5fd3697dd43cbb9c1", @generic="0f563dfd24f33ab74422e4634471372d1da9d5117c3eb459168a72e2d69009379cd36438d9170267f9fd3bf65e1b8347f0f03986892e83911beb7b9accef635cfad2657248f191b03a5d9372013e910ed58d0ba0937b38ef763d0fd077ce14541afe972448e90f0fd8bd2408a5e75973f53801e23c0bff176f8b315d888fe5333f53cfc688ba0dd4219ddf9eafe9e8252c7960209c4647d25ad383383d640451", @typed={0x4, 0x38}, @typed={0x14, 0x30, @str='memory.events\x00'}]}]}, 0x1f4}, {&(0x7f0000001a40)={0x1d0, 0x23, 0x200, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x8, 0x64, @ipv4=@multicast2}, @typed={0x14, 0x74, @ipv6=@mcast1}, @nested={0x1a4, 0x87, [@generic="7682c909929216935a57cc443ef94a84cbe59746b9f2f891e9c7ad9984558b30969feb79e5f3a0ac313d092583fb11273e9cee35732343cdfe9d15d94e6340cc37409538ef6735a76601005bd4bda896e84af325c7b40e1d93267cff2cea8cfac4e3ced4ed6422313de8fcfc274927f80c18322d1c81b254810e3b2aa370c55c086d092a991b025143c9160a421ffac831f51916fbfc736ceb3c3a39150957cd8bf4182faab9c5c34bd465722fc4a3a86a3cf42e243e2ce86a497a1af969171bde400b91baee8a0bebc345748e087e1ee9db8d753242ead2", @generic="913f0a6e61801a177058002238830d7d740bc0e0e3fddb3eb8bc4060d03a64654960b45cd7b57eb4236cf01951b9c1ae3f2256", @typed={0x14, 0x89, @ipv6=@mcast1}, @typed={0x10, 0x52, @str='/dev/audio\x00'}, @generic="bf78c7a5a3b8421ab62887f0e42cc185e8a006bd51ea2466384b9c75347fba0c8ec6", @typed={0x14, 0x4f, @ipv6=@rand_addr="4c590ba59d98de9e9f776a47c2eb027b"}, @generic="10ceddc021114dd16cfc10ec7ec2769e6ff1421286992bfd89154fcf0181ba8b6c83753528df6724778cb5f91ad3a18b80c6", @typed={0x8, 0x39, @uid=r5}]}]}, 0x1d0}, {&(0x7f0000001c40)={0xd4, 0x22, 0x20, 0x70bd2b, 0x25dfdbfc, "", [@typed={0x4, 0x10}, @generic="00bf6507aecf0ecdc90209738dd82b552f1ea91d4a683f44eab921be7fcbdfd7488ef81e47022da1b8b2c0659483cfd1533a6ad97c9928dca4900288051a3b3d91ca2afec9151349fa3ca91251d64567b8b333e084ecd8784e00e2ebfc568d494525d3d7e1a965c6965ea90909dca83f9b2ceae8bcb6b2df6d08fd144e39bfa23fe987d3225fcd4e2cd3dfb46371e2d6d7e923434fdf09a4f574969bfabe676215ac41e4715775f6e01f6fa8dc7816c50e97c169", @typed={0xc, 0x92, @u64=0xec0}]}, 0xd4}, {&(0x7f0000001d40)={0x90, 0x3a, 0x902, 0x70bd2a, 0x25dfdbfe, "", [@typed={0x8, 0x42, @uid=r7}, @nested={0x78, 0x43, [@generic="7b02c1465beea61d612868801990aae7090893f2ba5c17f09f2d248a4eb5e81c75c2df4c42533391041395872b7398024f6f50286b0e8e5cc5cce18a33ae2f03bbe63eb7065ebcfa97793dc285abd7bb8cc18aa0b55381516306e8f977ef24fbf2e275c23b2f3617d67175d5b137df81906e28a8"]}]}, 0x90}, {&(0x7f0000001e00)={0x54, 0x41, 0x400, 0x70bd26, 0x25dfdbfd, "", [@nested={0x44, 0x1e, [@typed={0x14, 0x0, @str='memory.events\x00'}, @generic="902b911e0bd94e0e2d8fcfe184f9880c39872bd5992e41ac5c6b659e553e3c60b9df29cf5017a560aa"]}]}, 0x54}, {&(0x7f0000002a00)=ANY=[@ANYBLOB="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"], 0x28c}, {&(0x7f0000002140)={0x438, 0x19, 0x606, 0x70bd28, 0x25dfdbff, "", [@nested={0x34, 0x89, [@generic="01867be284c5db5afee0ea52de0fd19cb550259e537c8e619d0ec22208c748a5fb", @typed={0xc, 0x36, @u64=0xffff}]}, @generic="22e595ddb334a4a3fc0dde4f4564643658e72f040674bbaf89eceac2f9f9bc1df1a813e677a19c051d3f805f16645ada47a604bcf1eab28fff706153ce313ef0eebeefdb72b69dc6876140c08b7e0edd344d11eab34a5944ade15a593ccdba23052d001024d358242689575dd9d8afa23486bccb7dca3c5f732474", @typed={0x8, 0x85, @fd=r8}, @nested={0x164, 0x26, [@generic="b57b5526a088c23b83ec2cfd55b0ba7be714086f2b9cd62efabaafe1d615d5c50a6980642e84aae9ae72f78603d69254d1be44246efcfcd143ec65f0e5aaa406f04e91c6d8d326b12cf861015b35ba570b2f25052052f7523a6e9616ba43eaf0b92e99cecfa1e531af0c642da8381d910ce876e60f66fbd110b7b57da48fdef9d9e1e05cafdbd02b57bc4f143aa9705805068f515a0ad9bf75a8d8cf5225dcd395d9fd9377d3de53ab43f1aed62fa9ffc1e22d85f226a169889c62ba367ac4e1bc3aa3e5be2e4acfa352ceeab7c1d10a42e22fba2677c09003f192dd2baeac2cb7e57c53d5c37f306d778805a318b4c4cddf", @generic="7c13a5b54e6ea82358ed01b65a0e9e97ba5b883749f0fe272e72e18c4a78a041e5887664e9fc6d1d9a7219bcfdb0b3fd6f548263941221a51b1412d5ed745bb2e07c5c56f9e2e77ee7da8fc76cafc94269d272fcd84299a6dd565711c73621224d3a3077a7", @typed={0x8, 0x22, @ipv4=@multicast1}]}, @generic="fea99e7cab957d2637a8475c88774c1204dc92243c3968bff36fca72eaf8256b92bfea12b17e66fb3569fb13cd6cab75b0ce9914b8bf326af3b93e8a3104936fa2c0b38b50534e93fad22f11e9305d12198701058d665263533194bed566b95867c5efe8197de14c24a30d1f04b9da18a6a052393fda5234f9d8fb7a4a5bceec92f86e1de32c51c65ac14dfc2be1dd9b338528f42188478849c8300aa00241220cc9826fa5dc89fd9b9c1c014422f7c8eb4441ef00089f853bc7762df03e4f124870fde75f7f9a886094fe4569b48a6e9c84b67a3420d9a450e2b181a1360446aa06", @nested={0x128, 0x41, [@generic="1e7babb48c5750e5cac46dd00cd267eed6a9e488bd1ca4a4ccbeced450d6741703631610f8644d5e81ab53eb4212c8c0b6fcf6fcb24f8aab400ffa13c52e0f9758f4213dd5ab500296290a0125b88cdaa53fd1", @generic="fb1514f4ecc1ffe9648f52568ac2dd2e4aa20b973883b300c9e0b8d24343c9946633359e6ff460190aa4e4ccb429787ca465be0dc045fe85ed7bb395aa44fd5da24d7983c28dfede8acba565a8ab08a046ec36522e9aef9a4b90a3b4bbefdfc819a3f7b7f0870baa5d8f9229e28c9466e529db564edf57d7bfe7035142978e9710d9b7ca71907daaa5e716b50fa34b618fc58b2d47b4187a7b993f780a9f09fb3e80d7388e691dc1cf1207b217ec6055d4c6a2d0d5add0510947ebd9d733ecd6484e0cf9374f5c", @generic="2fbc325beda719"]}]}, 0x438}], 0xa, &(0x7f0000002900)=[@cred={{0x1c, 0x1, 0x2, {r9, r11, r12}}}, @rights={{0x20, 0x1, 0x1, [r13, r14, 0xffffffffffffffff, r15]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r16, r0]}}, @cred={{0x1c, 0x1, 0x2, {r18, r19, r23}}}, @rights={{0x28, 0x1, 0x1, [r24, r25, r27, r28, r29, r30]}}], 0xa8, 0x4040080}, 0x4001) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) close(r0) 12:12:01 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r1 = socket(0x1ed486006020b55f, 0x59516e5862578052, 0xff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@remote, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) sendfile(r1, r0, 0x0, 0x72439a6b) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000180)={0x7, 0x4, 0x2, 0x9, 0xe0, "bf7261e32b106c91b3d6ec9134c36a171b8b45", 0xfffffffa, 0x9}) [ 493.932121] protocol 88fb is buggy, dev hsr_slave_0 [ 493.932382] protocol 88fb is buggy, dev hsr_slave_0 [ 493.937258] protocol 88fb is buggy, dev hsr_slave_1 [ 493.947446] protocol 88fb is buggy, dev hsr_slave_1 12:12:01 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:01 executing program 2: r0 = memfd_create(&(0x7f0000000280)='&procppp0cgroup-ppp0\x00', 0x4) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0006000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:01 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2000) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000200)={0x7, [0x9, 0x9, 0xee, 0x1f, 0x3, 0x3, 0x5]}) r1 = memfd_create(&(0x7f0000000000)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x4) r2 = dup(r1) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x28800, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000280)={{0x2, 0x4e24, @loopback}, {0x306, @random="e408358107a0"}, 0x40, {0x2, 0x4e24, @broadcast}}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$RTC_AIE_ON(r4, 0x7001) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000040)=0x101) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) execveat(r5, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x400) connect$netrom(r4, &(0x7f0000000180)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 12:12:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0007000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0009000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:02 executing program 2: r0 = memfd_create(&(0x7f0000000240)='pids.events\x00', 0x1) dup(r0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x610000, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$TIOCNXCL(r2, 0x540d) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000140)='pids.events\x00\x9ft\xafZ\x1b\xcfi\xf1:N\xe9\b\xad!g\x02=J\xa3\x06\xf9o\xea\xa2\xd2\x04\xe0\x8e\xda\x80\xf2#\xa9\xab\x013Mey<\x96\x99\xcc-\vr\xde\xa9|\xcc\xc2-\xc6\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h6\xb8\x1e\x1f\xfb\xf9\xd3\xe5\xcf\xa8HUp\x90V|\x19\xdb\x15\x12\xd3sF\xcah\x19\a\xfa,7yF\xe4K\xf2\xc8\xf4\x94\x14\xed\xda\x1a\f\xe3\'0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000003940)=0xe8) r2 = getuid() setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003980)={{{@in6=@rand_addr="2a2e8d1a457f6b223b99f35cd72c5f36", @in6=@loopback, 0x4e24, 0x2, 0x4e24, 0x88f2, 0x2, 0x80, 0x20, 0x88, r1, r2}, {0x1, 0x20, 0x100000001, 0x5, 0x8, 0x3ff, 0x80, 0x3f}, {0x5, 0x1, 0x2b, 0xffffffffffffffff}, 0x3, 0x6e6bb4, 0x0, 0x1, 0x1, 0x2}, {{@in6=@mcast2, 0x4d5, 0x6346592c4393161a}, 0xa, @in=@remote, 0x0, 0x4, 0x2, 0x81, 0x0, 0x7ff, 0x42}}, 0xe8) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/cachefiles\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000003ac0)={0x1, [0x0]}, &(0x7f0000003b00)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000003b40)={r4, @in6={{0xa, 0x4e23, 0x23a4, @remote, 0xffffd8c4}}}, 0x84) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000003c00)='/dev/cachefiles\x00', 0x12c400, 0x0) getsockname$netrom(r5, &(0x7f0000003c40)={{0x3, @bcast}, [@bcast, @null, @default, @bcast, @netrom, @default, @netrom, @rose]}, &(0x7f0000003cc0)=0x48) r6 = syz_open_dev$mouse(&(0x7f0000003d00)='/dev/input/mouse#\x00', 0x4, 0x65f9519e393023cb) getpeername$packet(r6, &(0x7f0000003d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003d80)=0x14) r7 = accept$packet(0xffffffffffffffff, &(0x7f0000003dc0), &(0x7f0000003e00)=0x14) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f0000003e80)=@req={0x28, &(0x7f0000003e40)={'veth0\x00', @ifru_map={0x6, 0x8, 0x8977, 0x7, 0x1, 0x7}}}) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000003ec0)=""/118, 0x76) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$bt_hci(r8, 0x0, 0x1, &(0x7f0000003f40)=""/8, &(0x7f0000003f80)=0x8) r9 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000000a700)='/dev/sequencer2\x00', 0x559101, 0x0) ioctl$sock_rose_SIOCADDRT(r9, 0x890b, &(0x7f000000a740)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1f, @null, @netrom={'nr', 0x0}, 0x0, [@default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) ioctl$DRM_IOCTL_AGP_INFO(r9, 0x80386433, &(0x7f000000a7c0)=""/201) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f000000a8c0)='/dev/capi20\x00', 0x800, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r10, 0x40806685, &(0x7f000000aa00)={0x1, 0x2, 0x1000, 0x76, &(0x7f000000a900)="fde1fbc1fc5f2a2e3466c42b8c14889c4a3d755f19a76db0f495275fcf0bdefc4642c340b4a8d4d5e24f69d2b7acbd1ec4a86be0fbff61ad059e6190a4eed7ddd239367e41b14c39dcc5ba5d614be165f927086e0d16887bc069462a04502c688f19a9d6b3c5b837c1764570390a339b13ebb2904a7f", 0x72, 0x0, &(0x7f000000a980)="0cacb3f95e191131315957c8a302437f8b64a900f07a47675454cd5f02e6c1e23f1ffad62102b15767c8e797cbf546edd5c81a270f2c6005d75ef91b524f6231130fac864829ade98f085caee3cae699449541170b0669812dc5a1d43051ccbad92ab882d8f16d3c3f3b7722301facd11d1c"}) vmsplice(r10, &(0x7f000000ae00)=[{&(0x7f000000aa80)="093262fc58316734475ede68aa75fd6a44dc24123cd2817971491e209559d970843cadfaa787f770a6dc7d66276164a6892d6fe76e89d7d12c6801c514c7f3087fc96e9bc690ae22b50e6d0702bb6e54b5cd1a40c459f4f97073d89b194cd20d994825f6ea2e5012c76bb7152c2445650590b873b31b8929018b79930ca1b2d88e51bcade17fe9fa3d778f68c89dca44643ac17d512edf9bb95a177f2c7a2578aa2f623671ababdd03ecc0e17955d02630bef8b600967c357805e704dedf645254300a643e017fd50649e6e8a3c838af46eb1201e4930884ddb4337362480c37b9682b35d64e", 0xe6}, {&(0x7f000000ab80)="ad041c6bc065008e0e0fdbdfd5b8194bd057cd0890e1a57bf5b71ea605e92d050c750e8f8984401c0a4ab65e97d7d66683135ae26222b80934f975ab41f8f79cd516e4", 0x43}, {&(0x7f000000ac00)="003cbc94eeabe8952e1e2d72efaee3f66d5cd3bd580716d31334c01360cdbf92509f49b72858c7dff9b9cc636202369e278226556f643b57d5f4327038c6478039d1c4d4397f87798d8826855e83dd18da8c6560c452af62ccec423f2168e28402416109696b004491661e738ec976a268a6f4deaf", 0x75}, {&(0x7f000000ac80)="18", 0x1}, {&(0x7f000000acc0)="c9cc6557ea330891ad18d7a4d3e671f9d669f515396c5ac248e3692695df4fb9acbc15a1da97c4691498da156b87969365bb903a445cfae5711bf6c53add357dd676a5c7979b62681bb01eb6761d100c07022ca3a41f89e430dd912c1fe2326822c24e7eb76e961cc64b060ac08cff27c85ef2bb984fc89192df0b8067dec232f724c8fb664d4a4b057b15c326bd3da94736f5ff4e2bf53f6cdf18", 0x9b}, {&(0x7f000000ad80)="9650a30e5bb4138a963622a79cdec58120330f5fa8a69c8301461059bffc275798350ed800a1e303a7389142e5b5c81f13520592a0b805757fbf7bc076f71f69068dacbfe783a208fc4dcf4d29808e35ee0753e85ceb04ccb0fdcffa1923faa0d426764937cb5836c1", 0x69}], 0x6, 0x1) lstat(&(0x7f000000ae80)='./file0\x00', &(0x7f000000aec0)) getsockopt$TIPC_NODE_RECVQ_DEPTH(r6, 0x10f, 0x83, &(0x7f000000af40), &(0x7f000000af80)=0x4) ioctl$sock_ax25_SIOCDELRT(r3, 0x890c, &(0x7f000000afc0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0x6, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) r11 = openat$snapshot(0xffffffffffffff9c, &(0x7f000000b040)='/dev/snapshot\x00', 0xa400, 0x0) setsockopt$TIPC_GROUP_LEAVE(r11, 0x10f, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) ioctl$PPPIOCGDEBUG(r6, 0x80047441, &(0x7f000000b080)) 12:12:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc000b000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 494.748611] device nr0 entered promiscuous mode 12:12:02 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) write$capi20(r0, &(0x7f0000000040)={0x10, 0xf6, 0x84, 0x0, 0xff, 0x1ff}, 0x10) 12:12:02 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:02 executing program 4: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc000c000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:02 executing program 1: syz_emit_ethernet(0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="aac5b8000086d560d8652b00548a39b546992afd800600fe8000b67fe4eaac05c900f40250f08f000800000000000d5f0200002000aa0cd600000000000000000000000000aa000000000000a78432b6d3a9935e516a7730419ae155300c8044f1cf0155420cda471df1eb6674a08960b6a1646fc39b630a7c7f00e2e3062f4cd35d9a209688d19a5be60c82da1416bd08ebb7ddadcf668c3fc056ac922a874a9002319c4db60544b465f4", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="d000000090780000fe06e2d4c3d9fe04f9890303131302d31cc46d0a74fe461d13075be2c15b3b4bc0ca96fcedeff90c547142d13e3d202047a621547516fe0cf989908fabfe9a69b58300000000"], 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000008280)={0x0, 0x0}) socket$alg(0x26, 0x5, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) recvmmsg(0xffffffffffffffff, &(0x7f0000008000)=[{{&(0x7f00000003c0)=@ipx, 0x80, &(0x7f0000001840)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/227, 0xe3}, {&(0x7f0000001540)=""/140, 0x8c}, {&(0x7f0000001600)=""/214, 0xd6}, {&(0x7f0000001700)=""/178, 0xb2}, {&(0x7f00000017c0)=""/82, 0x52}], 0x6}, 0xc5}, {{&(0x7f00000018c0)=@nfc, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001940)=""/110, 0x6e}], 0x1, &(0x7f0000001a00)=""/17, 0x11}, 0x6}, {{&(0x7f0000001a40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001ac0)=""/127, 0x7f}], 0x1, &(0x7f0000001b80)=""/118, 0x76}, 0x8}, {{&(0x7f0000001c00)=@ethernet={0x0, @local}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001c80)=""/9, 0x9}, {&(0x7f0000001cc0)}, {&(0x7f0000001d00)=""/58, 0x3a}, {&(0x7f0000001d40)=""/211, 0xd3}, {&(0x7f0000001e40)=""/182, 0xb6}], 0x5, &(0x7f0000001f80)=""/100, 0x64}, 0x1cc49013}, {{&(0x7f0000002000)=@l2, 0x80, &(0x7f0000002500)=[{&(0x7f0000002080)=""/199, 0xc7}, {&(0x7f0000002180)=""/124, 0x7c}, {&(0x7f0000002200)=""/15, 0xf}, {&(0x7f0000002240)=""/92, 0x5c}, {&(0x7f00000022c0)=""/85, 0x55}, {&(0x7f0000002340)=""/89, 0x59}, {&(0x7f00000023c0)=""/1, 0x1}, {&(0x7f0000002400)=""/111, 0x6f}, {&(0x7f0000002480)=""/92, 0x5c}], 0x9, &(0x7f00000025c0)=""/202, 0xca}, 0x101}, {{0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f00000026c0)=""/155, 0x9b}, {&(0x7f0000002780)=""/210, 0xd2}, {&(0x7f0000002880)=""/32, 0x20}, {&(0x7f00000028c0)=""/148, 0x94}, {&(0x7f0000002980)=""/180, 0xb4}, {&(0x7f0000002a40)=""/122, 0x7a}], 0x6, &(0x7f0000002b40)=""/86, 0x56}, 0x3}, {{&(0x7f0000002bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000004f00)=[{&(0x7f0000002c40)=""/64, 0x40}, {&(0x7f0000002cc0)=""/34, 0x22}, {&(0x7f0000002d00)=""/15, 0xf}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000003d40)=""/159, 0x9f}, {&(0x7f0000003e00)=""/148, 0x94}, {&(0x7f0000003ec0)=""/64, 0x40}, {&(0x7f0000003f00)=""/4096, 0x1000}], 0x8, &(0x7f0000004f80)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000008340)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000006480)=[{&(0x7f0000006000)}, {&(0x7f0000006040)=""/220, 0xdc}, {&(0x7f0000006140)=""/207, 0xcf}, {&(0x7f0000006240)=""/99, 0x63}, {&(0x7f00000062c0)=""/168, 0xa8}, {&(0x7f0000006380)=""/243, 0xf3}], 0x6, &(0x7f0000006500)=""/34, 0x22}, 0x10000}, {{0x0, 0x0, &(0x7f0000006a80)=[{&(0x7f0000006540)=""/125, 0x7d}, {&(0x7f00000065c0)=""/68, 0x44}, {&(0x7f0000006640)=""/77, 0x4d}, {&(0x7f00000066c0)=""/48, 0x30}, {&(0x7f0000006700)=""/16, 0x10}, {&(0x7f0000006740)=""/87, 0x57}, {&(0x7f00000067c0)=""/228, 0xe4}, {&(0x7f00000068c0)=""/201, 0xc9}, {&(0x7f00000069c0)=""/12, 0xc}, {&(0x7f0000006a00)=""/110, 0x6e}], 0xa, &(0x7f0000006b40)=""/4096, 0x1000}, 0x2}, {{0x0, 0x0, &(0x7f0000007f80)=[{&(0x7f0000007b40)=""/96, 0x60}, {&(0x7f0000007bc0)=""/188, 0xbc}, {&(0x7f0000007c80)=""/175, 0xaf}, {&(0x7f0000007d40)=""/176, 0xb0}, {&(0x7f0000007e00)=""/243, 0xf3}, {&(0x7f0000007f00)=""/94, 0x5e}], 0x6}, 0xffffffff}], 0xa, 0x20, &(0x7f00000082c0)={r3, r4+10000000}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000008300)={'bond_slave_1\x00', r6}) getsockopt(r0, 0x82, 0x10000, &(0x7f0000000000)=""/166, &(0x7f00000000c0)=0xa6) 12:12:02 executing program 3: connect$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa0, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xe, &(0x7f00000001c0), 0x8) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 12:12:02 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x520, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc000d000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:02 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000003c0)=@req={0x0, 0x7, 0x1, 0x2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x280000, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8eeef2ed11a1a9b8, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000500)={0x8, 0x2}) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000140), &(0x7f0000000240)=0x4) memfd_create(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x30000000000000, 0x2000) ioctl$KVM_PPC_ALLOCATE_HTAB(r2, 0xc004aea7, &(0x7f0000000400)=0x5) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0xf, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x0, &(0x7f000039a000)}, 0x10) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000a80)=ANY=[@ANYBLOB="74000000fc0000000000000240bfbb387ddc350038e42c2ab688b422bd678cb003182161292741df7011e8863e42bbfa67a57928c657d800b309597036e1cc938d41e0aa8db67a40abc716061f95667871d79206bfdd83a18481752660087d3f0ed9ff215028855bbd4e669d72e1", @ANYRES32, @ANYBLOB="00000000ffe5ffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000007000004000000007e00000000000000000000000000000000000000000000000000000000000000000000000000ab0ae0222ec6f072f8060541bd250c31848e3bd71dc289e0128a14cf898f516397a9730b9ef23a9c41b3686d8d86743db7b5c5d1a8de997584e118747581b6903c8a60cec7d67415b9750cc1d6da762f2a032111f2cab4c4297c157f1eaf339ca682"], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="8400e9ff2c002107000000000014080000000000", @ANYRES32, @ANYBLOB="0000001608000000fc800000080001f5bb9fb4000000ad4a3332005800020014000500000000000000000000623553123d08b6cc00000000fefbef27cf8e3d49f90007cadef70995e060a95d9d8e100040000600300001000000000000000000000000000000000000000000f8fbac32c9715f9039b4659417ee364dff95062b127a045a158022e1e9ba6d0999d8f31b44af4c7a938966d5e87d55e05dae3332c116fa93f45e2ed1edb1c90000000000000072de38aa44b93acf1d92abfeff9b9f82fc7a96bd367ccf6c0b0248cc614ef3a61c970fd55d7d0cf18869d28a7e2b4a512368219f0fc8ef49e373d1e07b5dfcd14ffacb07"], 0x84}}, 0x0) sendmsg$sock(r5, &(0x7f0000000700)={&(0x7f0000000480)=@xdp={0x2c, 0x8, 0x0, 0x39}, 0x80, 0x0}, 0x4000000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000580)={{0x1f, 0x4}, 'port1\x00', 0x20, 0x10004, 0x803, 0x6, 0xff, 0x10000, 0x3, 0x0, 0x1, 0x401}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x8001, 0x2, 0x0, 0x7ff, 0x1, 0x9, 0x5d, 0x8}, &(0x7f00000002c0)=0x20) r6 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r6, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r6, &(0x7f0000000380)='./file1/file0\x00', 0x0) renameat2(r6, &(0x7f0000000000)='./file1/file0\x00', r6, &(0x7f00000001c0)='./file0\x00', 0x2) [ 495.151824] validate_nla: 10 callbacks suppressed [ 495.151836] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:02 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) write$rfkill(r1, &(0x7f0000000040)={0x0, 0x6, 0x1, 0x1, 0x1}, 0x8) dup(r0) execveat(r1, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x800) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) 12:12:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc000e000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 495.300269] device nr0 entered promiscuous mode [ 495.307594] device nr0 entered promiscuous mode 12:12:03 executing program 3: connect$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa0, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xe, &(0x7f00000001c0), 0x8) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 495.389475] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0210000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 495.557774] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:03 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:03 executing program 4: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:03 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000040)={0x6, 0x6, 0x7}) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) r6 = dup(r5) execveat(r6, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)=0x1000) r8 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x30, r8, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x3ff, @bearer=@udp='udp:syz1\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0xc00}, 0x4008000) ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000080)) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x14903000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, 0x0, 0x0, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000050}, 0x4a80afb170bc63e9) 12:12:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0310000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x280000a, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000f24000/0x1000)=nil, 0x1000, 0x0, &(0x7f00000000c0)=0x7, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000080)=""/130) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x9, 0x260020) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0x74, r2, 0x108, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x10001}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}]}, 0x74}, 0x1, 0x0, 0x0, 0x40}, 0x41050) getgid() r3 = syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x8e7, 0x40802) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x440000}, 0xfffffffffffffe37, &(0x7f00000001c0)={&(0x7f00000002c0)={0x54, r4, 0x400, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x1}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_PEER_V4={0x0, 0x8, @broadcast}, @FOU_ATTR_IFINDEX={0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x4004802}, 0xc8c1) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="4800000001800000000000000000000000000000fe346c7ea50487f282eea28312391b9df0298aa97b6b11641839c05018fb21ea2d45e5ecd290f0", @ANYRES32=r9, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="34000000240007017000"/20, @ANYRES32=r9, @ANYBLOB="0000ffff000000007cbe2217871f0cd376bc0dc25ea3c6e300000000"], 0x3}}, 0x0) sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)={0x1c, r4, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000002}, 0x20040000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) [ 496.077847] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0410000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 496.217372] selinux_nlmsg_perm: 7 callbacks suppressed [ 496.217389] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32769 sclass=netlink_route_socket pig=14935 comm=syz-executor.3 [ 496.281264] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 496.301087] device nr0 entered promiscuous mode 12:12:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0510000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 496.361357] device nr0 entered promiscuous mode [ 496.399357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32769 sclass=netlink_route_socket pig=14944 comm=syz-executor.3 [ 496.441942] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 498.039151] IPVS: ftp: loaded support on port[0] = 21 [ 498.092087] net_ratelimit: 20 callbacks suppressed [ 498.092095] protocol 88fb is buggy, dev hsr_slave_0 [ 498.097120] protocol 88fb is buggy, dev hsr_slave_1 [ 498.102228] protocol 88fb is buggy, dev hsr_slave_0 [ 498.112261] protocol 88fb is buggy, dev hsr_slave_1 [ 498.128066] chnl_net:caif_netlink_parms(): no params data found [ 498.162105] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.168742] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.176229] device bridge_slave_0 entered promiscuous mode [ 498.183994] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.190513] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.197958] device bridge_slave_1 entered promiscuous mode [ 498.212805] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 498.222116] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 498.240308] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 498.248021] team0: Port device team_slave_0 added [ 498.253953] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 498.261146] team0: Port device team_slave_1 added [ 498.267275] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 498.274950] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 498.325218] device hsr_slave_0 entered promiscuous mode [ 498.362459] device hsr_slave_1 entered promiscuous mode [ 498.403107] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 498.410344] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 498.426092] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.432542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.439135] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.445541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.479333] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 498.486318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 498.495751] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 498.505623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 498.513883] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.520738] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.528065] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 498.538486] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 498.545646] 8021q: adding VLAN 0 to HW filter on device team0 [ 498.556090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 498.564176] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.570673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.594060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 498.601919] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.608376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.617235] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 498.626033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 498.634280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 498.646593] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 498.656477] protocol 88fb is buggy, dev hsr_slave_0 [ 498.656517] protocol 88fb is buggy, dev hsr_slave_1 [ 498.667854] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 498.674029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 498.681773] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 498.691193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 498.707129] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 498.715258] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 498.724868] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 498.735431] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 498.792621] protocol 88fb is buggy, dev hsr_slave_0 [ 498.798176] protocol 88fb is buggy, dev hsr_slave_1 12:12:06 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x81}, 0x28, 0x4) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4", 0x3) r2 = getpid() perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x20000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000d00)='net/igmp\x00') r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r5, 0x5403, &(0x7f0000000100)={0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3}) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) r6 = syz_open_pts(r5, 0x4000000000000002) sendfile(r6, r4, 0x0, 0x6f0a77bd) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000140)={0xff5c, 0x1, 0x0, {0x20000000008001}}, 0x18) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x67, 0x0, 0x0) r7 = socket(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000200)={{r8, r9/1000+10000}, {0x0, 0x2710}}, &(0x7f0000000240)) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendfile(r0, r1, 0x0, 0x10000) 12:12:06 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000040)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f00000002c0)="b959080000b868cd678dba000000000f300f01b00000000048b80c000000000000000f23d80f21f835800000a00f23f866440f3881bf10f64b3966b8c3008ee8b9800000c00f3235000400000f30c443895de000480fc7284a0fc72ca9c74424009d000000c7442402cd000000ff2c24", 0x70}], 0x1, 0x8, &(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r4 = dup(r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$KVM_SET_ONE_REG(r5, 0x4010aeac, &(0x7f0000000040)={0x0, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 12:12:06 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0610000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:06 executing program 4: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 498.894938] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 498.912070] protocol 88fb is buggy, dev hsr_slave_0 [ 498.917241] protocol 88fb is buggy, dev hsr_slave_1 12:12:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0710000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0a10000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 499.114472] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='cpu.stat\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PPPIOCSMRRU(r4, 0x4004743b, &(0x7f0000000080)=0x8f1) memfd_create(&(0x7f0000000040)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) r6 = openat$cgroup_ro(r5, &(0x7f00000005c0)='Cpu\xdb\xa8\xe4\xfe?acctE\xe9\x10\xe4s r\xd1m\n\xc5\x02\xe5\xaf\xd9L\xff\xef\xdc\xd0\xbf\x8e\xcb\a\xdd\x0f\x80Jo\xff`0\x9au\xcc\xfa\xb6\x8c\xd7\xef\x8ej\x8fC\x0e\xa6\xc6\xbd\x80\x88,|pp\x06Hk\x9fm\xb4\xbad\x9cr\xf7\x16\xcc\xefw{\xb3\xe1\xea\x8d\x1b@\x106\x02\x81\xa01\xe2\x88\xb3$\xc9a\x9f\xfd4\x14{\xf5\x1a\xa4\xbbn\b\x1d\xfd\xb6\xc3\x1d_\x7f\xa3;\x18\x81E\b\x995YX\xda\xa7\xff~\x87\x00\x00\xb4B[\xc8\xbc\x88\xf4\xa0M\xf1\xbe\f}q\n\xbci\xa6\xb3j\x01\xac\xf8a\xb3\xd2\b\xd8\x0f\xde\x94\xdb\xb3v\x063IE@\x18\xfa#\xbf\x9c\x9e\x80S\xb8\xe9uy9\x82\"\x84\t\x14\x8a\xe3\xaf\xb4O\x89\t!\"\x17\x1d\xb9\xf6\xa2\xc61\xd8)\xfbC\xb9\x992\xd3Y\xca\x92o8\xcb\xfc\x89N<', 0x7a05, 0x1700) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000230012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000019c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2c0000006400010700"/20, @ANYRES32=r10, @ANYBLOB="080000e7000000"], 0x2c}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x27, r10}) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0x1000) unlink(&(0x7f0000000200)='./file0\x00') execveat(r6, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 499.228770] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 499.311501] device nr0 entered promiscuous mode 12:12:07 executing program 1: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/\x00\x00\x00\x00\x00\x00\x00\x06', 0x472082, 0x0) 12:12:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0e10000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 499.334207] device nr0 entered promiscuous mode [ 499.340874] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 499.349640] netlink: 19 bytes leftover after parsing attributes in process `syz-executor.2'. 12:12:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0f10000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 499.406562] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc4810000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:07 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x23, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz', 0x2}, &(0x7f0000000480)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xfd\n\x18T_\x06>\xb5\xb8\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q#\x90\x83w\x1e\x03Qc\xce\x17ov\xa6\xffk\xcc\xe9\xc0\xfa\xbb\xcc\x7fP\xa73\xd8\xb5z \xf3\x1a\"8\xf8\xf7\x16,K\xc9\x8f\xa7\xc2\v\xc1\xad1\xf0\xeb\xee\xbb\xea\x91\xad\x1a\\\xf0\xc6\x90/\x90\x17s\x838\xc2e\xbd\xe6\xcd\xd1\xc5\x90\xdaIqN:~\xf1t\xb7\xc8\xc3\x8c\xea\xfe\x82\xe3\x8d\x85pYl\x04\x16J\xbe\x1a,l\xd5\a\x8a\v4\x8ap1|$\xf5:i,(_E8(\x0e\x0e]J\xc5\xf1\xd7\t;w\xd1\x0f\v\x86\x00\x84\xcf\xec\xcc\xaf\x02U)\xa5\xbf\xe6\xaa\xdc\xffB\"\xec\f\xc3~A\xfc\x90\x96$\xe8\xac_\xce\x0f\xc3\x8d\a\xa6\xb4\xae\xcdl=\xaei\"\bs\x94\xfc\xa5n\xae\xf2\xa9\x01F\xa7C\xa4X\xcbm\x88 \xc5\x11z\x9c\x06\xadt\xad\x96T\x02\xc9>#\'P\x9c\xe9', 0xffffffffffffffff) ptrace(0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x2000, 0x0) 12:12:07 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000000000000000000000000000000000000000000000000000000000000280b6d7e0000000000e8d2622991e73dbb2e93756753919298cc37e0d8bdab579c7bad2121561a"], 0x7c}}, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) [ 499.761461] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 499.772213] netlink: 19 bytes leftover after parsing attributes in process `syz-executor.2'. 12:12:07 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc4c10000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:07 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x401000, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x7672dace8a1c, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000080)={0x7, 0x85, 0x0, 0x2}, 0x6) r1 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r2 = dup(r1) execveat(r2, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfc28) ftruncate(r3, 0x6af7ff46) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) 12:12:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setuid(0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x0, 0x0, @pic={0x81, 0xab, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x8, 0x3f}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0x3}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:12:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r3, 0x6628, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) 12:12:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 12:12:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc6010000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:07 executing program 2: r0 = memfd_create(&(0x7f0000000040)='.\x00', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 500.018800] device nr0 entered promiscuous mode 12:12:07 executing program 4: 12:12:07 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc6810000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:07 executing program 3: 12:12:07 executing program 4: 12:12:07 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cg\x00\x10\x00\x00\x00\x00\x00\x00/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) fcntl$addseals(r1, 0x409, 0x14) r2 = dup(r0) execveat(r2, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000080)="b5422df226e968e149e86faa912710f50eb690ebf8be6b2252e2d73135e2edb00be9712a79c4c8", 0x27) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x4e23, @multicast2}}) [ 500.250868] validate_nla: 4 callbacks suppressed [ 500.250877] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 500.288909] device nr0 entered promiscuous mode 12:12:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc6c10000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:08 executing program 1: 12:12:08 executing program 3: 12:12:08 executing program 4: 12:12:08 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:08 executing program 2: r0 = memfd_create(&(0x7f0000000140)='systemeth1/{bdev\x00', 0x3) r1 = dup(r0) membarrier(0x8, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 12:12:08 executing program 3: [ 500.486148] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:08 executing program 4: 12:12:08 executing program 1: 12:12:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc7410000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 500.625407] device nr0 entered promiscuous mode 12:12:08 executing program 3: 12:12:08 executing program 4: 12:12:08 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f0000000040)=[0x2], 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) 12:12:08 executing program 1: [ 500.749038] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:08 executing program 3: 12:12:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc7a10000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:08 executing program 4: 12:12:08 executing program 1: 12:12:08 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x16, r3, 0xfffffffffffffffd) r4 = add_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="4efa58152888d429c6d3092cb6beb909e57902b657aa0cf991eaf01dd2190d55fa4e1e2f11efbc3a0c6c62d2e378a572a87cecf288be1992a9677b0dc2d99a7039af94a05ae2d797377329ec2610f5ca53a6b07403ecd9133050", 0x5a, r3) close(r1) keyctl$link(0x8, r2, r4) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 500.968355] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:08 executing program 3: 12:12:08 executing program 1: 12:12:08 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) recvfrom(r0, &(0x7f0000000080)=""/238, 0xee, 0x100, &(0x7f0000000180)=@nfc_llcp={0x27, 0x0, 0x0, 0x2, 0x7f, 0x6, "4e1ec7d0a821d7355dd4f1902fd742306b8f4db2044a39ed3dcd719fb9314d7c6d396621964ce5e88ed815e288c3d218214586c1a083b805fe3b0bb60fa35d", 0x25}, 0x80) r1 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r2 = dup(r1) execveat(r2, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0011000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:08 executing program 4: 12:12:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:08 executing program 3: 12:12:08 executing program 4: [ 501.258855] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:09 executing program 1: 12:12:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0012000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:09 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x462400, 0x0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:09 executing program 3: [ 501.448321] device nr0 entered promiscuous mode 12:12:09 executing program 4: 12:12:09 executing program 1: [ 501.475395] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc002f000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:09 executing program 4: 12:12:09 executing program 3: 12:12:09 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:09 executing program 1: [ 501.669439] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0052000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:09 executing program 3: 12:12:09 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000040)=0x401) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:09 executing program 1: [ 501.847761] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:09 executing program 4: 12:12:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc6558000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:09 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r2, &(0x7f0000000380)="c2", 0x1) sendfile(r1, r2, &(0x7f0000000240), 0x9) fcntl$addseals(r2, 0x409, 0x8) [ 501.962939] device nr0 entered promiscuous mode 12:12:09 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000100100000b000000770000f200000000"], 0x18}}], 0x1, 0x0) 12:12:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet6(0xa, 0x0, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 502.066138] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 502.074354] [ 502.076423] ============================= [ 502.080586] WARNING: suspicious RCU usage [ 502.084754] 4.19.84 #0 Not tainted [ 502.088312] ----------------------------- [ 502.092478] include/linux/radix-tree.h:241 suspicious rcu_dereference_check() usage! [ 502.100389] [ 502.100389] other info that might help us debug this: [ 502.100389] [ 502.108569] [ 502.108569] rcu_scheduler_active = 2, debug_locks = 1 [ 502.115373] 2 locks held by syz-executor.3/15195: [ 502.120228] #0: 0000000013df6f7c (&sb->s_type->i_mutex_key#12){+.+.}, at: memfd_fcntl+0x235/0x1750 [ 502.129473] #1: 00000000d2396063 (&(&(&mapping->i_pages)->xa_lock)->rlock){-.-.}, at: memfd_fcntl+0x4bc/0x1750 [ 502.139746] [ 502.139746] stack backtrace: [ 502.144255] CPU: 1 PID: 15195 Comm: syz-executor.3 Not tainted 4.19.84 #0 [ 502.151259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 502.160608] Call Trace: [ 502.163204] dump_stack+0x197/0x210 [ 502.166921] lockdep_rcu_suspicious+0x153/0x15d [ 502.171850] memfd_fcntl+0xfdf/0x1750 [ 502.175655] ? __fget+0x340/0x540 [ 502.179196] ? find_held_lock+0x35/0x130 [ 502.183257] ? __fget+0x340/0x540 [ 502.186770] ? memfd_file_seals_ptr+0x160/0x160 [ 502.191528] ? lock_downgrade+0x880/0x880 [ 502.195947] ? kasan_check_read+0x11/0x20 [ 502.200108] do_fcntl+0x200/0x1020 [ 502.203782] ? f_getown+0xc0/0xc0 [ 502.207405] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 502.213074] ? selinux_file_fcntl+0x74/0x140 [ 502.217596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 502.223138] ? security_file_fcntl+0x8d/0xc0 [ 502.227550] __x64_sys_fcntl+0x16d/0x1e0 [ 502.231616] do_syscall_64+0xfd/0x620 [ 502.235420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 502.240693] RIP: 0033:0x45a639 [ 502.243883] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:12:10 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0x101000) r4 = openat$cgroup_ro(r3, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) bind$bt_l2cap(r2, &(0x7f0000000040)={0x1f, 0x0, {0x2, 0x3, 0x8, 0xe0, 0xff, 0x2}, 0xcfce, 0xfc}, 0xe) execveat(r1, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x1000) ioctl$SIOCRSSCAUSE(r4, 0x89e1, &(0x7f0000000000)=0x1) [ 502.262815] RSP: 002b:00007f4cccc19c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 502.270527] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 502.277820] RDX: 0000000000000008 RSI: 0000000000000409 RDI: 0000000000000004 [ 502.285175] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 502.292540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4cccc1a6d4 [ 502.299858] R13: 00000000004c1068 R14: 00000000004d3c60 R15: 00000000ffffffff 12:12:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0002000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:10 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000080)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x38) ioctl$UI_DEV_CREATE(r0, 0x5501) 12:12:10 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:10 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sysfs$3(0x3) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) write$selinux_attr(r2, &(0x7f0000000040)='system_u:object_r:hostname_exec_t:s0\x00', 0x25) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) prctl$PR_SET_DUMPABLE(0x4, 0x3) 12:12:10 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') [ 502.509637] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 502.541716] input: syz1 as /devices/virtual/input/input8 12:12:10 executing program 3: set_mempolicy(0x2, &(0x7f0000000140)=0x230d, 0x3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x500, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000200), 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = open(&(0x7f0000000080)='./file1\x00', 0x100, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x7045799432a6bbef, 0x0) write$P9_RWALK(r1, &(0x7f00000000c0)={0x23, 0x6f, 0x2, {0x2, [{0x8, 0x3, 0x1}, {0x8, 0x4, 0x3}]}}, 0x23) 12:12:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0003000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:10 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x0, 0x602001) set_robust_list(&(0x7f0000000280)={0x0, 0x9671, &(0x7f0000000200)}, 0x18) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video1\x00', 0x2, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video2\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x50) r3 = dup(r0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r5, 0xc05c5340, &(0x7f0000000640)={0x9, 0x9, 0x0, {0x77359400}, 0x9, 0x7ff}) setsockopt$netlink_NETLINK_PKTINFO(r4, 0x10e, 0x3, &(0x7f00000000c0)=0x687b, 0x4) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r6, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, r7, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000340)="1dd3a59712852e0ebe8cdb0e352d64f0faaabeb71be3f6ac0409e8f7d84a22a553f4b4441427770b1321bc51dd84466e6644119caddb1c66e4ab02ad12c0341de409fbd7bb92dc690529b4c9957dc46c69d3665d7cf5080ced4f47e4794482ef708e9e72e4f2559e445d8355056ef1735d178c51f1d2172107a80e6d7bc3a7e45ad0807d36254799ac42a935006fea6e0d9c6fb6e332bfbb802858a92ed3dd708e357815b89b42e932c4fbd5c61fadd027fac8401bcad03401e80272c349353804b6987f31f8af89b21076ea15e3144c4878febc32991d2cb6a5e74e7020e7b7d462", 0xe2, r4}, 0x68) ioctl$sock_ifreq(r3, 0xcd8a, &(0x7f00000002c0)={'veth1\x00', @ifru_flags=0x1000}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$inet_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f00000006c0)=0xfffffffffffffffe, 0xffffffffffffff41) 12:12:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x1c, 0x2f, 0x3ff, 0x0, 0x0, {0xa}, [@typed={0x8, 0x3, @uid}]}, 0x1c}}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) 12:12:10 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020300021b000000020000000000000005000600008000000a00f50000000001800000007f6699001d00000000d6dbb905d1f86beb0000000d000800e0020000b89cc4b2bd01a12ba71996d8ee000000809ac1ec3d95c9a0af6fa7fe174e404721f755b088c2a085d650b02eed23a894e391798e4fd4959ba9b5a7b0588736a57525a30d463ea43084adbe40039649673b73383b717e127c6a36da871a86cc8c8dda850000000002000100000000000000060080ffffff05000500000000000a000000de7af7bd3e10c05ce0099eb0f8374525b1f361d6c7358f00002000fe04654184a88aa49a679449f6d3385443608204fd2f0a8e7f36b51b8c111a11526cc92a34da97348aa1e55e86429a374167641de7060933bfc02befaf8fd06658ea9c382b5cacba6d7e1a8c9e627a6c5d885d96d8c456caa29fa7592fbd3e93872452834345b9138bd1e1ce35e8634023f06a625c651fa3c9e7840cd45f500b8d475d9e1f4a44f035848a8345330609d7a6b882b9abcb07e08dc4c81289a3e6dc9c6274769e51f79512b3628b00f3f903f5ce0dd00192aa31aef1a418d93d47123fae14a368b81069de22c692d1aaad9e46f06dd074665fe032dad38def1bc9f01b656fe7a4feceea9216fd5808f4a6ba1f46acb154d50bab14a60bec1d9d578c8ee1d1dc6f10bdf1a0dd31015a814f8a39d8a90aef3700000000000000"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) 12:12:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0004000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 502.837626] device nr0 entered promiscuous mode 12:12:10 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) pread64(r2, &(0x7f0000000440)=""/68, 0x44, 0xa7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x6, 0x5, 0x59d7, 0x977, 0x7ff, 0x1, 0xfffffffe, {r3, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}}}, 0x6, 0xc0000000, 0x0, 0x1a4, 0x8000}}, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={r3, 0xe18}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={r3, 0x0, 0x20, 0xffffffffffffffff, 0x1}, &(0x7f0000000140)=0x18) r4 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r4, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r5, 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, &(0x7f0000000400)) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f00000001c0)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket(0x2, 0x803, 0xff) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) sendfile(r7, r0, 0x0, 0x72439a6b) 12:12:10 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:10 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000100)={@random="8d40420d297d", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '1&h', 0x44, 0x2f, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, @local, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {}, {}, {}, {0x8, 0x22eb, 0x0, {{}, 0x2, 0x0, 0x1, 0x3}}}}}}}}, 0x0) keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x103000a0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="98000000", @ANYRES16=r0, @ANYBLOB="00022dbd7000fcdbdf250d0000004400030008000100070000001400020076657468305f746f5f626f6e6400000014000600000000000000000000000000000000010800040008000000080001000100000040000300080008004000000014000600ff0100000000000000000000000000010800080088000100080003000300000008000500ac1e0001080005000000001c"], 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x40100) 12:12:10 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x200000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x1000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r3, 0xbc9, 0x6, 0x45f, 0x4e, 0x20b9}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x6, 0x200) getsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x6}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f000060d000)=[{{0x0, 0x0, &(0x7f0000c38ff0)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1}}], 0x1, 0x8000) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f000081e000)={0x0, 0x2, 0x80000000000000d5, [0x0]}, 0x2de) 12:12:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0005000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:10 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x101000, 0x0) r3 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/arp\x00') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r7}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000300)={r7, 0x3, 0x4, [0xb44d, 0x1a, 0x100, 0x81]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r7, 0x5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000180)={r8, @in={{0x2, 0x4e20, @multicast1}}}, 0x84) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r9 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x2, 0x120958229f9b0e1e) openat$cgroup_ro(r9, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r9, 0xc040565e, &(0x7f0000000040)={0x5, 0x102, 0x2, {0x4, 0x7fffffff, 0x5, 0x1}}) 12:12:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0006000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 503.133560] net_ratelimit: 30 callbacks suppressed [ 503.133587] protocol 88fb is buggy, dev hsr_slave_0 [ 503.145190] protocol 88fb is buggy, dev hsr_slave_1 [ 503.293064] protocol 88fb is buggy, dev hsr_slave_0 [ 503.299227] protocol 88fb is buggy, dev hsr_slave_1 12:12:11 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x14, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="05630440000002000663044000eb0000126300006eca6599ea2e2c76074ec7e3be66fe5a76e3c41557be0ef01bd915dbf8a8316e9ff1fbd95747ecf78b7a2bfca443f97d8e4320871117c7287ed807ccf011"], 0x0, 0x8126000, 0x0}) 12:12:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0007000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:11 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000080)={0x0, 0x8a4, 0x50000000000, &(0x7f0000000040)=0x2}) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 503.386321] device nr0 entered promiscuous mode 12:12:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x24a40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000040)={0x7a, "cc794ab45905018c5122ee1c0f35daba72425b8581e9fef28f80840353206d4c", 0xe7a5c02e4a5a4299, 0x1}) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f0000000080)="f7", 0xfffffffffffffe75}], 0x1, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x5, 0x4, 0x4, 0x2000, &(0x7f000071f000/0x2000)=nil}) [ 503.501091] audit: type=1400 audit(1574251931.174:4451): avc: denied { set_context_mgr } for pid=15309 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 503.506110] binder: 15309:15311 unknown command 25362 [ 503.532074] protocol 88fb is buggy, dev hsr_slave_0 [ 503.537199] protocol 88fb is buggy, dev hsr_slave_1 12:12:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0008000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 503.592746] binder: 15309:15311 ioctl c0306201 20000080 returned -22 12:12:11 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000200)=0x6, 0x4) ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={'bridge_slave_1\x00', 0x5, 0x401}) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 12:12:11 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:11 executing program 2: getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000140)={'nat\x00', 0x0, 0x4, 0xbb, [], 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000080)=""/187}, &(0x7f00000001c0)=0x78) r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000280)) 12:12:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000002c0)={{}, 'ryz\x0f\x00\x00\x00\x00\x00\x80 17\b\xf8\xd6#\x00\x00\x00\x00\n\x00q\b\x94%\xef\xff\xe7\x00\x00\x00\x00\x00\x00\x00\xe4\xff\xff\x00\x00\x00\x00\x00\xb13@\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e20, 0x7f, @mcast1, 0x9}}}, &(0x7f0000000280)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000400)={r6, 0x6}, &(0x7f0000000440)=0x8) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x1000) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x2) sysfs$2(0x2, 0x2, &(0x7f0000000000)=""/130) 12:12:11 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x299}], 0x1, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffff9, r3, 0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x7f, 0x78a48b825aa4afba) ioctl$KVM_RUN(r4, 0xae80, 0x0) 12:12:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0009000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:11 executing program 2: r0 = memfd_create(&(0x7f0000000180)='*security@selinuxselinux($\x00', 0x7) r1 = dup(r0) clock_gettime(0x7, &(0x7f0000000040)) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:11 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000200)=0x6, 0x4) ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={'bridge_slave_1\x00', 0x5, 0x401}) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) [ 503.904330] input: ryz as /devices/virtual/input/input10 [ 503.932112] protocol 88fb is buggy, dev hsr_slave_0 [ 503.937277] protocol 88fb is buggy, dev hsr_slave_1 [ 503.969495] device nr0 entered promiscuous mode 12:12:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc000a000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:11 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0x6) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000040)) dup(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) execveat(r3, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x100) 12:12:11 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 504.223597] *** Guest State *** 12:12:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/pt\x05\x00', 0x0, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x786000) mq_notify(r1, &(0x7f0000000080)={0x0, 0x3e, 0x2, @thr={&(0x7f0000000340)="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", &(0x7f0000000140)="b640666062e7ec45e4038d253da85193a173a99f725b94720effb5770cea36e998a686612d4c42ca3b28b8b2d1a700022b659010fb69416edb85e758d31a77e11285e1de"}}) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f00000013c0), &(0x7f0000001400)=0xc) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000001380)={0xfa3, 0x8}) r4 = syz_open_pts(r0, 0x0) init_module(&(0x7f00000014c0)='/dev/admmidi#\x00', 0xe, &(0x7f0000001500)='%#mime_type\x00') ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000200)=0x2) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000001440), &(0x7f0000001480)=0x8) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1b) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0xfc28) write$P9_RLCREATE(r5, &(0x7f00000001c0)={0x18, 0xf, 0x2, {{0xa0, 0x0, 0x4}, 0x6}}, 0x18) setsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000001340)=0xdd, 0x4) semctl$IPC_INFO(0xffffffffffffffff, 0x3, 0x3, &(0x7f0000000240)=""/242) dup3(r4, r0, 0x0) [ 504.245335] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 504.260256] device nr0 entered promiscuous mode 12:12:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc000b000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:12 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000200)=0x6, 0x4) ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={'bridge_slave_1\x00', 0x5, 0x401}) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) [ 504.298408] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 504.332086] protocol 88fb is buggy, dev hsr_slave_0 [ 504.332140] protocol 88fb is buggy, dev hsr_slave_1 [ 504.391197] CR3 = 0x0000000000000000 [ 504.410251] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 12:12:12 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x3, 0x2000) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000140)={0x6, r0}) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r3}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0)={0x9, 0x4a, 0x2, 0x2, 0x5, 0x1, 0x80000000, 0x1f, r3}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={r3, 0x38, "34e1ff49fe05b970b9e7a63752de4fdd341e840c3de043bce9b3156f1dd3bf051d6b3bd2d3314bd9e4e69733019b0fd02d89c102d44bbbea"}, &(0x7f0000000200)=0x40) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000300)={r4, 0x7}, &(0x7f0000000340)=0x8) r5 = socket$unix(0x1, 0x0, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0xfffffea6) bind$x25(r7, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000280)) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 12:12:12 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 504.448615] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 504.501852] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 504.567481] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 504.607081] device nr0 entered promiscuous mode [ 504.629098] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 504.640217] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 504.649410] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 504.666774] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 504.695907] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 504.710340] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 504.725214] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 504.737247] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 504.750716] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 504.761620] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 504.765666] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 504.771718] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 504.788684] Interruptibility = 00000000 ActivityState = 00000000 [ 504.795145] *** Host State *** [ 504.798493] RIP = 0xffffffff811ced13 RSP = 0xffff8880459578c0 [ 504.805326] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 504.812099] FSBase=00007f4cccbf9700 GSBase=ffff8880ae800000 TRBase=fffffe0000034000 [ 504.826929] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 504.841966] CR0=0000000080050033 CR3=00000000547c4000 CR4=00000000001426f0 [ 504.849974] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87001400 [ 504.863142] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 504.870412] *** Control State *** [ 504.878366] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ea [ 504.887178] EntryControls=0000d1ff ExitControls=002fefff 12:12:12 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) read$rfkill(r0, &(0x7f0000000140), 0x8) r1 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r2 = dup(r1) execveat(r2, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0xbf8cc7302e25fe16) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 12:12:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc000c000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:12 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000200)=0x6, 0x4) ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={'bridge_slave_1\x00', 0x5, 0x401}) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 12:12:12 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:12 executing program 1: rt_sigreturn() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'eql\x00', 0x400}) close(r2) [ 504.897507] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 504.906241] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 504.913029] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 504.913037] reason=80000021 qualification=0000000000000000 [ 504.913044] IDTVectoring: info=00000000 errcode=00000000 [ 504.913049] TSC Offset = 0xfffffef02ffeec23 [ 504.936567] EPT pointer = 0x000000007ee6d01e [ 504.941210] Virtual processor ID = 0x0001 12:12:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x10080, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000080)={0x40, 0x0, 0x3, 0x1, 0xb48, 0x7, 0x6, 0x380, 0x4, 0x75, 0x4, 0x1000, 0x7, 0x48d, &(0x7f0000000140)=""/192, 0x2, 0x2}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30}, 0x30) 12:12:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc000d000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:12 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x1000) syz_emit_ethernet(0x4, &(0x7f00000000c0)=ANY=[@ANYRES32=r0, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES64], @ANYRESHEX, @ANYRESOCT], 0x0) [ 505.051684] device nr0 entered promiscuous mode 12:12:12 executing program 2: memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc000e000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:12 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000200)=0x6, 0x4) ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={'bridge_slave_1\x00', 0x5, 0x401}) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:12:12 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) dup(r0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) execveat(r1, &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x1580) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) accept$ax25(r2, 0x0, &(0x7f0000000040)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x4000, 0x0) 12:12:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x10004000000002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x80002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) fcntl$setstatus(r4, 0x4, 0x6000) accept4$unix(r4, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e, 0x80000) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f610500026b02e8fe02080100010800080006000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:12:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x2c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000040)="9a00000000b100660f001deb6f000065260f79b900000080640fc71ab8f5ffffffbaffffffff0f3066b893000f070f01c8b8df000000c744240000000000c744240202000000c7442406000000000f011c240f300f0fd4aec4e27d18c70f06b8000000800f23d00f21f8352000000a0f23f8000000000f10c744240000000000c744240200000000c7c2a406000000000f011424", 0x94}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup(0xffffffffffffffff) r4 = socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x0, 0x3}, 0x20) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = socket(0xa, 0x1, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r6, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r8}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000300)={r8, 0x3, 0x4, [0xb44d, 0x1a, 0x100, 0x81]}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000100)={r8, 0xff}, 0x8) 12:12:12 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) [ 505.312819] validate_nla: 10 callbacks suppressed [ 505.312829] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0011000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 505.404029] device nr0 entered promiscuous mode 12:12:13 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000200)=0x6, 0x4) ioctl$SIOCX25GSUBSCRIP(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={'bridge_slave_1\x00', 0x5, 0x401}) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') [ 505.455920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:12:13 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) sendto$rxrpc(r3, &(0x7f00000001c0)="69a68783ebebe9fa094f4e4648517747900858ad8cb6bb77c21c5f4b6917adcc255291c98b6e011758db40d6c515439cbc7ee5f57da56ac4a7fc1661049404846871c7f1dfdd", 0x46, 0x300440c1, &(0x7f0000000280)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x1f, @ipv4={[], [], @multicast2}, 0x101}}, 0x24) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x1) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='\x00\x00\x00\x00\x12?\x00\x00\x01\x00\x00\x00\x01\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) msgget(0x0, 0x800) r4 = msgget$private(0x0, 0x0) r5 = getuid() lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000440)={{0x0, r5, r7, r6, r8, 0x20, 0x739}, 0x100000001, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2}) msgctl$IPC_INFO(r4, 0x3, &(0x7f00000000c0)=""/65) [ 505.526860] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:13 executing program 3: timer_create(0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl(r1, 0x5, &(0x7f0000000080)="16b152f139ad64237a1c44e5e32f25e4012c7838613c5bd139dc599d2ac278be4041d6b76e18763be6c1ac23cede718fb06b859fec22598df7fa5e328f202f4eb576a6713d0e063358154d8c507fcb1e7c671092") bind$inet6(r0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r2) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:13 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000200)=0x6, 0x4) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') 12:12:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0012000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:13 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x6) r1 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0xfffffffffffff001, 0x4b0d01) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000400)=0x2d, 0x4) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x9, 0x0, 0x1, 0x8}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f0000000100)={r3, 0x80}) r4 = dup(r0) execveat(r4, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) [ 505.792142] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:13 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfc28) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') 12:12:13 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000200), &(0x7f0000000480)=0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa2, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0xfe7, 0x0, 0xed, 0x48c0, 0xc, 0x0, 0xa, 0x0, 0xa7, 0x0, 0x1f, 0x0, 0x6, 0x0, 0xfffffffffffff89d, 0x6, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x7, 0x7, 0x80, 0x3, 0x0, 0x0, 0x7, 0x80, 0x0, 0xc5, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x4080, 0x401, 0xfffe, 0x5, 0x48f, 0x9, 0x5}, 0x0, 0x8, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) r7 = syz_genetlink_get_family_id$devlink(&(0x7f00000006c0)='devlink\x00') r8 = syz_open_dev$radio(&(0x7f0000000700)='/dev/radio#\x00', 0x0, 0x2) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f00000008c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0xac0bf9b5199e6269}, 0xc, &(0x7f0000000880)={&(0x7f0000000780)={0xd4, r7, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x4}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x3}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r8}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4840}, 0x20000000) r9 = gettid() r10 = socket$kcm(0xa, 0x5, 0x0) close(r10) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x4, 0x6, 0x2, 0xfb, 0x0, 0x100, 0x180, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp, 0x1ed01c4de1a63abb, 0x14, 0x7fffffff, 0x0, 0xffffffffffffffe0, 0x10001, 0xde}, r9, 0x2, r6, 0x8) recvmsg$kcm(r10, &(0x7f0000000440)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000500)=""/246, 0xf6}], 0x1, &(0x7f0000000940)=""/214, 0xd6}, 0x40002020) recvmsg$kcm(r10, &(0x7f0000000640)={&(0x7f00000002c0)=@hci, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/123, 0x7b}, {&(0x7f0000000500)=""/137, 0x89}, {&(0x7f00000005c0)=""/70, 0x46}], 0x3}, 0x40) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 12:12:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_read_part_table(0x2000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="08002100000a00000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000300000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4000, 0x0) close(r0) 12:12:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc002f000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 506.120763] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:13 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:13 executing program 2: r0 = memfd_create(&(0x7f00000000c0)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x1) r1 = dup(r0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) openat$cgroup_int(r3, &(0x7f0000000000)='s\x00', 0x2, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) tkill(r4, 0x21) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:13 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') 12:12:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x400000000000000}, 0x0) 12:12:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0052000b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:14 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') 12:12:14 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) tee(r1, r2, 0x1, 0x5) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) write$input_event(r1, &(0x7f0000000040)={{0x0, 0x2710}, 0x4, 0x6, 0x400}, 0x18) [ 506.295126] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 506.318235] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 506.385002] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:12:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0058650b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 506.463376] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 506.470119] loop1: p1 p3 [ 506.478098] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 12:12:14 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) 12:12:14 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, &(0x7f00000001c0)='/dev/binder#\x00', 0xd, 0x5) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') [ 506.583619] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 506.616064] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 506.747272] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 506.789252] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 506.822205] loop1: p1 p3 [ 506.901039] device nr0 entered promiscuous mode 12:12:14 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x65) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r2, 0x13, 0x0, 0x401, &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3}, 0x20) r3 = socket$inet6(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000000)=0x10001, 0x4) sendto$inet(r0, 0x0, 0x0, 0x2000c800, &(0x7f0000002140)={0x2, 0x100004e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140)="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", 0x5bd, 0x908c82edccbdffe5, 0x0, 0x0) 12:12:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0000810b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 506.977571] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:14 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000100)=@usbdevfs_driver={0x9, 0x0, &(0x7f0000000480)="bb46898a5919ff4c5a0478f0a3a36e24431d916707e60f8dc9bfdcd2779b95ac3110e99e264b94370687dbf2ce6fc8ec571b01203e1b8ad4a23b2fc440468bad2afb030541a19b37080d16bd934bdca3f5cd3c087b3a14ce7f33a938649be76f68926c21d436c93113c312bce6a4567f9df03359e78519cd7b22b799675435f64aa1a3"}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0xaa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000180)=@raw=[@map, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2712b011d2548b93}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x70ad) 12:12:14 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000080)=0xd, 0x4) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000040)) r2 = dup(r0) execveat(r2, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:14 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') 12:12:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0010020b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) 12:12:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) openat$cgroup_int(r4, &(0x7f0000000000)='cpuset.cpus\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0x1000) r6 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r7 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r7, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0xfffffea6) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r9, &(0x7f0000000200)=ANY=[], 0xfc28) r10 = getpid() rt_tgsigqueueinfo(r10, r10, 0x16, &(0x7f0000000100)) ptrace(0x10, r10) ptrace$pokeuser(0x6, r10, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r10, 0x388, 0x2) r11 = getpgrp(r10) fstat(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) setresgid(0x0, r14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="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", 0xfe, 0x1000000000000000}], 0x0, &(0x7f0000000480)={[{@gid={'gid', 0x3d, r14}}, {@errors_continue='errors=continue'}, {@errors_recover='errors=recover'}, {@case_sensitive_no='case_sensitive=no'}, {@fmask={'fmask', 0x3d, 0x1}}], [{@euid_gt={'euid>', r15}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'syz'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fsmagic={'fsmagic'}}]}) r16 = getpid() rt_tgsigqueueinfo(r16, r16, 0x16, &(0x7f0000000100)) ptrace(0x10, r16) ptrace$pokeuser(0x6, r16, 0x388, 0xffffffffffffffff) ptrace$pokeuser(0x6, r16, 0x388, 0x2) r17 = getpgrp(r16) r18 = geteuid() r19 = getgid() r20 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r20, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000640)={&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f00000001c0)="d2112e6e49df51475c93e24f9ec66777ac9c2800c832811c96aecb7c37843a2bd0788180732cbfc8f5c712364e57d82cdb67ddd4e4745ab2d6c360aaeffbdeb012a9df5c4d16e987cd0686da19465634f1f152f5236bdde70b5e34b9fd9e85d97ce25de25c06c12ed8f67579ec3355deeb964acc2507693d1b49b0580633de19635b6970015c5e17f542c02a2fe983c82a76e27181a56c963975a858fd0c", 0x9e}, {&(0x7f0000000040)='.', 0x1}, {&(0x7f0000000280)="03507c4547df9b3df742fb047ebe02ac1d0e232a139aae87992d89dca0c5deae122173e2b7075f746d458ba6b69f2877b4d8bbd86172206193733cf9e7ba8de845239f6d9e24c7f10600e7819992ae1e038631c28d66fde3c966afcb2bcaacf040f07a8420ac96a3a9f8c484a7091f1c62ee2829fba4dbff06646d6dfe220735a89737fab0143ee6fa1e38936deb9ebc4ce9b81d0b78642888053c50568322bac8a47f96d8f0d9e3513839824b8539", 0xaf}, {&(0x7f0000000380)="62460d475d92885fcc70d8b3ff18f14a4f76bcc9ba59eac0de6773ddbb14eb26f17d8d6d1beb29415c1243ac98587686355c97b0c0ea79fd42462f4ac2fed95de9eba19fd2f28bb095cc276d973279a9def157921e550f2845ff7dccbd2a4a3ef9d2e6dc9ef2a3d00a6462b99b4ed81cafd70addc3fa174684503b41c83ace299e172a8c3fb9fbbcac9016d9c703acf696a8b4b461c7cbc842da3d514b2d3a5a8938c81cba57dc10b486b499cd128961c5b5cb495c09bbee31d702d8ffbcfc270e760eac13fe35efc64a44b79b7c4c226c0f0b53088c413f8c", 0xd9}], 0x4, &(0x7f0000000540)=[@rights={{0x1c, 0x1, 0x1, [r1, r2, r3]}}, @rights={{0x30, 0x1, 0x1, [r0, r5, r0, r6, r7, r8, 0xffffffffffffffff, r9]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r14}}}, @cred={{0x1c, 0x1, 0x2, {r17, r18, r19}}}, @rights={{0x20, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r0]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r20]}}], 0xc8, 0x40}, 0x400c4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000009000300e60100006c000000000000000100000001000056124000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 507.163120] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:14 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f0000000040)) execveat(r1, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='hfsplus\x00=\x94\xfa\xe2\xf2\x95i*\xf2k\x8bk\xf0#\xd7\xc0\xab@\xf6\xf2\x8f\nf00000000000000000000. 12:12:15 executing program 4: bind(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') [ 507.342191] ntfs: (device loop3): parse_options(): Unrecognized mount option smackfstransmute. [ 507.365564] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 12:12:15 executing program 2: r0 = memfd_create(&(0x7f0000000240)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x1000) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000080)={0x0, 0xf6eb7c104a745b6a, r2}) r3 = dup(r0) execveat(r3, &(0x7f0000000000)='\x00', 0xfffffffffffffffd, 0x0, 0x1000) 12:12:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="2e00000032000510d25a80648c6394fb0124fc0010040b400c000200053582c137153e3709000380feff0000d1bd", 0x2e}], 0x1}, 0x0) [ 507.468723] ntfs: (device loop3): parse_options(): Unrecognized mount option fsmagic. 12:12:15 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x10}, 0x0, 0x8000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff