_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000f00000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:29 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0xffffffffffffff79) 22:51:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(0x0, 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="aaaaaaaaaaaac17f97f920f286dd60bb561500102f40fe8000000000000000000000000000bbfe8000000000000000000000000000aa042022ebffff020000000800000086dda4c97beabb62040800880020e0782b140fcf4d0000100000000100000000000000080022eb00000000778f3977df6ef51f692fed1a102b20000000020000000017e72256000000dc6068821466373d39f1adc7288d06358dfa703d0bb4501c744a186155e5ce2cd253da0f6041ebc3e9c154d056c51aa5957c960ebe1cba8822bee2b5d39a5532ba44f5eb51b212b33af51d99dbe9f92767cf1ec48a746af9670362452936e67c307f0236b475f0e78151615589c571e816e6a3bc87380e5d6ae5f48cab1641cdf2e99589ebbeeea0a38f018582316309c035e8f03e268779a834435d7f3163dd0056b15c5f916629c13222258e8251fb90ec3463c1c386d3289bbf9afdc4e449d1a3860a5903aa8b4b5372a836c42a2f60d647d41fb2af5ea87e96c83429b7c302d1af0c06858ef4bcffd17f87b0de1afacbee07d77d8745575594ec8d434b6e98cfe0aceaa367449e96f8b7bc3580d9b6d118b9bad8857347d118c94a512a7b3f07f11d56ff5e546b3ddf5983d0bf100cdfa95b65da2c29e49e29323a042c5dc0fcaefc26a398a9dee873696ca3060fc3bfb706b5d52014e66a47d918125fad5f5d35537f18048abb5e57e9813c082fa3a71e3a7ec80aea93a281bfcf3ceaeb3e3e0d5700cade0439642a99479a0a62069a1259eff2b1854a8b3eb20191ff12054b57768d157fd6d004e3bccee9269d0377181cb991bab1d1eb03b244caf181982f7aea756510c6cf6384457e169df92c89703f3b223163"], 0x0) 22:51:29 executing program 5: socket$inet6(0xa, 0x80003, 0xff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x4}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:29 executing program 4: r0 = socket(0x0, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff001000000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(0x0, 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="aaaaaaaaaaaac17f97f920f286dd60bb561500102f40fe8000000000000000000000000000bbfe8000000000000000000000000000aa042022ebffff020000000800000086dda4c97beabb62040800880020e0782b140fcf4d0000100000000100000000000000080022eb00000000778f3977df6ef51f692fed1a102b20000000020000000017e72256000000dc6068821466373d39f1adc7288d06358dfa703d0bb4501c744a186155e5ce2cd253da0f6041ebc3e9c154d056c51aa5957c960ebe1cba8822bee2b5d39a5532ba44f5eb51b212b33af51d99dbe9f92767cf1ec48a746af9670362452936e67c307f0236b475f0e78151615589c571e816e6a3bc87380e5d6ae5f48cab1641cdf2e99589ebbeeea0a38f018582316309c035e8f03e268779a834435d7f3163dd0056b15c5f916629c13222258e8251fb90ec3463c1c386d3289bbf9afdc4e449d1a3860a5903aa8b4b5372a836c42a2f60d647d41fb2af5ea87e96c83429b7c302d1af0c06858ef4bcffd17f87b0de1afacbee07d77d8745575594ec8d434b6e98cfe0aceaa367449e96f8b7bc3580d9b6d118b9bad8857347d118c94a512a7b3f07f11d56ff5e546b3ddf5983d0bf100cdfa95b65da2c29e49e29323a042c5dc0fcaefc26a398a9dee873696ca3060fc3bfb706b5d52014e66a47d918125fad5f5d35537f18048abb5e57e9813c082fa3a71e3a7ec80aea93a281bfcf3ceaeb3e3e0d5700cade0439642a99479a0a62069a1259eff2b1854a8b3eb20191ff12054b57768d157fd6d004e3bccee9269d0377181cb991bab1d1eb03b244caf181982f7aea756510c6cf6384457e169df92c89703f3b223163"], 0x0) 22:51:30 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) 22:51:30 executing program 4: r0 = socket(0x0, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff004800000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:30 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r1, &(0x7f0000000240)=""/204, 0xffffff83) r3 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r3}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x30, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x6, 0x0, 0x131, 0x0, &(0x7f0000000100)="c64b1236ea47baaa1d2319b81f98b9a63eb718aa348682ea38958d473ba23454e734f87e43d34d94197e5647753d5b0ff363517953c2b20b06d33eda9b427829b22bdaa430ef2c308cc7e30954db396c0fb26847b83d72ba40dc766e49dec2aafe5e59455d025668d484a3f9419edbc003a71154f33065f1d2d8d33da01acfe9b3d7a4bacd98cb0fa3363b8aaece003f8877d118023f85fd409949ec7aae9c0f5d89df99dc69200bfcaaabe29f8c13"}, 0x40) 22:51:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4}) 22:51:30 executing program 4: r0 = socket(0x0, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff006000000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:30 executing program 4: r0 = socket(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4}) 22:51:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:30 executing program 4: r0 = socket(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:31 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in={{0x2, 0x4e20, @multicast2}}}, 0x84) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x3ff, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00d700000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:31 executing program 4: r0 = socket(0x10, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4}) 22:51:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00f000000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:31 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) geteuid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000003000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:31 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:31 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r2, &(0x7f0000000240)=""/204, 0xffffff83) r4 = dup(r3) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000000)={0x0, r4}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="0f00000084abc4b804f24a2d63ea439c9df80976880cf33d4332f006b3a0b8dd503385a3d0deea9300e4fea7df5f635380e5acedbbee9f60c599d66d5f006c5efdfd158c003ec3c96b08000000c27ecddb01a705e1c4a45a65365c42a108412997932475f44a94de095c3e62724faf8fdd526b217d3ff07a621fc6f0428a6a2b3463514f55510218a5ff61db7f0c", @ANYRES16=0x0, @ANYBLOB="000125bd7000fcdbdf2501000000000000000b0000000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000100)={{0x5}, 'port1\x00', 0x2, 0x20000, 0x1ff, 0x7, 0x5, 0x7, 0xf2, 0x0, 0x2, 0x9}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000005000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="aaaaaaaaaaaac17f97f920f286dd60bb561500102f40fe8000000000000000000000000000bbfe8000000000000000000000000000aa042022ebffff020000000800000086dda4c97beabb62040800880020e0782b140fcf4d0000100000000100000000000000080022eb00000000778f3977df6ef51f692fed1a102b20000000020000000017e72256000000dc6068821466373d39f1adc7288d06358dfa703d0bb4501c744a186155e5ce2cd253da0f6041ebc3e9c154d056c51aa5957c960ebe1cba8822bee2b5d39a5532ba44f5eb51b212b33af51d99dbe9f92767cf1ec48a746af9670362452936e67c307f0236b475f0e78151615589c571e816e6a3bc87380e5d6ae5f48cab1641cdf2e99589ebbeeea0a38f018582316309c035e8f03e268779a834435d7f3163dd0056b15c5f916629c13222258e8251fb90ec3463c1c386d3289bbf9afdc4e449d1a3860a5903aa8b4b5372a836c42a2f60d647d41fb2af5ea87e96c83429b7c302d1af0c06858ef4bcffd17f87b0de1afacbee07d77d8745575594ec8d434b6e98cfe0aceaa367449e96f8b7bc3580d9b6d118b9bad8857347d118c94a512a7b3f07f11d56ff5e546b3ddf5983d0bf100cdfa95b65da2c29e49e29323a042c5dc0fcaefc26a398a9dee873696ca3060fc3bfb706b5d52014e66a47d918125fad5f5d35537f18048abb5e57e9813c082fa3a71e3a7ec80aea93a281bfcf3ceaeb3e3e0d5700cade0439642a99479a0a62069a1259eff2b1854a8b3eb20191ff12054b57768d157fd6d004e3bccee9269d0377181cb991bab1d1eb03b244caf181982f7aea756510c6cf6384457e169df92c89703f3b22316311fc05e32a416cd6408000000000000000"], 0x0) 22:51:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000006000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000009000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:32 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r1, &(0x7f0000000240)=""/204, 0xffffff83) r3 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r3}) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r4, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r4, &(0x7f0000000400)=""/128) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r4, 0xc01064b5, &(0x7f0000000400)={&(0x7f00000003c0)=[0x0, 0x0], 0x2}) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x101000, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x38b, 0x0, 0x10, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x60008000}, 0xc040) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x8) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r7 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r7, 0xc0086421, &(0x7f0000000380)={r8, 0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="aaaaaaaaaaaac17f97f920f286dd60bb561500102f40fe8000000000000000000000000000bbfe8000000000000000000000000000aa042022ebffff020000000800000086dda4c97beabb62040800880020e0782b140fcf4d0000100000000100000000000000080022eb00000000778f3977df6ef51f692fed1a102b20000000020000000017e72256000000dc6068821466373d39f1adc7288d06358dfa703d0bb4501c744a186155e5ce2cd253da0f6041ebc3e9c154d056c51aa5957c960ebe1cba8822bee2b5d39a5532ba44f5eb51b212b33af51d99dbe9f92767cf1ec48a746af9670362452936e67c307f0236b475f0e78151615589c571e816e6a3bc87380e5d6ae5f48cab1641cdf2e99589ebbeeea0a38f018582316309c035e8f03e268779a834435d7f3163dd0056b15c5f916629c13222258e8251fb90ec3463c1c386d3289bbf9afdc4e449d1a3860a5903aa8b4b5372a836c42a2f60d647d41fb2af5ea87e96c83429b7c302d1af0c06858ef4bcffd17f87b0de1afacbee07d77d8745575594ec8d434b6e98cfe0aceaa367449e96f8b7bc3580d9b6d118b9bad8857347d118c94a512a7b3f07f11d56ff5e546b3ddf5983d0bf100cdfa95b65da2c29e49e29323a042c5dc0fcaefc26a398a9dee873696ca3060fc3bfb706b5d52014e66a47d918125fad5f5d35537f18048abb5e57e9813c082fa3a71e3a7ec80aea93a281bfcf3ceaeb3e3e0d5700cade0439642a99479a0a62069a1259eff2b1854a8b3eb20191ff12054b57768d157fd6d004e3bccee9269d0377181cb991bab1d1eb03b244caf181982f7aea756510c6cf6384457e169df92c89703f3b22316311fc05e32a416cd640800000000000000000"], 0x0) 22:51:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000a000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000b000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x0) 22:51:33 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10}, 0x78) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r2, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r2, &(0x7f0000000400)=""/128) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000180)=@req3={0x8984, 0x4, 0x20, 0x7, 0x7, 0x8d3, 0x10001}, 0x1c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x6, 0x7, 0x8, 0x40, 0x0, 0x4, 0x40000, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xa303, 0x4}, 0x20000, 0x0, 0x4f7, 0x8, 0x3, 0x8001, 0x8}, 0x0, 0x8, r3, 0x1) 22:51:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000c000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:33 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r0, &(0x7f0000000240)=""/204, 0xffffff83) r2 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r2}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x30, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:34 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="ac434c1fe0dbc9a22f6d32d298585d4bd1043f3af319865c18d68051d5078696f04f40cfdcc914d19f0c6cd01b88cae104e0072a62e54e8c71e7b3bd989098a04776fc3fbf69f388724c9ab0f9724d0d623dca01f3edda017beec1aaeb528adb4dfd97da2d945d262a55b513919d3ffb32f0c6c650b842026fef5e5ed8ba1a3759718ddd6c751c7c"], 0x88) bind(0xffffffffffffffff, &(0x7f0000000100)=@pptp={0x18, 0x2, {0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f00000003c0)=@generic={0x1, 0x10000, 0x1018e}) syncfs(r3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r5, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) bind$inet6(r5, &(0x7f0000000640)={0xa, 0x4e23, 0x81, @rand_addr="c248713cf0ced513dc756417a455cabd", 0x8}, 0x1c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)=0x0) ptrace$pokeuser(0x6, r6, 0x7fffffff, 0xf04) r7 = dup2(r2, r4) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r8, 0x40000000af01, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r8, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r8, &(0x7f0000000240)=""/204, 0xffffff83) r10 = dup(r9) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000000)={0x0, r10}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r10, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x30, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) getsockname$netlink(r10, &(0x7f0000000180), &(0x7f00000001c0)=0xc) ioctl$USBDEVFS_DISCARDURB(r7, 0x550b, &(0x7f0000000600)=0x1c3) ioctl$KVM_GET_MSRS(r7, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{}, {}]}) 22:51:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000e000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000f000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4}) 22:51:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000048000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:35 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x80, 0x4, 0xff, 0x8, 0x0, 0x1, 0x40, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xd40, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x2ba162c436b2a697, 0x0, 0x8, 0x7, 0x80000000, 0x5b, 0x4657}, r2, 0xe, 0xffffffffffffffff, 0xf) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff006558000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:35 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) ioctl$CAPI_SET_FLAGS(0xffffffffffffffff, 0x80044324, &(0x7f0000000100)=0x1) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCCBRK(r1, 0x5428) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000140)={0x9c}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000060000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:35 executing program 5: fanotify_init(0x45, 0x2) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:35 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r8, @ANYBLOB="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"], 0x8d0}}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x3, &(0x7f0000000040)=@raw=[@exit, @map_val={0x18, 0xb, 0x2, 0x0, r5}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x94, &(0x7f0000000140)=""/148, 0x41000, 0x1c, [], r8, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xb, 0x401, 0x401}, 0x10}, 0x78) write$binfmt_script(r9, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b4"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff005865000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:35 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe5"], 0xeb) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:35 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r8, @ANYBLOB="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"], 0x8d0}}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x3, &(0x7f0000000040)=@raw=[@exit, @map_val={0x18, 0xb, 0x2, 0x0, r5}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x94, &(0x7f0000000140)=""/148, 0x41000, 0x1c, [], r8, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xb, 0x401, 0x401}, 0x10}, 0x78) write$binfmt_script(r9, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:35 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x0, 0x10, &(0x7f0000000000), 0xd3d8350b46034aaf}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getpid() r6 = getpgid(0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket(0x2000000000000021, 0x2, 0x10000000000002) dup2(r7, r8) kcmp(r5, r6, 0x0, r4, r7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r9}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)='&\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000040)='{#self\x00', r9}, 0x30) r11 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r11, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) kcmp(r2, r10, 0x1, r0, r11) 22:51:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b4"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe5"], 0xeb) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:36 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r8, @ANYBLOB="00000000f1ffffff000000000800010063627100a408020004040600030000000500000000700300fdffffffffff00001f0000000500000000020000010000000000100083000000fdffffff07000000084900000100000002000000cf000000feffffff080000000180000003000000090000000200000000274a49ef6949a7bb000000050000000100000004000000ff7f000000000000000400000002000004000000ff0f0000f44f350001000000010400005eb768350100000008000000ffffffffc38d00001f000000040008830600000000000100f7ffffff030000000080ffff050000000600000006000000a900000000000000c0000000c0ffffff08000000018000000101000006000000b300000000000020050000000104000004000000070000000800000001010000c22e0000c0ffffff0500000004000000060000000900000008000000f7ffffff0800000003000000080000000400000001000080040000000400000000100000040000000700000009000000fcffffff01000000010000000900000000020000060e0000080000000200000002000000090000000800000007000000ab000000fb00000007000000ff0100000800000001040000070000000300000009000000ff07000008000000ffff0000a90100000900000005000000200000000500000001000000070000008eb7000000000080010000000000000007000000fffffffffcffffff01f0ffff000000003f00000003000000000100000080000000800000030000000500000005000000ffffffff0700000015ba000004000000070000000300000003000000ffffffff04000000554f00006ff800000700000003000000000200000600000008000000b300000006000000000000000007000001010000030000000080000000040000730a000001000080010000009e0c0000000800000100008000000000000000004000000000fefffff67d000004000000ff01000002000000000000004000000040000000ed000000010001000e0a05000000000000020000040000000600000002000000ff7f00000100000001000000060000007f000000020000000004000004000000090000009000000008000000b6000000040000000400000005000000f50a0000ffff0000060000008ff9ffff070000001eaaffff3f0000008000000000000000ff0c0000ff7f0000030000007f0000002d0000000800000000010000ff070000ffffffff2bab000002000000ace800000500000000000000e1bf934d070000001f000d000300000004000000070000000900000005000000030000000200000087d400000200000008000000000100007f0000000e000000080000000200000007000000ffffff7f06000000000000000500000001000000820000001f0000000004000001000000faffffff0500000006000000070000000300000010000500810306009fff04000800000004040600d90b0000ff00000005000000040000001ba2cc3b00000080010000003f000000ff0f0000bd52c97303000000be060000fffffffffffeffff7f000000ff0000008100000000db040009000000070000000300000000000000060000008f5e0000010000000002000006000000010100000200000007000000000000e03189000001040000000800000600000004000000080000000400000002000000c00000000800000008000000f7ffffff05000000810000004d00000001000080eb0700001f000000090000000800000001000000000000000000000002000000ffff00000100000002000000000000e0a000000040000000ff000000f7ffffff0500000009000000070000000600000028080000030000000600000004000000be00000003000000070000000500000038080000faffffffffffffff47b5554d001000008100000007000000ffffffff040000000100000002000000566b00002000000004000000020000008b01000001000000ffff000045fa0000ff0f0000050000002000000003000000e40d000007000000f8ffffff200000003f000000387f00000700000007000000c10a000009000000040000000400000000000000008000000100008009000000370b000000000080ff07000006000000bb7900000400000002000000ffffff7f0300000000000000090000000700000005000000000000807f0000000900000008000000fad4ffffff01000001010000010000003f0000000400000020f2ffff01000100ffff0000010000000200000008000000fbfffffff9ffffff040000004d000000060000000200000002000000070000004e0d0000000200000800000035000000300e00000700000000040000020000000180000020000000f2ffffff070000000500000000010000fffffeff0900000000080000070000000800000009000000ff7f00000900000004000000040000000000000006000000050000000100000009000000080000007e0700000300000000800000bf16000002000006000000ffee0000000100000000000000001000006305000000000000000000007f00000010080000000000000100008002000000080000000101000003000000ffffff7ffffffffff7ffffff0600000003000000a6060000ff0300000700000001800000090000000200000000000000040000000080ffff00020000070000000500000001000100000000800000af06060000002b0a000005000000010000000500000009000000040000000500000002000000ffffff7ff30000000800000002000000ffff0000ff070000810000004000000075fc000009000000fbffffff0500000000000000810000000100000080000000d05e0000020000001f00000000000000ff010000451e00002d00000000000000ff0000001000030008001000ff070000010000001800010039031c020101000001000000000000060500000010000200e002807104000000ff03000018000100080d1e02800000000700000024709a02ff7f000010000500010000000000000007000000100003001f0003000700000001010000180001000501040009000000040000000104000000000000f2275eef7138e6d8404ee35c1c03d0a7e3015b89e6e440ebafa27d5b8188804cd5beea2fda73c030f26439c9e4f2e27a824bfb4415f2af99b482560d1a447df28d8d838ad1a39caf40dc96c5f134529d47c0604f66f8714f8ee51165c4b029a7dc7e2f90de64a234d9098b06231c71bc79c43de912eb17614cf75d8c49152a801ac9a1326f0e334e0534faa8d8704d03c25495230a2ed4feb5298d99c124310dd8d4054c8be6bdb8bcede3d1552b08c169755c508c65ff8e1c50711a38d9a451eb650df96535fcc7669eb1f0f7fc5135a05b389610d33df49e9d1d3808c8fa0524b1caa582c913fedb22de15fbc7e7890faa48e6205a74bf817d48ea3dc9cddb6acc14b94522ccce95a27379b1ced543ad45de5016647e86154fd92670b9fc95ff90ea60fcf349981185b11322c4a48276eea082e4be45b9125653ba5f8ad8500d0d768b2de6b9e198568ecd526a1ba44c9180104fa91e55e31181b4acad815ef766bc8604c30c715da309a185645439aaabb542625905dc77193d45cde1978dc9c67cea6b01d2d4a28b13fc1e71d1f2a38537c44b629790b1305371c9e705771da5555c743b5b4adea2b95aa708f41e7a713277f5422f2bb669861730554e266f4ae61e0377f517b23ae4821e04e500cf998be043bab81fa38368a555f4a381eab2a692e06a4ca80bcb7570518078eb76bd313b23d0708cd26017f5a6c84c7c9395cdc9a6137b71a7950af487"], 0x8d0}}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x3, &(0x7f0000000040)=@raw=[@exit, @map_val={0x18, 0xb, 0x2, 0x0, r5}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x94, &(0x7f0000000140)=""/148, 0x41000, 0x1c, [], r8, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xb, 0x401, 0x401}, 0x10}, 0x78) write$binfmt_script(r9, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000081000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe5"], 0xeb) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b4"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x161) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb41"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:36 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r8, @ANYBLOB="00000000f1ffffff000000000800010063627100a408020004040600030000000500000000700300fdffffffffff00001f0000000500000000020000010000000000100083000000fdffffff07000000084900000100000002000000cf000000feffffff080000000180000003000000090000000200000000274a49ef6949a7bb000000050000000100000004000000ff7f000000000000000400000002000004000000ff0f0000f44f350001000000010400005eb768350100000008000000ffffffffc38d00001f000000040008830600000000000100f7ffffff030000000080ffff050000000600000006000000a900000000000000c0000000c0ffffff08000000018000000101000006000000b300000000000020050000000104000004000000070000000800000001010000c22e0000c0ffffff0500000004000000060000000900000008000000f7ffffff0800000003000000080000000400000001000080040000000400000000100000040000000700000009000000fcffffff01000000010000000900000000020000060e0000080000000200000002000000090000000800000007000000ab000000fb00000007000000ff0100000800000001040000070000000300000009000000ff07000008000000ffff0000a90100000900000005000000200000000500000001000000070000008eb7000000000080010000000000000007000000fffffffffcffffff01f0ffff000000003f00000003000000000100000080000000800000030000000500000005000000ffffffff0700000015ba000004000000070000000300000003000000ffffffff04000000554f00006ff800000700000003000000000200000600000008000000b300000006000000000000000007000001010000030000000080000000040000730a000001000080010000009e0c0000000800000100008000000000000000004000000000fefffff67d000004000000ff01000002000000000000004000000040000000ed000000010001000e0a05000000000000020000040000000600000002000000ff7f00000100000001000000060000007f000000020000000004000004000000090000009000000008000000b6000000040000000400000005000000f50a0000ffff0000060000008ff9ffff070000001eaaffff3f0000008000000000000000ff0c0000ff7f0000030000007f0000002d0000000800000000010000ff070000ffffffff2bab000002000000ace800000500000000000000e1bf934d070000001f000d000300000004000000070000000900000005000000030000000200000087d400000200000008000000000100007f0000000e000000080000000200000007000000ffffff7f06000000000000000500000001000000820000001f0000000004000001000000faffffff0500000006000000070000000300000010000500810306009fff04000800000004040600d90b0000ff00000005000000040000001ba2cc3b00000080010000003f000000ff0f0000bd52c97303000000be060000fffffffffffeffff7f000000ff0000008100000000db040009000000070000000300000000000000060000008f5e0000010000000002000006000000010100000200000007000000000000e03189000001040000000800000600000004000000080000000400000002000000c00000000800000008000000f7ffffff05000000810000004d00000001000080eb0700001f000000090000000800000001000000000000000000000002000000ffff00000100000002000000000000e0a000000040000000ff000000f7ffffff0500000009000000070000000600000028080000030000000600000004000000be00000003000000070000000500000038080000faffffffffffffff47b5554d001000008100000007000000ffffffff040000000100000002000000566b00002000000004000000020000008b01000001000000ffff000045fa0000ff0f0000050000002000000003000000e40d000007000000f8ffffff200000003f000000387f00000700000007000000c10a000009000000040000000400000000000000008000000100008009000000370b000000000080ff07000006000000bb7900000400000002000000ffffff7f0300000000000000090000000700000005000000000000807f0000000900000008000000fad4ffffff01000001010000010000003f0000000400000020f2ffff01000100ffff0000010000000200000008000000fbfffffff9ffffff040000004d000000060000000200000002000000070000004e0d0000000200000800000035000000300e00000700000000040000020000000180000020000000f2ffffff070000000500000000010000fffffeff0900000000080000070000000800000009000000ff7f00000900000004000000040000000000000006000000050000000100000009000000080000007e0700000300000000800000bf16000002000006000000ffee0000000100000000000000001000006305000000000000000000007f00000010080000000000000100008002000000080000000101000003000000ffffff7ffffffffff7ffffff0600000003000000a6060000ff0300000700000001800000090000000200000000000000040000000080ffff00020000070000000500000001000100000000800000af06060000002b0a000005000000010000000500000009000000040000000500000002000000ffffff7ff30000000800000002000000ffff0000ff070000810000004000000075fc000009000000fbffffff0500000000000000810000000100000080000000d05e0000020000001f00000000000000ff010000451e00002d00000000000000ff0000001000030008001000ff070000010000001800010039031c020101000001000000000000060500000010000200e002807104000000ff03000018000100080d1e02800000000700000024709a02ff7f000010000500010000000000000007000000100003001f0003000700000001010000180001000501040009000000040000000104000000000000f2275eef7138e6d8404ee35c1c03d0a7e3015b89e6e440ebafa27d5b8188804cd5beea2fda73c030f26439c9e4f2e27a824bfb4415f2af99b482560d1a447df28d8d838ad1a39caf40dc96c5f134529d47c0604f66f8714f8ee51165c4b029a7dc7e2f90de64a234d9098b06231c71bc79c43de912eb17614cf75d8c49152a801ac9a1326f0e334e0534faa8d8704d03c25495230a2ed4feb5298d99c124310dd8d4054c8be6bdb8bcede3d1552b08c169755c508c65ff8e1c50711a38d9a451eb650df96535fcc7669eb1f0f7fc5135a05b389610d33df49e9d1d3808c8fa0524b1caa582c913fedb22de15fbc7e7890faa48e6205a74bf817d48ea3dc9cddb6acc14b94522ccce95a27379b1ced543ad45de5016647e86154fd92670b9fc95ff90ea60fcf349981185b11322c4a48276eea082e4be45b9125653ba5f8ad8500d0d768b2de6b9e198568ecd526a1ba44c9180104fa91e55e31181b4acad815ef766bc8604c30c715da309a185645439aaabb542625905dc77193d45cde1978dc9c67cea6b01d2d4a28b13fc1e71d1f2a38537c44b629790b1305371c9e705771da5555c743b5b4adea2b95aa708f41e7a713277f5422f2bb669861730554e266f4ae61e0377f517b23ae4821e04e500cf998be043bab81fa38368a555f4a381eab2a692e06a4ca80bcb7570518078eb76bd313b23d0708cd26017f5a6c84c7c9395cdc9a6137b71a7950af487"], 0x8d0}}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x3, &(0x7f0000000040)=@raw=[@exit, @map_val={0x18, 0xb, 0x2, 0x0, r5}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x94, &(0x7f0000000140)=""/148, 0x41000, 0x1c, [], r8, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xb, 0x401, 0x401}, 0x10}, 0x78) write$binfmt_script(r9, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000d7000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:36 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16=r1], 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb41"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x161) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:36 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r8, @ANYBLOB="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"], 0x8d0}}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x3, &(0x7f0000000040)=@raw=[@exit, @map_val={0x18, 0xb, 0x2, 0x0, r5}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x94, &(0x7f0000000140)=""/148, 0x41000, 0x1c, [], r8, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xb, 0x401, 0x401}, 0x10}, 0x78) write$binfmt_script(r9, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000f0000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb41"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:36 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771"], 0x161) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x11, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:37 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) getpeername$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000100)=0x1c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:37 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r8, @ANYBLOB="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"], 0x8d0}}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x3, &(0x7f0000000040)=@raw=[@exit, @map_val={0x18, 0xb, 0x2, 0x0, r5}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x94, &(0x7f0000000140)=""/148, 0x41000, 0x1c, [], r8, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xb, 0x401, 0x401}, 0x10}, 0x78) write$binfmt_script(r9, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x19c) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000001000010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x11, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x19c) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:37 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xc, &(0x7f0000000100)="85ff72419c69f8d3c115761e8d32b34157e87a9c958771a393797553fdb82a85d7867942ca6e6c9a01fccca6ccf80516f6ada058a8f841bac974d6f6f1c19040e1299cda01cbe33a38e3cbd061a3d6481574c4834f829bb72bc60cf65d114ad8f8747d7844900b87484dd1fdf95129b1ec11892a3e68906bf2cfd182e7a6097be9ba99c9c03617ce160753ef3ab55f5e5e43eb631991203d397ca1c13f855b39f7389ce7c2", 0xa5) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0), 0x41000) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x10, r1, 0x637fe000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r3 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x945327d50296f0ab) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f0000000280)={0x401, 0x3}) r4 = socket(0xa, 0x1, 0x0) close(r4) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r5 = accept$alg(r4, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000040)={'veth1_to_bridge\x00', {0x2, 0x4e22, @rand_addr=0x2}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:37 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r8, @ANYBLOB="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"], 0x8d0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x3, &(0x7f0000000040)=@raw=[@exit, @map_val={0x18, 0xb, 0x2, 0x0, r5}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x94, &(0x7f0000000140)=""/148, 0x41000, 0x1c, [], r8, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xb, 0x401, 0x401}, 0x10}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000003500010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379c"], 0x19c) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:37 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r8, @ANYBLOB="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"], 0x8d0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x3, &(0x7f0000000040)=@raw=[@exit, @map_val={0x18, 0xb, 0x2, 0x0, r5}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x94, &(0x7f0000000140)=""/148, 0x41000, 0x1c, [], r8, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xb, 0x401, 0x401}, 0x10}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x11, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1b9) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000005800010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:37 executing program 5: r0 = semget$private(0x0, 0x2, 0x403) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000100)=""/178) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r2], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd11, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x11, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000002000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1b9) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe3151531cf72a9c4, 0x3e, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe0000002c6e4360f100850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac94525e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b636d0d6127c4bbe484e4c9507af216bd8ed42f7dd5adb8e08c9a208e4557cd4ed88b37ab8d77316d61089cc275540fb6524a6318141471ec75a8a1de4706805646a1cd533b2214d4d4caa4fcb4e0d325b81832fe0264a6ecbdfd88879b6cb8858d1aa6c9afe8ca9de0a07100c3fca1880d0342b894d2cc00fe73768e7f3be5fcf1302ced61f5a1c9a0f0c8121217750190415753b4a870a04ad336d98fd64b8a00215e1c9666cc782d77c38487c4c4ab329687d12db2323dcf9e683ded8a57beb586fad18e3256a258a711c23bd46a74d30a12ebe46caf99cb40cd75d7b1425541c8d42f7254582f500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x11, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:38 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r8, @ANYBLOB="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"], 0x8d0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x3, &(0x7f0000000040)=@raw=[@exit, @map_val={0x18, 0xb, 0x2, 0x0, r5}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x94, &(0x7f0000000140)=""/148, 0x41000, 0x1c, [], r8, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xb, 0x401, 0x401}, 0x10}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde08"], 0x1b9) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000040)="b9ff03c6630d698cb89e0bf088144bffbb045d6c2400630277fbac14140ce050dd28141be75ff2b778b686", 0x0, 0xa, 0x0, 0xbe}, 0x28) 22:51:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x11, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000003000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:38 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r8, @ANYBLOB="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"], 0x8d0}}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9"], 0x1c8) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) epoll_create(0xa0b1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90f"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1c8) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:38 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000004000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90f"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, 0x0, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1c8) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:38 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r3, @ANYBLOB="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"], 0x8d0}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90f"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:38 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1cf) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000005000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, 0x0, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:39 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000140)={0x7, 'batadv0\x00', {0x890}, 0x352}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x40, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x9}}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbd"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc94"], 0x1cf) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:39 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000006000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbd"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, 0x0, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1cf) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:39 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:39 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbd"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000008000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d3) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:39 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(0x0, 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:39 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0xfffffff9, @mcast2, 0xffff}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) fcntl$setstatus(r2, 0x4, 0x40000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfd}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000009000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d3) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(0x0, 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:40 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) r1 = fcntl$getown(r0, 0x9) sched_setparam(r1, &(0x7f0000000040)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x30, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:40 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d3) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000a000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:40 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x16, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffd}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d5) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:40 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) fstatfs(r5, &(0x7f0000000200)=""/128) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(0x0, 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:40 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000180)={0xe080, 0x3ff, 0x6, 0xbc}, 0x10) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x56c200) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000100)={0x0, 0x80000000}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8363a968bcbbee42, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000b000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:40 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d5) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:40 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0xa}, 0x78) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000040)=0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:40 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000c000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea5"], 0x1d5) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:41 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, 0x0) fstatfs(r2, &(0x7f0000000200)=""/128) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000100)={0x1, 0xf9}, 0x2) 22:51:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) [ 1055.489228] audit: type=1804 audit(1575067901.005:154): pid=3818 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir054984496/syzkaller.3pmQeb/107/bus" dev="sda1" ino=17215 res=1 22:51:41 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000400)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x7}, &(0x7f0000000300)=0x90) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000e000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:41 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0x14f, 0x0, &(0x7f0000000880)="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", 0x0, 0x9}, 0x40) 22:51:41 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) [ 1055.959976] audit: type=1804 audit(1575067901.475:155): pid=3856 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir054984496/syzkaller.3pmQeb/108/bus" dev="sda1" ino=17297 res=1 22:51:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000f000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:41 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:41 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffd}, 0x10}, 0x78) socket$inet6(0xa, 0x2, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000040)={0xffffffffffffffff, 0x8}) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r3 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00005befdc)) r7 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r8 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r8, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ifreq(0xffffffffffffffff, 0x891c, &(0x7f0000000900)={'veth0\x00', @ifru_settings={0x1ad, 0x0, @sync=&(0x7f00000002c0)={0xef6c, 0x1a, 0x1ff}}}) sendfile(r6, r7, 0x0, 0x102000004) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000400)=ANY=[@ANYRES32=r5, @ANYBLOB="07cb891b3ed0a02caea5bf1d60b3dcc93e2de29e4dd78c727c844ba79f08639d6e5a9675f68b1081b279c831a3b7acf59b4d98c59b52d5373a097e52ed7fe80f9db8ebff0037ad256f0e76980eee6e99dbc34720"], &(0x7f0000000340)=0xf) 22:51:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:41 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) socket$inet6_sctp(0xa, 0x5, 0x84) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000010000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) [ 1056.384635] audit: type=1804 audit(1575067901.895:156): pid=3894 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir054984496/syzkaller.3pmQeb/109/bus" dev="sda1" ino=17377 res=1 22:51:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(0x0, 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:42 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000048000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:42 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) write$binfmt_aout(r1, &(0x7f0000000880)={{0x2ed, 0x1, 0x3, 0xea, 0x144, 0x2, 0x1d5, 0x1000}, "45ead9d2d9ee19c3f0142904670d423d1f0dff2f410bc62dfb3c2970c800d82516d639672ebda9d9a9770d7d", [[], [], [], [], [], [], [], [], [], []]}, 0xa4c) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETS(r2, 0x5406, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:42 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000060000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(0x0, 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:42 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:42 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) socket$inet6(0xa, 0x80003, 0xff) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000d7000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000), 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:42 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) socket$inet6(0xa, 0x80003, 0xff) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:43 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e20, 0x5, @local, 0xdf}, {0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}, 0x3, [0x6, 0x1, 0x1f, 0x4, 0x400, 0x0, 0x2, 0x6]}, 0x5c) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f0000000380)=ANY=[@ANYRESDEC=r1], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xfffffffffffffede) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000002c0)={'raw\x00'}, &(0x7f0000000400)=0x54) r3 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x7, 0x0, 0x2b9}, 0xffffffffffffffd7) write$FUSE_LSEEK(r3, &(0x7f00000001c0)={0x18, 0x0, 0x6, {0x98}}, 0x18) 22:51:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000f0000900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000), 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(0x0, 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:43 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) socket$inet6(0xa, 0x80003, 0xff) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:43 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20000000000000bf, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8a, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000040)=0x800, &(0x7f0000000100)=0x2) 22:51:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000), 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000030900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:43 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000001c0)={@mcast2, r2}, 0x14) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8c, 0x48200) getsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:43 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000050900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:44 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x8885, 0x800000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000)={0x800}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, 0x0) fstatfs(r3, &(0x7f0000000200)=""/128) readlinkat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/93, 0x5d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:44 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000060900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, 0x0, &(0x7f0000000100)) 22:51:44 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) accept$inet(r0, &(0x7f0000000600)={0x2, 0x0, @broadcast}, &(0x7f0000000640)=0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:44 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x4000) open$dir(&(0x7f0000000040)='./file0\x00', 0xca100, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000090900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000100)) 22:51:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)={0xdcd}) 22:51:44 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:44 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5}, 0x4c, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000100)) 22:51:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, 0x0) 22:51:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000a0900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:44 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r1], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x1f, 0x64, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9, 0x0, 0xaa, 0x0, &(0x7f0000000100)="5d11429b7e40dc577faa3ea790fbfc8ea877b99034540799739e609fd66fb21e576e8fbd310179f2f9e4f8bf66ce6321936456729044495a59d64000000000000000d2c81b54aa694992572a83ab2c3461572dee2b1ff607848140cf009154497dd18dc5ce19f4035449791e6ac215667c9195eab412d60ef57cde2f12e78b2bc9ab711be5135ea7b66226501e7897ae39434964560dea45a8e899e84d7a27349773ba1e54fd2f9dff26"}, 0x40) 22:51:44 executing program 3: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000000100)) 22:51:44 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, 0x0) 22:51:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000b0900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:44 executing program 3: open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, 0x0) 22:51:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, 0x0) 22:51:45 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) readahead(r1, 0x4, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, 0x0) 22:51:45 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(0x0, 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:51:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000c0900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:45 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x2800) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000100)={0xe6, 0x14, [0x7fffffff, 0x8, 0x0, 0x20, 0x2]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000140)=@v1={0x0, @adiantum, 0x7, "0c13378ba8f6a246"}) 22:51:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000cf7000000000000095000000000000007c41776586b2841fb71916411c22f945fb70fc5b4e982e61d68b61c1ba6e53657b8dc7c5bb72290946131bc6470051a39eab7f8651b8ca20a6e7fae8bc5e5c45d8cfc8c575b46ecea5a34655b9b5b14db5d29ab9e06bdb414497ff2320fd387df6c51cc11505e90fbda6"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36b}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, 0x0) 22:51:45 executing program 3: r0 = socket$inet6(0xa, 0x0, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:51:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000e0900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:45 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040), 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000440)={'lo\x00'}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r3}) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000240)={0x0, 0x3a1, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYRESHEX], 0x1}}, 0x9d919cd54b7e43fe) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xffffffeb, 0x0, 0x0, 0xfffffffffffffdf0) 22:51:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(0x0, 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:45 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1060.142305] net_ratelimit: 6 callbacks suppressed [ 1060.142315] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:51:45 executing program 3: r0 = socket$inet6(0xa, 0x0, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000f0900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:45 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4004700e, 0x0) 22:51:45 executing program 3: r0 = socket$inet6(0xa, 0x0, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:46 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = memfd_create(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="34e7ffebff00350000007f12b579fb64a18c15f5b889aeb1cd0600002406efc3b9e814c60600000000000000a949b7d0e2fe11c09706"], 0x36) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x2, 0x3) syz_genetlink_get_family_id$team(0x0) syz_open_procfs(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast2, @initdev}, &(0x7f0000000800)=0xc) socket$packet(0x11, 0x20000000000003, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='net/ip_vs_stats_percpu\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000005c0)=0xfffffe6e) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000040)) socket$inet6(0xa, 0x0, 0x0) 22:51:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1060.784844] protocol 88fb is buggy, dev hsr_slave_0 [ 1060.789991] protocol 88fb is buggy, dev hsr_slave_1 [ 1060.797163] device lo entered promiscuous mode 22:51:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(0x0, 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:46 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) times(&(0x7f0000000140)) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x7, 0x0, 0xfffffffffffffd04}, 0x28) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000180)=0x51e8, 0x4) r2 = msgget$private(0x0, 0x1a) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000880)=""/4096) [ 1060.943680] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 22:51:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x5, [0x572], [0xc1]}) 22:51:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000480900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:46 executing program 5: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r1, &(0x7f0000000240)=""/204, 0xffffff83) r3 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r3}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x30, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) r4 = openat$cgroup_ro(r3, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) accept4$rose(r4, 0x0, &(0x7f0000000140), 0x100000) fstatfs(r0, &(0x7f0000000400)=""/128) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r5 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r5, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:46 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000065580900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:46 executing program 2: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, &(0x7f0000000000)=0x1, 0x4) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r2}, 0x8) 22:51:46 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$VT_RESIZE(r1, 0x4b69, &(0x7f0000000000)) 22:51:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(0x0, 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:46 executing program 3: socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1061.410117] audit: type=1804 audit(1575067906.925:157): pid=4333 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 22:51:47 executing program 3: socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:47 executing program 4: socket$netlink(0x10, 0x3, 0x14) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x20000) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) socket$vsock_stream(0x28, 0x1, 0x0) 22:51:47 executing program 2: ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) creat(&(0x7f00000005c0)='./file0\x00', 0x23) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000340)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() syz_open_procfs(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x10000000}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(0x0) socket$netlink(0x10, 0x3, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0xffffffff}, 0x1c) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) [ 1061.492746] audit: type=1804 audit(1575067906.955:158): pid=4339 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 22:51:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000600900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(0x0, 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) [ 1061.651410] audit: type=1400 audit(1575067907.165:159): avc: denied { create } for pid=4350 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 [ 1061.654264] devpts: called with bogus options [ 1061.693006] bond0: Releasing backup interface bond_slave_1 [ 1061.723295] devpts: called with bogus options 22:51:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup(0xffffffffffffffff) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x5, [0x571], [0xc1]}) 22:51:47 executing program 3: socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:47 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, &(0x7f0000000080)) 22:51:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000058650900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:47 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000001c0)={'veth0_to_hsr\x00', {0x2, 0x4e23, @multicast2}}) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000180)={@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x1, 0x5, [@dev={0xac, 0x14, 0x14, 0x15}, @multicast2, @loopback, @dev={0xac, 0x14, 0x14, 0xc}, @broadcast]}, 0x24) r3 = socket(0xa, 0x1, 0x0) socket(0x4, 0x3, 0x0) close(r3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x4, 0xfff}, &(0x7f0000000300)=0x8) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x14, &(0x7f00000003c0)=0x3, 0x4) sendmmsg$inet_sctp(r3, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@sndrcv={0x30, 0x84, 0x1, {0xb2, 0x8, 0x6, 0x7, 0x1, 0x5, 0x106, 0x0, r4}}], 0x30}], 0x1, 0x20000085) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000040)=0xfff, 0x4) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000280)) 22:51:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(0x0, 0x0) fallocate(r6, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:47 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x430}, {0xffffffffffffffff, 0x10092}, {0xffffffffffffffff, 0x4434}, {r3, 0x3}, {}], 0x1, 0x0, 0x0, 0x10043) 22:51:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000810900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000018000000000000005000000d944ece1f0ffffff18290000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4}, 0x8, 0x10, 0x0}, 0x78) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cgroup.max.descendants\x00', 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 22:51:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:48 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:48 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) 22:51:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000d70900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:48 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="0400cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac2773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e908e5a5d512b87ed3eb24d00020160d1f3f3c0da4b0638b1d331edbedf8a03a722ffa87cc2dfec4758b087c23cc9c5e726fea942494855d4bd3388b68a00"/196, @ANYRESOCT=0x0, @ANYRESOCT, @ANYRESHEX, @ANYRES16, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f000000002bc40dd887fc8dc4872bf5b65c87e9010100000000000000", @ANYRESOCT], 0x0, 0x16d}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 22:51:48 executing program 2: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\b'], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000440)={0x0, @loopback, 0x0, 0x0, 'lc\x00'}, 0x2c) 22:51:48 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304a242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee1df638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1062.772891] ptrace attach of "/root/syz-executor.4"[4455] was attempted by "/root/syz-executor.4"[4459] 22:51:48 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)) pipe2$9p(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 22:51:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000f00900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:48 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000640)) 22:51:48 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000040)) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000300010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:48 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x8) close(r0) 22:51:48 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r1, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r1, &(0x7f0000000400)=""/128) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000040)=ANY=[@ANYRESOCT=r2], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x6d, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x5, [0x0, 0x0, 0x1000000000570], [0xc1]}) [ 1063.185687] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:51:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:48 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x1e, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0x30}}, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)={0xd000, 0x84000}) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x20000, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000280)=0xc) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r3, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$IOC_PR_RELEASE(r6, 0x401070ca, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='d\x009&', @ANYRES16=r5, @ANYBLOB="68002cbd7000ffdbdf25030000000c0008000d0b0000000000000c00060001000000000000001c00070008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0c00030009000000000000000c0008000200000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x40}, 0xc080) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000800)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x804020}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x173, r5, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0x0, 0x3, 0x4000000000045}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x200}]}, 0x2c}, 0x1, 0x0, 0x0, 0x840}, 0xc040091) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x28000240}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x38, r5, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000840}, 0x80) 22:51:48 executing program 5: r0 = socket$inet6(0xa, 0x80009, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0xd9}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, "8b63e98a6e9a990ceacccaa0722f7b17adbfb251c09e5993d319d88199f6923e646c1d3eaad49bc3c0a86bd1683c51ec36b5d2dab5a220e04e0b20637e2b5a8dd3403bbe1ccf681d083e2307d3f5597b"}, 0xd8) 22:51:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1063.571195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4531 comm=syz-executor.2 22:51:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000020900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002a00)={[{@fat=@codepage={'codepage', 0x3d, '857'}}, {@numtail='nonumtail=0'}]}) 22:51:49 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = gettid() ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000000)=r2) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000180)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b0", 0x27, 0x11, 0x0, 0x0) 22:51:49 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800663214916852fca21208d3338f08d6d984b0b5055e0bcfe87b3271eb839795bfaa22b87e6c5f1a624d3f6696cb529af3e548085c8f3a3cbd23abea8689") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x100000000, 0x183000) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000140)={0x1, {0x8, 0x4, 0x0, 0x20}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1063.827460] FAT-fs (loop2): bogus number of reserved sectors [ 1063.886512] FAT-fs (loop2): Can't find a valid FAT filesystem 22:51:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000030900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:49 executing program 4: mkdir(0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) eventfd2(0x0, 0x0) syz_open_dev$vivid(0x0, 0x0, 0x2) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) 22:51:49 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1063.971968] FAT-fs (loop2): bogus number of reserved sectors [ 1063.997392] FAT-fs (loop2): Can't find a valid FAT filesystem 22:51:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:49 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) 22:51:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd00000010000100020c1000418e00000004fcff", 0x58}], 0x1) 22:51:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000040900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:49 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$VT_RESIZE(r1, 0x4bfa, &(0x7f0000000000)) 22:51:49 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:49 executing program 2: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) prctl$PR_CAPBSET_DROP(0x18, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x1, 0x2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0xb, 0x44031, 0xffffffffffffffff, 0x0) [ 1064.433886] audit: type=1804 audit(1575067909.945:160): pid=4628 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 22:51:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:50 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 22:51:50 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="92d2b3"], 0x3) close(0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, 0x0) [ 1064.494350] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1064.519827] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 22:51:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000050900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:50 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$VT_RESIZE(r1, 0x4b6a, &(0x7f0000000000)) [ 1064.637512] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1064.670082] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 22:51:50 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000100)={0x3, 0x0, 0x3, 0x3}) 22:51:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r4}) [ 1064.746784] audit: type=1804 audit(1575067910.265:161): pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/" dev="sda1" ino=2328 res=1 22:51:50 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@rand_addr="9985b7872a0fccee58800c0658360f0a", @mcast1, @empty, 0x0, 0x8}) 22:51:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000060900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1064.841581] audit: type=1804 audit(1575067910.275:162): pid=4660 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/" dev="sda1" ino=2328 res=1 22:51:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb904024865160b000000d4036efb12001e00020a000040d819a9ffe200000000", 0x1ae}], 0x1}, 0x0) 22:51:50 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) socket$inet(0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f0000000680)) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 22:51:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 22:51:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000080900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:50 executing program 4: r0 = memfd_create(&(0x7f0000000140)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\xd5\xb0\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) 22:51:50 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r4}) 22:51:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) 22:51:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:51 executing program 4: socket(0x0, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) 22:51:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x5, [0x0, 0x0, 0x10a], [0xc1]}) 22:51:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000090900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r4}) 22:51:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:51 executing program 5: r0 = pkey_alloc(0x0, 0x0) pkey_free(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000180)={0xfffffeff, 0x0, 0x3, 'queue0\x00', 0x2}) r2 = inotify_init() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9001809}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r4, 0x100, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x441002}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r4, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x70, 0x10001, 0x7, 0x2}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x2400c0d0}, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x10001) inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0xfe) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r5, &(0x7f0000000540)=ANY=[], 0x133) socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x4000, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000180)={@rand_addr="0299c4c96da4e4d986b546fe0db936a9", 0x3e, r7}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) 22:51:51 executing program 4: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'batadv0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="03020000166d9e1f7cfc04008c4fdb62675d65fc27a55687e6f1daa864098f5332dc16cd0a"]}) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x2b5}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="260000001000f5680300c10100de96ab8d55ca381000000000ba00000000e13a06000300", 0x24) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 22:51:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) 22:51:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000a0900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:51 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\r\x00\x00\x00\x00\t\x00', @ifru_names='bond_slave_1\x00'}) [ 1066.026089] program syz-executor.2 is using a deprecated SCSI ioctl, please convert it to SG_IO 22:51:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1066.076566] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 22:51:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x5, [0x4000009f], [0xc1]}) 22:51:51 executing program 5: shmget(0x1, 0x2000, 0xe76a7dc341c9cf34, &(0x7f0000ffc000/0x2000)=nil) 22:51:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, 0x0) [ 1066.203680] bond0: Enslaving bond_slave_1 as an active interface with an up link 22:51:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000b0900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup(0xffffffffffffffff) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x5, [0x0, 0x0, 0x1000000000122], [0xc1]}) 22:51:51 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:51 executing program 2: r0 = pkey_alloc(0x0, 0x0) pkey_free(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000180)={0xfffffeff, 0x0, 0x3, 'queue0\x00', 0x2}) r2 = inotify_init() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x10001) inotify_add_watch(r2, &(0x7f0000000080)='.\x00', 0xfe) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x133) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@multicast2, @in6=@local, 0x4e23, 0x100, 0x4e20, 0x0, 0x2, 0x20, 0x20, 0x4, 0x0, r5}, {0x7fffffff, 0x1, 0x1000000005, 0x1, 0x9, 0xffffffffffff8f21, 0x5, 0x100}, {0x4, 0x6e2, 0x7ff}, 0x7f, 0x6e6bb7, 0x2, 0x1}, {{@in6=@mcast1, 0x4d2, 0x33}, 0xa, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x34ff, 0x1, 0x0, 0x3, 0x239f, 0xfffffffc, 0x9}}, 0xe8) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) 22:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000000)=0x100, 0xb5481f3e129391aa) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x800, r3, 0x1, 0x0, 0x6, @random="208ad9019612"}, 0x14) sendto$inet6(r2, &(0x7f0000000100)="1004000073d1600000000000fbf55b42b90516db4d916502c555cf09570300a44b29d9fde6ea94211af8e74b", 0x329, 0x5db0ef4e77e948cf, 0x0, 0x320) 22:51:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000c0900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x11, 0x0, &(0x7f0000000140)) 22:51:52 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 22:51:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, 0x0) 22:51:52 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000080)) 22:51:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000e0900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:52 executing program 2: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$VT_RESIZE(r1, 0x4b62, &(0x7f0000000000)) 22:51:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000000)={0x7b, 0x5, [0x400000b0], [0xc1]}) [ 1066.894411] audit: type=1804 audit(1575067912.405:163): pid=4854 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/" dev="sda1" ino=2328 res=1 22:51:52 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240), 0xc, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xffffffff00000000) write(0xffffffffffffffff, &(0x7f00000004c0)="719c3087b4ab1824a1fb8ed82f3a213b6a885cb4b6241bf2b735b08502c09c588d6b852a3e8e555f6bcd427b0000000000009d94d5f68b9b1d4eaa02eba8c1a48848c974b30bcec1f072157e938d8fb283cad2e1922a26cbb02123", 0x5b) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0x3ffffffffffffd, 0x7}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f36213db16b5b49}, {0x0, 0x3f}, {0xfffffffffffffffe}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) [ 1066.952087] audit: type=1804 audit(1575067912.435:164): pid=4857 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/" dev="sda1" ino=2328 res=1 22:51:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, 0x0) 22:51:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000f0900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:52 executing program 5: 22:51:52 executing program 4: 22:51:52 executing program 4: 22:51:52 executing program 5: 22:51:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:52 executing program 2: 22:51:52 executing program 4: 22:51:52 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000100)={0x2}) 22:51:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000100900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)) 22:51:53 executing program 2: 22:51:53 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:53 executing program 4: 22:51:53 executing program 5: 22:51:53 executing program 2: 22:51:53 executing program 5: 22:51:53 executing program 4: 22:51:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000480900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:53 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)) 22:51:53 executing program 5: 22:51:53 executing program 2: 22:51:53 executing program 4: 22:51:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000600900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:53 executing program 5: 22:51:53 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:53 executing program 2: 22:51:53 executing program 4: 22:51:53 executing program 5: 22:51:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000d70900010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)) 22:51:53 executing program 2: 22:51:53 executing program 4: 22:51:53 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:53 executing program 5: 22:51:53 executing program 2: 22:51:54 executing program 4: 22:51:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000003500010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:54 executing program 2: 22:51:54 executing program 5: 22:51:54 executing program 4: 22:51:54 executing program 0: 22:51:54 executing program 2: 22:51:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:54 executing program 5: 22:51:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000005800010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:54 executing program 0: 22:51:54 executing program 4: 22:51:54 executing program 0: 22:51:54 executing program 5: 22:51:54 executing program 4: 22:51:54 executing program 2: 22:51:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[], 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000300010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:54 executing program 0: 22:51:54 executing program 2: 22:51:54 executing program 4: 22:51:54 executing program 5: 22:51:54 executing program 0: 22:51:54 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:54 executing program 4: [ 1069.399551] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:51:55 executing program 2: 22:51:55 executing program 5: 22:51:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000700010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:55 executing program 0: 22:51:55 executing program 4: 22:51:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:55 executing program 5: 22:51:55 executing program 2: 22:51:55 executing program 0: 22:51:55 executing program 4: 22:51:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:55 executing program 5: 22:51:55 executing program 2: 22:51:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000001000010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:55 executing program 5: 22:51:55 executing program 0: 22:51:55 executing program 4: 22:51:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:55 executing program 2: 22:51:55 executing program 5: 22:51:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000003500010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:55 executing program 0: 22:51:55 executing program 4: 22:51:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:55 executing program 2: 22:51:55 executing program 5: 22:51:55 executing program 0: 22:51:55 executing program 5: 22:51:55 executing program 4: 22:51:55 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:55 executing program 2: 22:51:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000005800010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:56 executing program 4: 22:51:56 executing program 5: 22:51:56 executing program 0: 22:51:56 executing program 2: 22:51:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:56 executing program 5: 22:51:56 executing program 4: 22:51:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000903000067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:56 executing program 0: 22:51:56 executing program 2: 22:51:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:56 executing program 5: 22:51:56 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) getpid() socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x4800) write(r0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 22:51:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, 0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) 22:51:56 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = creat(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000004, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000003, 0x0, @perf_config_ext={0x0, 0x3}, 0x3000, 0x5, 0x1, 0x0, 0x2, 0xaea}, 0x0, 0x7, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000840)='./file1\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) open(0x0, 0x0, 0x0) 22:51:56 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) clone(0x801500, 0x0, &(0x7f0000000800), 0x0, 0x0) [ 1071.025514] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:51:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000904000067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) 22:51:56 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:51:56 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x0, 0x10, &(0x7f0000000000), 0xd3d8350b46034aaf}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getpid() r6 = getpgid(0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket(0x2000000000000021, 0x2, 0x10000000000002) dup2(r7, r8) kcmp(r5, r6, 0x0, r4, r7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r9}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)='&\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000040)='{#self\x00', r9}, 0x30) r11 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r11, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) kcmp(r2, r10, 0x1, r0, r11) [ 1071.352509] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:51:57 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000902010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:51:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=@v3={0x3000000, [], 0xffffffffffffffff}, 0x18, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:51:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000018000000000000005000000d944ece1f0ffffff18290000", @ANYRES32=r0, @ANYBLOB='\x00'/12], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x1d, &(0x7f0000000200)=""/29, 0x41000, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x504}, 0x10}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb400"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 22:51:57 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1071.728283] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:51:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1071.838958] batman_adv: batadv0: adding TT local entry 00:00:00:00:ff:ff to non-existent VLAN 4095 22:51:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000903010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1071.885522] batman_adv: batadv0: adding TT local entry 00:00:00:00:ff:ff to non-existent VLAN 4095 [ 1071.913706] batman_adv: batadv0: adding TT local entry 00:00:00:00:ff:ff to non-existent VLAN 4095 [ 1071.950282] batman_adv: batadv0: adding TT local entry 00:00:00:00:ff:ff to non-existent VLAN 4095 [ 1072.000343] batman_adv: batadv0: adding TT local entry 00:00:00:00:ff:ff to non-existent VLAN 4095 [ 1072.023373] batman_adv: batadv0: adding TT local entry 00:00:00:00:ff:ff to non-existent VLAN 4095 [ 1072.025392] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1072.058629] batman_adv: batadv0: adding TT local entry 00:00:00:00:ff:ff to non-existent VLAN 4095 [ 1072.079737] batman_adv: batadv0: adding TT local entry 00:00:00:00:ff:ff to non-existent VLAN 4095 [ 1072.083865] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1072.090769] batman_adv: batadv0: adding TT local entry 00:00:00:00:ff:ff to non-existent VLAN 4095 22:51:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000018000000000000005000000d944ece1f0ffffff18290000", @ANYRES32=r0, @ANYBLOB='\x00'/12], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x1d, &(0x7f0000000200)=""/29, 0x41000, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x504}, 0x10}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb400"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 22:51:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:51:57 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1072.104554] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 22:51:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1072.162071] batman_adv: batadv0: adding TT local entry 00:00:00:00:ff:ff to non-existent VLAN 4095 [ 1072.167286] device bridge_slave_0 left promiscuous mode [ 1072.190006] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.247215] device bridge_slave_1 left promiscuous mode [ 1072.270894] bridge0: port 2(bridge_slave_1) entered disabled state 22:51:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1072.360686] bond0: Releasing backup interface bond_slave_0 22:51:58 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) fstatfs(r1, &(0x7f0000000200)=""/128) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000000)="03aa338afa2cd46d2cb999166e6624da4eaf56212a7ef01f76e8ceb75d9d74f7acada7be8159ef5476dfcb") fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x1}, 0x28, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x4, 0x0, &(0x7f0000000080)) 22:51:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000018000000000000005000000d944ece1f0ffffff18290000", @ANYRES32=r0, @ANYBLOB='\x00'/12], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x1d, &(0x7f0000000200)=""/29, 0x41000, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x504}, 0x10}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb400"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) [ 1072.935652] bond0: Releasing backup interface bond_slave_1 [ 1073.218256] team0: Port device team_slave_0 removed 22:51:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=@v3={0x3000000, [], 0xffffffffffffffff}, 0x18, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 22:51:58 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:58 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000080)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) 22:51:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1073.372899] team0: Port device team_slave_1 removed [ 1073.379158] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:51:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000904010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 22:51:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:51:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:59 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000080)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) [ 1073.587492] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:51:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:51:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 22:51:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000905010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1073.778523] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1073.830538] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1073.872523] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1074.007958] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:51:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000018000000000000005000000d944ece1f0ffffff18290000", @ANYRES32=r0, @ANYBLOB='\x00'/12], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x1d, &(0x7f0000000200)=""/29, 0x41000, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x504}, 0x10}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 22:51:59 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000080)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000000c0)) 22:51:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 22:51:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x12, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000906010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 22:51:59 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @remote}, {0x6, @random="74db4c4adccb"}, 0x40, {0x2, 0x4e24, @rand_addr=0x62}, 'team_slave_1\x00'}) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) 22:51:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x12, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:51:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000018000000000000005000000d944ece1f0ffffff18290000", @ANYRES32=r0, @ANYBLOB='\x00'/12], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x1d, &(0x7f0000000200)=""/29, 0x41000, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x504}, 0x10}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 22:51:59 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000080)) [ 1074.261574] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:51:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 22:51:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000908010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:51:59 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x12, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:00 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @remote}, {0x6, @random="74db4c4adccb"}, 0x40, {0x2, 0x4e24, @rand_addr=0x62}, 'team_slave_1\x00'}) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) 22:52:00 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) 22:52:00 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @remote}, {0x6, @random="74db4c4adccb"}, 0x40, {0x2, 0x4e24, @rand_addr=0x62}, 'team_slave_1\x00'}) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) 22:52:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1074.623192] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:52:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000018000000000000005000000d944ece1f0ffffff18290000", @ANYRES32=r0, @ANYBLOB='\x00'/12], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x1d, &(0x7f0000000200)=""/29, 0x41000, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x5, 0x0, 0x504}, 0x10}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="000e003f0000007e5bc5795eca0000080000000000000000ffff81", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0x212, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 22:52:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1b, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000909010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:00 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) 22:52:00 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @remote}, {0x6, @random="74db4c4adccb"}, 0x40, {0x2, 0x4e24, @rand_addr=0x62}, 'team_slave_1\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1b, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1074.911511] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:52:00 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = socket(0xa, 0x1, 0x0) close(r1) 22:52:00 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @remote}, {0x6, @random="74db4c4adccb"}, 0x40, {0x2, 0x4e24, @rand_addr=0x62}, 'team_slave_1\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090a010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:00 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @remote}, {0x6, @random="74db4c4adccb"}, 0x40, {0x2, 0x4e24, @rand_addr=0x62}, 'team_slave_1\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) [ 1075.216553] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:52:00 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r1 = dup3(0xffffffffffffffff, r0, 0xc0000) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x7, @random="231b993e666c"}, 0x8, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r2, 0x4605, &(0x7f0000000000)) 22:52:00 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1b, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:00 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) socket(0xa, 0x1, 0x0) 22:52:00 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000040)) 22:52:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090b010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:00 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000040)) 22:52:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:01 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1075.516494] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:52:01 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r1 = dup3(0xffffffffffffffff, r0, 0xc0000) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x7, @random="231b993e666c"}, 0x8, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r2, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090c010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:01 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000040)) 22:52:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:01 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r1 = dup3(0xffffffffffffffff, r0, 0xc0000) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x7, @random="231b993e666c"}, 0x8, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r2, 0x4605, &(0x7f0000000000)) [ 1075.830489] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:52:01 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:01 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r1 = dup3(0xffffffffffffffff, r0, 0xc0000) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x7, @random="231b993e666c"}, 0x8, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090e010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:01 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r1 = dup3(0xffffffffffffffff, r0, 0xc0000) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x7, @random="231b993e666c"}, 0x8, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1076.196521] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:52:01 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090f010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:01 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r1 = dup3(0xffffffffffffffff, r0, 0xc0000) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x7, @random="231b993e666c"}, 0x8, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:01 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x22, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:02 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) dup3(0xffffffffffffffff, r0, 0xc0000) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) [ 1076.516510] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:52:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:02 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x24, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000910010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:02 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) dup3(0xffffffffffffffff, r0, 0xc0000) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:02 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x24, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:02 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1076.858874] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:52:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) dup3(0xffffffffffffffff, r0, 0xc0000) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000948010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:02 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x24, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:02 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x7, @random="231b993e666c"}, 0x8, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1077.201531] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:52:02 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 5: socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x7, @random="231b993e666c"}, 0x8, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x24, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:02 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000960010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:02 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x7, @random="231b993e666c"}, 0x8, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x24, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:03 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1077.540036] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.1'. 22:52:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:03 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009d7010067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x24, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:03 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:03 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x24, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000e0067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:03 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:03 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x24, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:03 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1078.191196] netlink: 'syz-executor.1': attribute type 14 has an invalid length. 22:52:03 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x8, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900350067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x24, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:03 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:03 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {0x2, 0x0, @rand_addr=0x3}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:04 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009003f0067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:04 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:04 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:04 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900020067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:04 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:04 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900080067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:04 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:04 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:05 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:05 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:05 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:05 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:05 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x4, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000e0067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:05 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:05 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:05 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1079.840620] netlink: 'syz-executor.1': attribute type 14 has an invalid length. 22:52:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900100067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:05 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:05 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:05 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:05 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:05 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:05 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:05 executing program 2 (fault-call:2 fault-nth:0): ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900350067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:05 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) [ 1080.332165] FAULT_INJECTION: forcing a failure. [ 1080.332165] name failslab, interval 1, probability 0, space 0, times 0 [ 1080.364494] CPU: 1 PID: 5922 Comm: syz-executor.2 Not tainted 4.19.86-syzkaller #0 [ 1080.372268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.372281] Call Trace: [ 1080.384249] dump_stack+0x197/0x210 [ 1080.387903] should_fail.cold+0xa/0x1b [ 1080.391811] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1080.396932] ? lock_downgrade+0x880/0x880 [ 1080.401103] __should_failslab+0x121/0x190 [ 1080.401125] should_failslab+0x9/0x14 [ 1080.409155] __kmalloc+0x2e2/0x750 [ 1080.412721] ? rcu_read_lock_sched_held+0x110/0x130 [ 1080.417751] ? kfree+0x1f7/0x220 [ 1080.421137] ? fb_alloc_cmap_gfp+0x16d/0x310 [ 1080.425563] fb_alloc_cmap_gfp+0x16d/0x310 22:52:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1080.429817] fb_set_user_cmap+0x143/0x440 [ 1080.433980] ? fb_cmap_to_user+0x480/0x480 [ 1080.438239] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1080.443795] ? _copy_from_user+0xdd/0x150 [ 1080.447961] do_fb_ioctl+0x650/0xab0 [ 1080.451691] ? fb_read+0x580/0x580 [ 1080.455251] ? kasan_check_read+0x11/0x20 [ 1080.459412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1080.459431] ? avc_has_extended_perms+0xa78/0x10f0 [ 1080.459456] ? avc_ss_reset+0x190/0x190 [ 1080.473876] ? kasan_check_read+0x11/0x20 [ 1080.473902] ? mark_held_locks+0x100/0x100 [ 1080.473919] ? proc_cwd_link+0x1d0/0x1d0 [ 1080.486351] ? __fget+0x340/0x540 [ 1080.489827] fb_ioctl+0xe6/0x130 [ 1080.493203] ? do_fb_ioctl+0xab0/0xab0 [ 1080.497190] do_vfs_ioctl+0xd5f/0x1380 [ 1080.501100] ? selinux_file_ioctl+0x46f/0x5e0 [ 1080.505608] ? selinux_file_ioctl+0x125/0x5e0 [ 1080.510117] ? ioctl_preallocate+0x210/0x210 [ 1080.514548] ? selinux_file_mprotect+0x620/0x620 [ 1080.519326] ? iterate_fd+0x360/0x360 [ 1080.523135] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1080.528681] ? fput+0x128/0x1a0 22:52:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1080.531981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1080.537535] ? security_file_ioctl+0x8d/0xc0 [ 1080.541956] ksys_ioctl+0xab/0xd0 [ 1080.545421] __x64_sys_ioctl+0x73/0xb0 [ 1080.549327] do_syscall_64+0xfd/0x620 [ 1080.553149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1080.558336] RIP: 0033:0x45a679 [ 1080.558352] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:52:06 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:06 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) [ 1080.558360] RSP: 002b:00007f173f0abc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1080.580458] RAX: ffffffffffffffda RBX: 00007f173f0abc90 RCX: 000000000045a679 [ 1080.580468] RDX: 0000000020000000 RSI: 0000000000004605 RDI: 0000000000000003 [ 1080.580476] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1080.580484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f173f0ac6d4 [ 1080.580491] R13: 00000000004cfd60 R14: 00000000004db178 R15: 0000000000000004 22:52:06 executing program 5 (fault-call:2 fault-nth:0): ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:06 executing program 2 (fault-call:2 fault-nth:1): ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900000367726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:06 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:06 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:06 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x2, &(0x7f0000000000)) 22:52:06 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:06 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 22:52:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010267726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:06 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4600, &(0x7f0000000000)) 22:52:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1081.274537] FAULT_INJECTION: forcing a failure. [ 1081.274537] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.299085] CPU: 0 PID: 6010 Comm: syz-executor.2 Not tainted 4.19.86-syzkaller #0 [ 1081.306857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1081.316229] Call Trace: [ 1081.318822] dump_stack+0x197/0x210 [ 1081.322452] should_fail.cold+0xa/0x1b [ 1081.326337] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1081.331437] ? lock_downgrade+0x880/0x880 [ 1081.335583] __should_failslab+0x121/0x190 [ 1081.339807] should_failslab+0x9/0x14 [ 1081.343594] __kmalloc+0x2e2/0x750 [ 1081.347127] ? rcu_read_lock_sched_held+0x110/0x130 [ 1081.352128] ? kfree+0x1f7/0x220 [ 1081.355485] ? fb_alloc_cmap_gfp+0x1ab/0x310 [ 1081.359884] fb_alloc_cmap_gfp+0x1ab/0x310 [ 1081.364108] fb_set_user_cmap+0x143/0x440 [ 1081.368246] ? fb_cmap_to_user+0x480/0x480 [ 1081.372479] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1081.378006] ? _copy_from_user+0xdd/0x150 [ 1081.382144] do_fb_ioctl+0x650/0xab0 [ 1081.385845] ? fb_read+0x580/0x580 [ 1081.389387] ? kasan_check_read+0x11/0x20 [ 1081.393539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1081.399065] ? avc_has_extended_perms+0xa78/0x10f0 [ 1081.403998] ? avc_ss_reset+0x190/0x190 [ 1081.407980] ? kasan_check_read+0x11/0x20 [ 1081.412124] ? mark_held_locks+0x100/0x100 [ 1081.416351] ? proc_cwd_link+0x1d0/0x1d0 [ 1081.420416] ? __fget+0x340/0x540 [ 1081.423877] fb_ioctl+0xe6/0x130 [ 1081.427232] ? do_fb_ioctl+0xab0/0xab0 [ 1081.431107] do_vfs_ioctl+0xd5f/0x1380 [ 1081.435000] ? selinux_file_ioctl+0x46f/0x5e0 [ 1081.439483] ? selinux_file_ioctl+0x125/0x5e0 [ 1081.443965] ? ioctl_preallocate+0x210/0x210 [ 1081.448359] ? selinux_file_mprotect+0x620/0x620 [ 1081.453121] ? iterate_fd+0x360/0x360 [ 1081.456910] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1081.462439] ? fput+0x128/0x1a0 [ 1081.465711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1081.471249] ? security_file_ioctl+0x8d/0xc0 [ 1081.475648] ksys_ioctl+0xab/0xd0 [ 1081.479093] __x64_sys_ioctl+0x73/0xb0 [ 1081.482971] do_syscall_64+0xfd/0x620 [ 1081.486782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.491971] RIP: 0033:0x45a679 [ 1081.495161] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1081.514083] RSP: 002b:00007f173f0abc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:52:07 executing program 2 (fault-call:2 fault-nth:2): ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 22:52:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010367726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:07 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4601, &(0x7f0000000000)) 22:52:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:07 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1081.521795] RAX: ffffffffffffffda RBX: 00007f173f0abc90 RCX: 000000000045a679 [ 1081.529053] RDX: 0000000020000000 RSI: 0000000000004605 RDI: 0000000000000003 [ 1081.536313] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1081.543570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f173f0ac6d4 [ 1081.550845] R13: 00000000004cfd60 R14: 00000000004db178 R15: 0000000000000004 22:52:07 executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:07 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4602, &(0x7f0000000000)) 22:52:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe5"], 0xeb) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 1081.657433] FAULT_INJECTION: forcing a failure. [ 1081.657433] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.767823] CPU: 1 PID: 6026 Comm: syz-executor.2 Not tainted 4.19.86-syzkaller #0 [ 1081.775593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1081.784963] Call Trace: [ 1081.787573] dump_stack+0x197/0x210 [ 1081.791229] should_fail.cold+0xa/0x1b [ 1081.795152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1081.800282] ? lock_downgrade+0x880/0x880 [ 1081.804473] __should_failslab+0x121/0x190 [ 1081.808725] should_failslab+0x9/0x14 [ 1081.812539] __kmalloc+0x2e2/0x750 [ 1081.816104] ? fb_alloc_cmap_gfp+0x1f2/0x310 [ 1081.820534] fb_alloc_cmap_gfp+0x1f2/0x310 [ 1081.824789] fb_set_user_cmap+0x143/0x440 [ 1081.828970] ? fb_cmap_to_user+0x480/0x480 [ 1081.838525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1081.844084] ? _copy_from_user+0xdd/0x150 [ 1081.848255] do_fb_ioctl+0x650/0xab0 [ 1081.851985] ? fb_read+0x580/0x580 [ 1081.855566] ? kasan_check_read+0x11/0x20 [ 1081.859735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1081.865291] ? avc_has_extended_perms+0xa78/0x10f0 [ 1081.870241] ? avc_ss_reset+0x190/0x190 [ 1081.874218] ? kasan_check_read+0x11/0x20 [ 1081.878368] ? mark_held_locks+0x100/0x100 [ 1081.882595] ? proc_cwd_link+0x1d0/0x1d0 [ 1081.886653] ? __fget+0x340/0x540 [ 1081.890110] fb_ioctl+0xe6/0x130 [ 1081.893465] ? do_fb_ioctl+0xab0/0xab0 [ 1081.897347] do_vfs_ioctl+0xd5f/0x1380 [ 1081.901225] ? selinux_file_ioctl+0x46f/0x5e0 [ 1081.905712] ? selinux_file_ioctl+0x125/0x5e0 [ 1081.910207] ? ioctl_preallocate+0x210/0x210 [ 1081.914609] ? selinux_file_mprotect+0x620/0x620 [ 1081.919357] ? iterate_fd+0x360/0x360 [ 1081.923151] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1081.928677] ? fput+0x128/0x1a0 [ 1081.931968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1081.937492] ? security_file_ioctl+0x8d/0xc0 [ 1081.941891] ksys_ioctl+0xab/0xd0 [ 1081.945336] __x64_sys_ioctl+0x73/0xb0 [ 1081.949215] do_syscall_64+0xfd/0x620 [ 1081.953098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1081.958278] RIP: 0033:0x45a679 [ 1081.961462] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1081.980363] RSP: 002b:00007f173f0abc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1081.988061] RAX: ffffffffffffffda RBX: 00007f173f0abc90 RCX: 000000000045a679 [ 1081.995331] RDX: 0000000020000000 RSI: 0000000000004605 RDI: 0000000000000003 [ 1082.002589] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1082.009847] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f173f0ac6d4 22:52:07 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4604, &(0x7f0000000000)) 22:52:07 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1082.017104] R13: 00000000004cfd60 R14: 00000000004db178 R15: 0000000000000004 22:52:07 executing program 2 (fault-call:2 fault-nth:3): ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe5"], 0xeb) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010467726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:07 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:07 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4606, &(0x7f0000000000)) 22:52:07 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1082.226661] FAULT_INJECTION: forcing a failure. [ 1082.226661] name failslab, interval 1, probability 0, space 0, times 0 [ 1082.275574] CPU: 1 PID: 6066 Comm: syz-executor.2 Not tainted 4.19.86-syzkaller #0 [ 1082.283335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.292794] Call Trace: [ 1082.295416] dump_stack+0x197/0x210 [ 1082.299070] should_fail.cold+0xa/0x1b [ 1082.302986] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1082.308107] ? lock_downgrade+0x880/0x880 [ 1082.312288] __should_failslab+0x121/0x190 [ 1082.316551] should_failslab+0x9/0x14 [ 1082.320349] __kmalloc+0x2e2/0x750 [ 1082.323896] ? fb_alloc_cmap_gfp+0x240/0x310 [ 1082.328315] fb_alloc_cmap_gfp+0x240/0x310 [ 1082.332566] fb_set_user_cmap+0x143/0x440 [ 1082.336728] ? fb_cmap_to_user+0x480/0x480 [ 1082.340975] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1082.346518] ? _copy_from_user+0xdd/0x150 [ 1082.350696] do_fb_ioctl+0x650/0xab0 [ 1082.354416] ? fb_read+0x580/0x580 [ 1082.354433] ? kasan_check_read+0x11/0x20 [ 1082.354452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1082.362131] ? avc_has_extended_perms+0xa78/0x10f0 [ 1082.362162] ? avc_ss_reset+0x190/0x190 [ 1082.376592] ? kasan_check_read+0x11/0x20 [ 1082.380763] ? mark_held_locks+0x100/0x100 [ 1082.385010] ? proc_cwd_link+0x1d0/0x1d0 [ 1082.389175] ? xfrm_state_update+0x530/0xd80 [ 1082.393605] ? __fget+0x340/0x540 [ 1082.397600] fb_ioctl+0xe6/0x130 [ 1082.400980] ? do_fb_ioctl+0xab0/0xab0 [ 1082.404882] do_vfs_ioctl+0xd5f/0x1380 [ 1082.408784] ? selinux_file_ioctl+0x46f/0x5e0 [ 1082.413292] ? selinux_file_ioctl+0x125/0x5e0 [ 1082.417807] ? ioctl_preallocate+0x210/0x210 [ 1082.422227] ? selinux_file_mprotect+0x620/0x620 [ 1082.427002] ? iterate_fd+0x360/0x360 [ 1082.430821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1082.436395] ? fput+0x128/0x1a0 [ 1082.439699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1082.445235] ? security_file_ioctl+0x8d/0xc0 [ 1082.445255] ksys_ioctl+0xab/0xd0 [ 1082.445275] __x64_sys_ioctl+0x73/0xb0 [ 1082.457045] do_syscall_64+0xfd/0x620 [ 1082.460862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1082.460876] RIP: 0033:0x45a679 22:52:07 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x460f, &(0x7f0000000000)) 22:52:07 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:07 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4610, &(0x7f0000000000)) 22:52:08 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1082.469243] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1082.488246] RSP: 002b:00007f173f0abc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1082.495980] RAX: ffffffffffffffda RBX: 00007f173f0abc90 RCX: 000000000045a679 [ 1082.503317] RDX: 0000000020000000 RSI: 0000000000004605 RDI: 0000000000000003 [ 1082.510603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1082.517923] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f173f0ac6d4 22:52:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010567726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1082.517932] R13: 00000000004cfd60 R14: 00000000004db178 R15: 0000000000000004 22:52:08 executing program 2 (fault-call:2 fault-nth:4): ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:08 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4611, &(0x7f0000000000)) 22:52:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe5"], 0xeb) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010667726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:08 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:08 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4b47, &(0x7f0000000000)) 22:52:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771"], 0x161) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x40) 22:52:08 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:08 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010867726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x40) 22:52:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x161) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:08 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4b49, &(0x7f0000000000)) 22:52:08 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:08 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x2, &(0x7f0000000000)) 22:52:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x40) 22:52:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x161) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:08 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4600, &(0x7f0000000000)) 22:52:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010967726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:08 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x541b, &(0x7f0000000000)) 22:52:08 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x19c) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:08 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x9}, 0x40) 22:52:09 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4601, &(0x7f0000000000)) 22:52:09 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5421, &(0x7f0000000000)) 22:52:09 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x19c) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:09 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4602, &(0x7f0000000000)) 22:52:09 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5450, &(0x7f0000000000)) 22:52:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010a67726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:09 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x9}, 0x40) 22:52:09 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5451, &(0x7f0000000000)) 22:52:09 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4604, &(0x7f0000000000)) 22:52:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x19c) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:09 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010b67726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:09 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5452, &(0x7f0000000000)) 22:52:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x9}, 0x40) 22:52:09 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4606, &(0x7f0000000000)) 22:52:09 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)) 22:52:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde08"], 0x1b9) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010c67726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:09 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5460, &(0x7f0000000000)) 22:52:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0", 0x0, 0x9}, 0x40) 22:52:09 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:09 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x460f, &(0x7f0000000000)) 22:52:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1b9) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:09 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x40049409, &(0x7f0000000000)) 22:52:09 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4610, &(0x7f0000000000)) 22:52:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010e67726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:09 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:09 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0", 0x0, 0x9}, 0x40) 22:52:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1b9) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:10 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x40086602, &(0x7f0000000000)) 22:52:10 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, 0x0) 22:52:10 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4611, &(0x7f0000000000)) 22:52:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0", 0x0, 0x9}, 0x40) 22:52:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010f67726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1c8) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:10 executing program 0 (fault-call:2 fault-nth:0): ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:10 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x40087602, &(0x7f0000000000)) 22:52:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e0000006302", 0x0, 0x9}, 0x40) 22:52:10 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4b47, &(0x7f0000000000)) 22:52:10 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4020940d, &(0x7f0000000000)) 22:52:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1c8) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e0000006302", 0x0, 0x9}, 0x40) 22:52:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900011067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:10 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:10 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4b49, &(0x7f0000000000)) 22:52:10 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80086601, &(0x7f0000000000)) 22:52:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1c8) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:10 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x2, &(0x7f0000000000)) 22:52:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e0000006302", 0x0, 0x9}, 0x40) 22:52:10 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x541b, &(0x7f0000000000)) 22:52:10 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4600, &(0x7f0000000000)) 22:52:10 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80087601, &(0x7f0000000000)) 22:52:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900014867726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1cf) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:10 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5421, &(0x7f0000000000)) 22:52:10 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14", 0x0, 0x9}, 0x40) 22:52:11 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4601, &(0x7f0000000000)) 22:52:11 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0045878, &(0x7f0000000000)) 22:52:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1cf) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:11 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5450, &(0x7f0000000000)) 22:52:11 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14", 0x0, 0x9}, 0x40) 22:52:11 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4602, &(0x7f0000000000)) 22:52:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900016067726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:11 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0045878, &(0x7f0000000000)) 22:52:11 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5451, &(0x7f0000000000)) 22:52:11 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14", 0x0, 0x9}, 0x40) 22:52:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1cf) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:11 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4604, &(0x7f0000000000)) 22:52:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001d767726564000000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:11 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0189436, &(0x7f0000000000)) 22:52:11 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140c", 0x0, 0x9}, 0x40) 22:52:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d3) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:11 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5452, &(0x7f0000000000)) 22:52:11 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4606, &(0x7f0000000000)) 22:52:11 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc020660b, &(0x7f0000000000)) 22:52:11 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140c", 0x0, 0x9}, 0x40) 22:52:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d3) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564020000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:11 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5460, &(0x7f0000000000)) 22:52:11 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x460f, &(0x7f0000000000)) 22:52:11 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140c", 0x0, 0x9}, 0x40) 22:52:11 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0684608, &(0x7f0000000000)) 22:52:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d3) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:12 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4610, &(0x7f0000000000)) 22:52:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0}, 0x40) 22:52:12 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x40049409, &(0x7f0000000000)) 22:52:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564030000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:12 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4611, &(0x7f0000000000)) 22:52:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d5) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:12 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x40086602, &(0x7f0000000000)) 22:52:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0}, 0x40) 22:52:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d5) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564040000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:12 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x4e22, @rand_addr=0x7f}, {}, 0x20, {0x2, 0x0, @rand_addr=0xfffffffc}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x200000000001, 0x403000) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) r5 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r8, 0x40000000af01, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r8, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r8, &(0x7f0000000240)=""/204, 0xffffff83) r10 = dup(r9) r11 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r11, 0x8004e500, 0x0) fstatfs(r11, &(0x7f0000000200)=""/128) r12 = accept4$unix(r2, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e, 0x41400) r13 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000600)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) r16 = getpid() sched_setscheduler(r16, 0x5, &(0x7f0000000380)) stat(&(0x7f00000007c0)='./file0/file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) r18 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) r19 = getuid() r20 = getegid() mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r18, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r19, @ANYBLOB=',group_id=', @ANYRESDEC=r20]) r21 = fcntl$getown(r5, 0x9) r22 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r22, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r22, 0x29, 0x23, &(0x7f0000000880)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r24 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) r25 = getuid() r26 = getegid() mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r24, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r25, @ANYBLOB=',group_id=', @ANYRESDEC=r26]) sendmsg$unix(r11, &(0x7f0000000a80)={&(0x7f0000000400)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000380)="7ce2b2721a7e5dc5e88b8a61bd884c5422ec32206678d4fbc86b844839d4d41033000836", 0x24}], 0x1, &(0x7f00000009c0)=[@rights={{0x18, 0x1, 0x1, [r8, r12]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @cred={{0x1c, 0x1, 0x2, {r16, r17, r20}}}, @cred={{0x1c, 0x1, 0x2, {r21, r23, r26}}}], 0x90, 0x20000000}, 0x20000000) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000000)={0x0, r10}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r10, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x30, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r10, 0x84, 0x79, &(0x7f00000001c0)={r4, 0x1000, 0x400}, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000300)={r7, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={r7, 0x80000000}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r27, 0x7, "75f0f695afd7c3"}, &(0x7f0000000200)=0xf) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={r4, 0x3ff}, 0x8) r28 = open(&(0x7f00000000c0)='./file0\x00', 0x101001, 0xa0) ioctl$DRM_IOCTL_MARK_BUFS(r28, 0x40206417, &(0x7f0000000100)={0x80, 0x3f, 0x0, 0x7, 0x17, 0x8}) 22:52:12 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4b47, &(0x7f0000000000)) 22:52:12 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x40087602, &(0x7f0000000000)) 22:52:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0}, 0x40) 22:52:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1d5) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:12 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4b49, &(0x7f0000000000)) 22:52:12 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9, 0x0, 0x0, 0x0, 0x0}, 0x40) 22:52:12 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4020940d, &(0x7f0000000000)) 22:52:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564050000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:12 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x541b, &(0x7f0000000000)) 22:52:12 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80086601, &(0x7f0000000000)) 22:52:13 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x2, @local}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @local}, 'bond_slave_1\x00'}) r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) write$vnet(r1, &(0x7f0000000240)={0x1, {&(0x7f0000000140)=""/145, 0x91, &(0x7f0000000200)=""/17, 0x2, 0x2}}, 0x68) 22:52:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9, 0x0, 0x0, 0x0, 0x0}, 0x40) 22:52:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:13 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5421, &(0x7f0000000000)) 22:52:13 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80087601, &(0x7f0000000000)) 22:52:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564060000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9, 0x0, 0x0, 0x0, 0x0}, 0x40) 22:52:13 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0045878, &(0x7f0000000000)) 22:52:13 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5450, &(0x7f0000000000)) 22:52:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:13 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/f\"0\x00', 0xc7b9d48b86de5466, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000080)="57ce3e344fc11d5d4d2768ed63b414c5b17c5a860ef8ec3a9cd3be9b2a5a61a1370863d96330a05b53ae65b374037cb4cd8cad5387a08f5ab3ffb6c8c35eb8e6f4ae02cb05a35ad2c112c412348342b31518f06d20c77db7091a269415f4dc83a9893c8b346dfa6edc039113f4fc8db820bdd042400eb0c3580d8900bbf2674de30d7f265f52ca17c9465abbf81007550480481eea1081c7d29bbf19ebba0907b7372e0bcd414c5641609c2b76ccdf6f508bc9c439db1e2cbbb8b8ddcc42e6bfad3efdd85dfb04aaf34c3db45a3116edd0eba74d047d50396a", 0xd9}, {&(0x7f0000000180)="4ec51e91186a654abbad0ead0de8c1efc5c5b1fbeecc3ef560c823a75f5400ca80911cfe339efac53ffb2bf617bb33ca94e67478a4dfca6aab92da83344cefc5fd7ceaa8defbf7df242981a84b6fd54c286240e59273df8a2108fed47d671e013f832a5c71b2411b8f12229760b43dd96b4090813a3d903f5dd783e4d869a73758254b5654bf859b8fdfb49f63dbc5057d62b43674e17753b0acbb76977ef320d9f2f6bfc076126527a1dff22db41a9d25f5375b263d477ef8d55c6257e6ecb3e32619223e7f5cc55195e78a47211e5a4e6a329c26f64a45c893777c9780d8186da87980239731295249", 0xea}, {&(0x7f0000000280)="436fca936605c7008dacc940c04bd9e0a91de3a7104252fc31eec29fb431582fa1b2440a9478d28e5f8a066ba7711218360151d712a7e21f1f17a836b3c30f4fd2f4308153d740f5be97dcd1a6509d3013fcc80906b4a7f842c2795526c7f2777267c386c3e4c23d5aab5d3aba37936abf3a2b9719d6986ac9ac5f6e342e036e2c61bb9c29ab6710c9617241bfcd02110e0b06780e1ae7507872df017a34d10b41570aeb6deafdd2ae4594937c1a50722276ef5fdf04eb3ed7bbda835007", 0xbe}, {&(0x7f0000000340)="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", 0xfc}], 0x4) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564080000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:52:13 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0045878, &(0x7f0000000000)) 22:52:13 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5451, &(0x7f0000000000)) 22:52:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:13 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:52:13 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bo\xbcd_slave_LJ\x85\'\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb0\x00', 0x10c101, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x10000, 0x4}, 0xabae3a12e5324ac6}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r1, 0x0, 0x0, 0x0, &(0x7f000021affc)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000001200)=@broute={'broute\x00', 0x20, 0x5, 0xdc8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000200], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=ANY=[@ANYBLOB="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"/3519]}, 0xe37) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000fc0)={0xfd8, 0x3, "be0ae5f7ba0de1a7a2937f018994394439ce75db85be8d176b985323a427c824f5a88f26fb7407b729382f600a7cd010108594b2d6fe9b9995b5c2e2d700c918792a606a523635f73773b08fdb7869e1597643c2df283fbe30804fdd34555ef97792e0d2435ad2129aee9e3978773982317c5e9502d96cc466cf078fdaea5fb70faae71f977fe147fd205f03306920ff8a96e34bf42d256d163c0ed4b2ad9870baac5031da469734f60dd624a7d1b6f6ed13b3bdc718e3cc8130749968114a39a8f858e606638e3fda610493c537d9e28e37ce6c521e441fce82453507593650f72cf37e8f7a2c7be7307fa1c60ff2c90c2dcf35ddf49a3b95919a1dc8ccd54a"}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f0000000140)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000040)={0x7, 0x3ff}) getegid() ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f00000000c0)={0x0, 0x10000, 0x67d, 0xff}) 22:52:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564090000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:13 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5452, &(0x7f0000000000)) 22:52:14 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0189436, &(0x7f0000000000)) 22:52:14 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:52:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000100677265640a0000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:14 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x5460, &(0x7f0000000000)) 22:52:14 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {0x2, 0x4e24}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) fstatfs(r1, &(0x7f0000000200)=""/128) ioctl$KDSKBLED(r1, 0x4b65, 0xfffffffffffffffc) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x800, 0x400, 0x5, 0x91, 0x5, "1e135f5509d364c613f6aa8e01620ac9ed3205", 0x21f4, 0x5}) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:14 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc020660b, &(0x7f0000000000)) 22:52:14 executing program 3 (fault-call:5 fault-nth:0): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:14 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x40049409, &(0x7f0000000000)) 22:52:14 executing program 5: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x10000, 0xf4) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) fstatfs(r0, &(0x7f0000000200)=""/128) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) socket$unix(0x1, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x12, 0xffffffffffffffff, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x8, 0x2, 0x12, r1, 0x0) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x4000000, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x9, 0x50, r1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r2, &(0x7f0000005b40), 0x400000000000122, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r6 = accept$unix(r5, &(0x7f0000000140), 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r6, 0xcaacf000) socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) readahead(r7, 0x4, 0x0) sendmmsg(r3, &(0x7f0000005b40), 0x400000000000122, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local, 'tunl0\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) socket$pppoe(0x18, 0x1, 0x0) 22:52:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000100677265640b0000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1088.866718] FAULT_INJECTION: forcing a failure. [ 1088.866718] name failslab, interval 1, probability 0, space 0, times 0 [ 1088.907602] CPU: 1 PID: 6747 Comm: syz-executor.3 Not tainted 4.19.86-syzkaller #0 [ 1088.915369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.924726] Call Trace: [ 1088.927328] dump_stack+0x197/0x210 [ 1088.930981] should_fail.cold+0xa/0x1b [ 1088.934900] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1088.940026] ? lock_downgrade+0x880/0x880 [ 1088.944242] __should_failslab+0x121/0x190 [ 1088.948579] should_failslab+0x9/0x14 [ 1088.952387] __kmalloc+0x2e2/0x750 [ 1088.955940] ? kasan_check_read+0x11/0x20 [ 1088.960104] ? bpf_test_init.isra.0+0x95/0x100 [ 1088.972261] bpf_test_init.isra.0+0x95/0x100 [ 1088.976696] bpf_prog_test_run_skb+0x11e/0xb20 [ 1088.981297] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1088.986247] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1088.991805] ? fput+0x128/0x1a0 [ 1088.995101] ? __bpf_prog_get+0x97/0x290 [ 1088.999178] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1089.004077] bpf_prog_test_run+0x129/0x1a0 [ 1089.008330] __x64_sys_bpf+0x397/0x4c0 [ 1089.012232] ? bpf_prog_get+0x20/0x20 [ 1089.016058] ? do_syscall_64+0x26/0x620 [ 1089.020049] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1089.024654] ? trace_hardirqs_on+0x67/0x220 [ 1089.028991] do_syscall_64+0xfd/0x620 [ 1089.032815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.038014] RIP: 0033:0x45a679 22:52:14 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x40086602, &(0x7f0000000000)) 22:52:14 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0684608, &(0x7f0000000000)) [ 1089.041217] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1089.060125] RSP: 002b:00007fc985e26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1089.060140] RAX: ffffffffffffffda RBX: 00007fc985e26c90 RCX: 000000000045a679 [ 1089.060146] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 1089.060154] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1089.060160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc985e276d4 [ 1089.060168] R13: 00000000004c0c1d R14: 00000000004d3b28 R15: 0000000000000005 22:52:14 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:14 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x40087602, &(0x7f0000000000)) 22:52:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1089.184396] audit: type=1400 audit(1575067934.685:165): avc: denied { map } for pid=6756 comm="syz-executor.5" path="/dev/dsp" dev="devtmpfs" ino=16324 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 22:52:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000100677265640c0000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:14 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) semget$private(0x0, 0x3, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:14 executing program 3 (fault-call:5 fault-nth:1): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:14 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4020940d, &(0x7f0000000000)) 22:52:14 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x2) 22:52:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:15 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = inotify_init1(0x100800) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0', [{0x20, '&\xc5,securityppp0[[^{\xc0'}, {0x20, 'eth1'}], 0xa, "0168ccc704b52046a5af538592b15b2786bf91b16afc68b030a8e613c15a2567074c88d0cdb38f1ef41278a3d50e4b1cf63314beea723ba84b90206dd47861a49688eff88f51d0af0721647d69f0e9868bf76fb54141449eec9dfd6c187e28eed897633419e155838b4fd0459177a5dbbf72d78d35663eadf8a3d3b66d09dde90c69766a7b3889e0ded1baf115f46c2d6ffcac5fb4543a9bad03840ccd0770fa475cb236b6f81f9adcdfbb2224fdca987d351c93545a2b3552a1e5d6d60e44bd563141cc448303ea2da182c13e1c96c7e6d3d2145e55c99bc811755fc7a6e6789987a6"}, 0x108) 22:52:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000100677265640e0000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1089.608137] FAULT_INJECTION: forcing a failure. [ 1089.608137] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.635348] CPU: 1 PID: 6813 Comm: syz-executor.3 Not tainted 4.19.86-syzkaller #0 [ 1089.643217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.652585] Call Trace: [ 1089.655201] dump_stack+0x197/0x210 [ 1089.658861] should_fail.cold+0xa/0x1b [ 1089.662776] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1089.667903] ? __might_fault+0x12b/0x1e0 [ 1089.671992] __should_failslab+0x121/0x190 [ 1089.676242] should_failslab+0x9/0x14 [ 1089.680061] kmem_cache_alloc+0x47/0x700 [ 1089.684137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1089.689682] ? __phys_addr+0xa4/0x120 [ 1089.693494] ? kasan_unpoison_shadow+0x35/0x50 [ 1089.698101] __build_skb+0x3e/0x310 [ 1089.701747] build_skb+0x21/0x1a0 22:52:15 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80086601, &(0x7f0000000000)) 22:52:15 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x10) [ 1089.705224] bpf_prog_test_run_skb+0x1b7/0xb20 [ 1089.709822] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1089.714681] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1089.720233] ? fput+0x128/0x1a0 [ 1089.720251] ? __bpf_prog_get+0x97/0x290 [ 1089.720270] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1089.727618] bpf_prog_test_run+0x129/0x1a0 [ 1089.727635] __x64_sys_bpf+0x397/0x4c0 [ 1089.727649] ? bpf_prog_get+0x20/0x20 [ 1089.727672] ? do_syscall_64+0x26/0x620 [ 1089.727688] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1089.727703] ? trace_hardirqs_on+0x67/0x220 [ 1089.727721] do_syscall_64+0xfd/0x620 [ 1089.727741] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1089.727752] RIP: 0033:0x45a679 [ 1089.727768] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1089.753050] RSP: 002b:00007fc985e26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1089.753068] RAX: ffffffffffffffda RBX: 00007fc985e26c90 RCX: 000000000045a679 22:52:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:15 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80087601, &(0x7f0000000000)) [ 1089.753077] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 1089.753084] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1089.753095] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc985e276d4 [ 1089.788472] R13: 00000000004c0c1d R14: 00000000004d3b28 R15: 0000000000000005 22:52:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:15 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x4000) 22:52:15 executing program 3 (fault-call:5 fault-nth:2): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:15 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000300)={r3, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={r3, 0x8}, 0x8) ioctl$int_in(r0, 0x40000000af01, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r0, &(0x7f0000000240)=""/204, 0xffffff83) r5 = dup(r4) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r5}) perf_event_open(&(0x7f0000000140)={0x4, 0x70, 0x6, 0x15, 0x1f, 0x7, 0x0, 0x401, 0x1, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0xfff, 0x1f}, 0x20000, 0x1, 0x5, 0xe, 0xfffffffffffff801, 0x0, 0x101}, 0x0, 0x1, r5, 0x15) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x30, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) ioctl$sock_inet_SIOCGARP(r5, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @random="231b993e666c"}, 0x0, {0x2, 0x0, @local}, 'bond_slave_1\x00'}) r6 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r6, 0x4605, &(0x7f0000000000)) 22:52:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000009000100677265640f0000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1090.084651] FAULT_INJECTION: forcing a failure. [ 1090.084651] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.096178] CPU: 0 PID: 6850 Comm: syz-executor.3 Not tainted 4.19.86-syzkaller #0 [ 1090.103902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.113266] Call Trace: [ 1090.115868] dump_stack+0x197/0x210 [ 1090.119518] should_fail.cold+0xa/0x1b [ 1090.123429] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1090.128645] ? is_bpf_text_address+0xd3/0x170 [ 1090.133160] ? kernel_text_address+0x73/0xf0 [ 1090.137594] __should_failslab+0x121/0x190 [ 1090.141847] should_failslab+0x9/0x14 [ 1090.145751] kmem_cache_alloc+0x47/0x700 [ 1090.149838] skb_clone+0x156/0x3e0 [ 1090.153399] bpf_clone_redirect+0xb2/0x480 [ 1090.157657] bpf_prog_e2f29814702bf05a+0x951/0x1000 [ 1090.162784] ? mark_held_locks+0x100/0x100 [ 1090.167032] ? bpf_test_run+0x71/0x430 [ 1090.170934] ? find_held_lock+0x35/0x130 [ 1090.175041] ? bpf_test_run+0x71/0x430 [ 1090.178955] ? ktime_get+0x105/0x2f0 [ 1090.182691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1090.188238] ? check_preemption_disabled+0x48/0x290 [ 1090.193272] ? lock_acquire+0x16f/0x3f0 [ 1090.197445] ? kasan_check_read+0x11/0x20 [ 1090.201611] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 1090.206812] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1090.212361] bpf_test_run+0x10d/0x430 [ 1090.216192] bpf_prog_test_run_skb+0x64b/0xb20 [ 1090.220790] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1090.225656] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1090.231194] ? fput+0x128/0x1a0 [ 1090.234478] ? __bpf_prog_get+0x97/0x290 [ 1090.238548] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1090.243408] bpf_prog_test_run+0x129/0x1a0 [ 1090.247660] __x64_sys_bpf+0x397/0x4c0 [ 1090.251564] ? bpf_prog_get+0x20/0x20 [ 1090.255391] ? do_syscall_64+0x26/0x620 [ 1090.259381] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1090.263980] ? trace_hardirqs_on+0x67/0x220 [ 1090.268326] do_syscall_64+0xfd/0x620 [ 1090.272155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.277362] RIP: 0033:0x45a679 [ 1090.280571] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.299593] RSP: 002b:00007fc985e26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1090.307319] RAX: ffffffffffffffda RBX: 00007fc985e26c90 RCX: 000000000045a679 [ 1090.314627] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 1090.321917] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:52:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 22:52:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 22:52:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 22:52:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) 22:52:15 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x7600) 22:52:15 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0045878, &(0x7f0000000000)) [ 1090.321933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc985e276d4 [ 1090.337362] R13: 00000000004c0c1d R14: 00000000004d3b28 R15: 0000000000000005 22:52:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564100000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:16 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0045878, &(0x7f0000000000)) 22:52:16 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x9600) 22:52:16 executing program 3 (fault-call:5 fault-nth:3): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1090.681813] FAULT_INJECTION: forcing a failure. [ 1090.681813] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.693222] CPU: 0 PID: 6901 Comm: syz-executor.3 Not tainted 4.19.86-syzkaller #0 [ 1090.700950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.710311] Call Trace: [ 1090.710336] dump_stack+0x197/0x210 [ 1090.710363] should_fail.cold+0xa/0x1b [ 1090.710384] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1090.716584] ? is_bpf_text_address+0xd3/0x170 [ 1090.716603] ? kernel_text_address+0x73/0xf0 [ 1090.716625] __should_failslab+0x121/0x190 [ 1090.716642] should_failslab+0x9/0x14 [ 1090.742550] kmem_cache_alloc+0x47/0x700 [ 1090.746934] skb_clone+0x156/0x3e0 [ 1090.750481] bpf_clone_redirect+0xb2/0x480 [ 1090.754725] bpf_prog_e2f29814702bf05a+0x13b/0x1000 [ 1090.759750] ? mark_held_locks+0x100/0x100 [ 1090.763977] ? bpf_test_run+0x71/0x430 [ 1090.767852] ? find_held_lock+0x35/0x130 [ 1090.771918] ? bpf_test_run+0x71/0x430 [ 1090.775812] ? ktime_get+0x105/0x2f0 [ 1090.779514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1090.785036] ? check_preemption_disabled+0x48/0x290 [ 1090.790041] ? lock_acquire+0x16f/0x3f0 [ 1090.794003] ? kasan_check_read+0x11/0x20 [ 1090.798169] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 1090.803371] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1090.809037] bpf_test_run+0x10d/0x430 [ 1090.812847] bpf_prog_test_run_skb+0x64b/0xb20 [ 1090.817464] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1090.822297] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1090.827829] ? fput+0x128/0x1a0 [ 1090.831100] ? __bpf_prog_get+0x97/0x290 [ 1090.835151] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1090.840119] bpf_prog_test_run+0x129/0x1a0 [ 1090.844349] __x64_sys_bpf+0x397/0x4c0 [ 1090.848227] ? bpf_prog_get+0x20/0x20 [ 1090.852024] ? do_syscall_64+0x26/0x620 [ 1090.855988] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1090.860563] ? trace_hardirqs_on+0x67/0x220 [ 1090.864894] do_syscall_64+0xfd/0x620 [ 1090.868690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1090.873869] RIP: 0033:0x45a679 [ 1090.877068] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1090.896160] RSP: 002b:00007fc985e26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1090.903887] RAX: ffffffffffffffda RBX: 00007fc985e26c90 RCX: 000000000045a679 [ 1090.911156] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 1090.918416] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1090.925686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc985e276d4 22:52:16 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0189436, &(0x7f0000000000)) 22:52:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, 0x0) 22:52:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564480000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:16 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x107100) [ 1090.932955] R13: 00000000004c0c1d R14: 00000000004d3b28 R15: 0000000000000005 22:52:16 executing program 3 (fault-call:5 fault-nth:4): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:16 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = socket(0xa, 0x1, 0x0) close(r0) sendmmsg$inet_sctp(r0, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32=r3, @ANYBLOB="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"], 0x8d0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@mcast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e21, 0x1, 0x4e21, 0x9, 0x1897e3e2f00f24ff, 0x80, 0x20, 0xe971c45a793694be, r3, r5}, {0x9, 0x6, 0x28, 0x7f, 0x10000, 0x0, 0x80000001, 0x7fff}, {0x8001, 0x0, 0x54, 0x2}, 0xffff0000, 0x6e6bc0, 0x4, 0x0, 0x2f7bcbffecd7c5cb}, {{@in6=@mcast2, 0x4d5, 0xff}, 0xa, @in6=@mcast1, 0x3500, 0x2, 0x0, 0x1, 0x8d, 0x5, 0x4}}, 0xe8) r6 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) r7 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r7, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r7, &(0x7f0000000400)=""/128) accept4$x25(r7, &(0x7f0000000180), &(0x7f00000001c0)=0x12, 0x80000) fcntl$setpipe(r0, 0x407, 0x8) ioctl$USBDEVFS_SETCONFIGURATION(r6, 0x4605, &(0x7f0000000000)) [ 1091.056208] FAULT_INJECTION: forcing a failure. [ 1091.056208] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.067838] CPU: 1 PID: 6912 Comm: syz-executor.3 Not tainted 4.19.86-syzkaller #0 [ 1091.075564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.084933] Call Trace: [ 1091.087541] dump_stack+0x197/0x210 [ 1091.091196] should_fail.cold+0xa/0x1b [ 1091.095109] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1091.100305] ? depot_save_stack+0x1de/0x44f [ 1091.104650] ? find_held_lock+0x35/0x130 [ 1091.108734] __should_failslab+0x121/0x190 [ 1091.112983] should_failslab+0x9/0x14 [ 1091.116795] kmem_cache_alloc_node_trace+0x5a/0x720 [ 1091.121817] ? __lock_acquire+0x6ee/0x49c0 [ 1091.126063] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1091.130655] ? trace_hardirqs_on+0x67/0x220 [ 1091.134988] __kmalloc_node_track_caller+0x3d/0x80 [ 1091.135010] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1091.135028] pskb_expand_head+0x154/0xe20 [ 1091.135040] ? save_stack+0x45/0xd0 [ 1091.135051] ? kasan_kmalloc+0xce/0xf0 22:52:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, 0x0) [ 1091.135169] ipgre_xmit+0x7d6/0xa80 [ 1091.135193] dev_hard_start_xmit+0x1a5/0x980 [ 1091.144778] ? check_preemption_disabled+0x48/0x290 [ 1091.144798] __dev_queue_xmit+0x2704/0x2fe0 [ 1091.144822] ? netdev_pick_tx+0x300/0x300 [ 1091.144835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.144850] ? kasan_unpoison_shadow+0x35/0x50 [ 1091.144869] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1091.144884] ? skb_release_data+0x144/0x8d0 [ 1091.197721] ? __kmalloc_node_track_caller+0x51/0x80 22:52:16 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x1414ac) 22:52:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564600000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1091.202849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1091.208407] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1091.213957] ? kasan_check_write+0x14/0x20 [ 1091.213977] ? pskb_expand_head+0x57a/0xe20 [ 1091.222530] dev_queue_xmit+0x18/0x20 [ 1091.226344] ? dev_queue_xmit+0x18/0x20 [ 1091.230334] __bpf_redirect+0x74b/0xc10 [ 1091.234328] bpf_clone_redirect+0x2dc/0x480 [ 1091.238663] bpf_prog_e2f29814702bf05a+0xfc4/0x1000 [ 1091.243706] ? mark_held_locks+0x100/0x100 [ 1091.247952] ? bpf_test_run+0x71/0x430 [ 1091.251858] ? find_held_lock+0x35/0x130 [ 1091.255936] ? bpf_test_run+0x71/0x430 [ 1091.259839] ? ktime_get+0x105/0x2f0 [ 1091.259865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.269091] ? check_preemption_disabled+0x48/0x290 [ 1091.269104] ? lock_acquire+0x16f/0x3f0 [ 1091.269121] ? kasan_check_read+0x11/0x20 [ 1091.269136] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 1091.269151] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1091.269163] bpf_test_run+0x10d/0x430 [ 1091.269193] bpf_prog_test_run_skb+0x64b/0xb20 [ 1091.269215] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1091.269228] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1091.269242] ? fput+0x128/0x1a0 [ 1091.269258] ? __bpf_prog_get+0x97/0x290 [ 1091.269270] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1091.269284] bpf_prog_test_run+0x129/0x1a0 [ 1091.269302] __x64_sys_bpf+0x397/0x4c0 [ 1091.269316] ? bpf_prog_get+0x20/0x20 [ 1091.269340] ? do_syscall_64+0x26/0x620 [ 1091.269356] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1091.269372] ? trace_hardirqs_on+0x67/0x220 [ 1091.269390] do_syscall_64+0xfd/0x620 22:52:16 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc020660b, &(0x7f0000000000)) [ 1091.269411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.269422] RIP: 0033:0x45a679 [ 1091.269436] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1091.269444] RSP: 002b:00007fc985e26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1091.269459] RAX: ffffffffffffffda RBX: 00007fc985e26c90 RCX: 000000000045a679 [ 1091.269467] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a 22:52:16 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x205100) 22:52:17 executing program 3 (fault-call:5 fault-nth:5): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1091.269479] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1091.322654] nla_parse: 1 callbacks suppressed [ 1091.322663] netlink: 136 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1091.324675] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc985e276d4 [ 1091.324685] R13: 00000000004c0c1d R14: 00000000004d3b28 R15: 0000000000000005 22:52:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, 0x0) 22:52:17 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0xc0684608, &(0x7f0000000000)) 22:52:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564d70000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1091.642134] FAULT_INJECTION: forcing a failure. [ 1091.642134] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1091.653994] CPU: 1 PID: 6958 Comm: syz-executor.3 Not tainted 4.19.86-syzkaller #0 [ 1091.661715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.671082] Call Trace: [ 1091.673701] dump_stack+0x197/0x210 [ 1091.677363] should_fail.cold+0xa/0x1b [ 1091.681276] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1091.686402] ? __lock_acquire+0x6ee/0x49c0 22:52:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, 0x0) [ 1091.690648] ? mark_held_locks+0x100/0x100 [ 1091.694913] __alloc_pages_nodemask+0x1ee/0x750 [ 1091.699606] ? __alloc_pages_slowpath+0x2870/0x2870 [ 1091.704639] ? is_bpf_text_address+0xac/0x170 [ 1091.709177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1091.714292] ? depot_save_stack+0x1de/0x44f [ 1091.718629] cache_grow_begin+0x91/0x8c0 [ 1091.722708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.728263] ? check_preemption_disabled+0x48/0x290 [ 1091.733303] kmem_cache_alloc_node_trace+0x655/0x720 [ 1091.738428] ? __lock_acquire+0x6ee/0x49c0 [ 1091.742679] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1091.747285] __kmalloc_node_track_caller+0x3d/0x80 [ 1091.752230] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1091.756915] pskb_expand_head+0x154/0xe20 [ 1091.761073] ? save_stack+0x45/0xd0 [ 1091.764708] ? kasan_kmalloc+0xce/0xf0 [ 1091.768734] ipgre_xmit+0x7d6/0xa80 [ 1091.772389] dev_hard_start_xmit+0x1a5/0x980 [ 1091.776917] ? check_preemption_disabled+0x48/0x290 [ 1091.781961] __dev_queue_xmit+0x2704/0x2fe0 [ 1091.786313] ? netdev_pick_tx+0x300/0x300 22:52:17 executing program 4 (fault-call:5 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1091.790481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.796140] ? kasan_unpoison_shadow+0x35/0x50 [ 1091.800742] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1091.805773] ? skb_release_data+0x144/0x8d0 [ 1091.810102] ? __kmalloc_node_track_caller+0x51/0x80 [ 1091.815334] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1091.820889] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1091.826444] ? kasan_check_write+0x14/0x20 [ 1091.830689] ? pskb_expand_head+0x57a/0xe20 [ 1091.835031] dev_queue_xmit+0x18/0x20 [ 1091.838846] ? dev_queue_xmit+0x18/0x20 [ 1091.842870] __bpf_redirect+0x74b/0xc10 [ 1091.846885] bpf_clone_redirect+0x2dc/0x480 [ 1091.851224] bpf_prog_e2f29814702bf05a+0x8bb/0x1000 [ 1091.856276] ? mark_held_locks+0x100/0x100 [ 1091.860524] ? bpf_test_run+0x71/0x430 [ 1091.864431] ? find_held_lock+0x35/0x130 [ 1091.868503] ? bpf_test_run+0x71/0x430 [ 1091.872415] ? ktime_get+0x105/0x2f0 [ 1091.876149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1091.876165] ? check_preemption_disabled+0x48/0x290 [ 1091.876179] ? lock_acquire+0x16f/0x3f0 [ 1091.876195] ? kasan_check_read+0x11/0x20 [ 1091.876211] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 1091.876227] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1091.876240] bpf_test_run+0x10d/0x430 [ 1091.876264] bpf_prog_test_run_skb+0x64b/0xb20 [ 1091.905640] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1091.905655] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1091.905668] ? fput+0x128/0x1a0 [ 1091.905682] ? __bpf_prog_get+0x97/0x290 [ 1091.905695] ? bpf_test_finish.isra.0+0x1d0/0x1d0 [ 1091.905709] bpf_prog_test_run+0x129/0x1a0 [ 1091.905724] __x64_sys_bpf+0x397/0x4c0 [ 1091.905738] ? bpf_prog_get+0x20/0x20 [ 1091.905761] ? do_syscall_64+0x26/0x620 [ 1091.905777] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1091.905797] ? trace_hardirqs_on+0x67/0x220 [ 1091.934976] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1091.936702] do_syscall_64+0xfd/0x620 [ 1091.936726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1091.948118] FAULT_INJECTION: forcing a failure. [ 1091.948118] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.948616] RIP: 0033:0x45a679 [ 1091.948631] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1091.948639] RSP: 002b:00007fc985e26c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1091.948653] RAX: ffffffffffffffda RBX: 00007fc985e26c90 RCX: 000000000045a679 [ 1091.948661] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 1091.948669] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1091.948678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc985e276d4 [ 1091.948686] R13: 00000000004c0c1d R14: 00000000004d3b28 R15: 0000000000000005 [ 1092.055819] CPU: 0 PID: 6973 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 1092.064227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.073582] Call Trace: [ 1092.076183] dump_stack+0x197/0x210 [ 1092.079831] should_fail.cold+0xa/0x1b [ 1092.083735] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1092.088852] __should_failslab+0x121/0x190 [ 1092.093101] should_failslab+0x9/0x14 [ 1092.096908] __kmalloc+0x71/0x750 [ 1092.100391] ? __lock_is_held+0xb6/0x140 [ 1092.104467] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 1092.109588] __tty_buffer_request_room+0x1fb/0x5c0 [ 1092.113564] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1092.114532] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 1092.114551] ? do_raw_spin_lock+0xc8/0x240 [ 1092.129323] kobject: 'loop0' (000000003b0661c9): kobject_uevent_env [ 1092.129520] pty_write+0x133/0x200 [ 1092.137140] kobject: 'loop0' (000000003b0661c9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1092.140151] tty_put_char+0x130/0x160 [ 1092.140167] ? dev_match_devt+0x90/0x90 [ 1092.147470] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1092.153160] ? tty_buffer_space_avail+0x5c/0xb0 [ 1092.153173] ? pty_write_room+0xc8/0xf0 [ 1092.153188] ? pty_stop+0x1b0/0x1b0 [ 1092.160359] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1092.160951] __process_echoes+0x5c8/0xa40 [ 1092.167891] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1092.172021] n_tty_receive_buf_common+0xc13/0x28e0 [ 1092.172042] ? n_tty_receive_buf2+0x40/0x40 [ 1092.176118] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1092.179630] n_tty_receive_buf+0x31/0x40 [ 1092.179643] tty_ioctl+0xe91/0x1510 [ 1092.179659] ? tty_vhangup+0x30/0x30 [ 1092.190950] kobject: 'loop0' (000000003b0661c9): kobject_uevent_env [ 1092.193222] ? mark_held_locks+0x100/0x100 [ 1092.193235] ? proc_cwd_link+0xe0/0x1d0 [ 1092.193251] ? __fget+0x340/0x540 [ 1092.199748] kobject: 'loop0' (000000003b0661c9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1092.204654] ? __might_sleep+0x95/0x190 [ 1092.204667] ? tty_vhangup+0x30/0x30 [ 1092.204687] do_vfs_ioctl+0xd5f/0x1380 [ 1092.268933] ? selinux_file_ioctl+0x46f/0x5e0 [ 1092.273465] ? selinux_file_ioctl+0x125/0x5e0 [ 1092.277981] ? ioctl_preallocate+0x210/0x210 [ 1092.282402] ? selinux_file_mprotect+0x620/0x620 [ 1092.287173] ? iterate_fd+0x360/0x360 [ 1092.290990] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1092.296545] ? fput+0x128/0x1a0 [ 1092.299821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.305366] ? security_file_ioctl+0x8d/0xc0 [ 1092.309766] ksys_ioctl+0xab/0xd0 [ 1092.313211] __x64_sys_ioctl+0x73/0xb0 [ 1092.317105] do_syscall_64+0xfd/0x620 [ 1092.320900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.326077] RIP: 0033:0x45a679 [ 1092.329270] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1092.348161] RSP: 002b:00007f069239cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1092.355858] RAX: ffffffffffffffda RBX: 00007f069239cc90 RCX: 000000000045a679 [ 1092.363130] RDX: 0000000020000040 RSI: 0000000000005412 RDI: 0000000000000004 [ 1092.370397] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1092.377659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f069239d6d4 [ 1092.384916] R13: 00000000004c5069 R14: 00000000004da458 R15: 0000000000000005 [ 1092.392211] 22:52:17 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x80, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030300100000001000000646576236d61702c6163636573733d636c69656e742c76657273696f6e3d3970323030302c6361636c6f6f73512ce2f04bfa4432", @ANYRESDEC=r2, @ANYBLOB=',context=sysadm_u,appraise,\x00']) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f00000000c0)={0x0, 0x3, 0x8, 0x4, 'syz0\x00', 0x7ff}) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r3, 0x40000000af01, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r3, &(0x7f0000000240)=""/204, 0xffffff83) r5 = dup(r4) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000000000)={0x0, r5}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000125bd7000fcdbdf2501000000000000000b0000000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000003c0)={0x0, 0x719adcecaeec3607, r5}) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000400)={0x1, 0x8, r7, 0x0, r2, 0x0, 0xfbd, 0x100000000}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) bind$isdn_base(0xffffffffffffffff, &(0x7f0000000380)={0x22, 0x2, 0x5, 0xc3, 0x7}, 0x6) r8 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r8, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r8, &(0x7f0000000400)=""/128) ioctl$BLKTRACESTOP(r8, 0x1275, 0x0) r9 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r9, 0x4605, &(0x7f0000000000)) r10 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r10, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r10, &(0x7f0000000400)=""/128) r11 = syz_open_pts(r10, 0x4000) ioctl$GIO_FONT(r11, 0x4b60, &(0x7f0000000440)=""/50) setpriority(0x0, 0x0, 0x6) ioctl$sock_bt_hci(r0, 0x400448de, &(0x7f00000002c0)="979f7829526f0d8b619d89a11ce7d79f4a1ca9198462522ce5c46ad30adeb215c507d45a3dc6f8d49da5a579887a4a9ab476c2d62c962ef35f185910831ec038da366c9cced6342a5933e27b9b6af501b59b1eada36c9ba9a1f29635e8253f9ffcea001f05434d733b39627b1e8e436e0f1d15c95da7ec86840f09a4eac16a171313253ddc4a5648fbbbec8784d6a61087899491599ec5a472e8f84aef") 22:52:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564f00000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:17 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x400000) 22:52:17 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:17 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x512000) 22:52:17 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x291414ac) 22:52:17 executing program 3 (fault-call:5 fault-nth:6): r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1092.392216] ====================================================== [ 1092.392220] WARNING: possible circular locking dependency detected [ 1092.392224] 4.19.86-syzkaller #0 Not tainted [ 1092.392228] ------------------------------------------------------ [ 1092.392232] syz-executor.4/6973 is trying to acquire lock: [ 1092.392235] 0000000015b90ed4 (console_owner){-.-.}, at: vprintk_emit+0x348/0x690 [ 1092.392246] [ 1092.392250] but task is already holding lock: [ 1092.392252] 0000000081217a28 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 1092.392263] [ 1092.392267] which lock already depends on the new lock. [ 1092.392268] [ 1092.392271] [ 1092.392275] the existing dependency chain (in reverse order) is: [ 1092.392277] [ 1092.392279] -> #2 (&(&port->lock)->rlock){-.-.}: [ 1092.392291] _raw_spin_lock_irqsave+0x95/0xcd [ 1092.392294] tty_port_tty_get+0x22/0x90 [ 1092.392297] tty_port_default_wakeup+0x16/0x40 [ 1092.392301] tty_port_tty_wakeup+0x57/0x70 [ 1092.392304] uart_write_wakeup+0x46/0x70 [ 1092.392307] serial8250_tx_chars+0x495/0xaf0 [ 1092.392311] serial8250_handle_irq.part.0+0x261/0x2b0 [ 1092.392315] serial8250_default_handle_irq+0xc0/0x150 [ 1092.392319] serial8250_interrupt+0xfc/0x1e0 [ 1092.392322] __handle_irq_event_percpu+0x144/0x8f0 [ 1092.392326] handle_irq_event_percpu+0x74/0x160 [ 1092.392330] handle_irq_event+0xa7/0x134 [ 1092.392334] handle_edge_irq+0x25e/0x8d0 [ 1092.392337] handle_irq+0x39/0x50 [ 1092.392340] do_IRQ+0x99/0x1d0 [ 1092.392343] ret_from_intr+0x0/0x1e 22:52:18 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0xac141429) 22:52:18 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x711000) [ 1092.392346] _raw_spin_unlock_irqrestore+0x95/0xe0 [ 1092.392350] uart_write+0x3a9/0x6e0 [ 1092.392353] n_tty_write+0x3f9/0x10f0 [ 1092.392356] tty_write+0x458/0x7a0 [ 1092.392360] redirected_tty_write+0xb2/0xc0 [ 1092.392363] __vfs_write+0x114/0x810 [ 1092.392366] vfs_write+0x20c/0x560 [ 1092.392369] ksys_write+0x14f/0x2d0 [ 1092.392372] __x64_sys_write+0x73/0xb0 [ 1092.392375] do_syscall_64+0xfd/0x620 [ 1092.392380] entry_SYSCALL_64_after_hwframe+0x49/0xbe 22:52:18 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/204, 0xffffff83) r2 = dup(r1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)={0x0, r2}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x30, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) ioctl$KDDELIO(r2, 0x4b35, 0x2) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r3, 0x4605, &(0x7f0000000000)) [ 1092.392382] [ 1092.392384] -> #1 (&port_lock_key){-.-.}: [ 1092.392396] _raw_spin_lock_irqsave+0x95/0xcd [ 1092.392400] serial8250_console_write+0x7ca/0x9f0 [ 1092.392403] univ8250_console_write+0x5f/0x70 [ 1092.392406] console_unlock+0xbdf/0x10d0 [ 1092.392409] vprintk_emit+0x238/0x690 [ 1092.392412] vprintk_default+0x28/0x30 [ 1092.392416] vprintk_func+0x7e/0x189 [ 1092.392419] printk+0xba/0xed [ 1092.392422] register_console+0x77f/0xb90 22:52:18 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:18 executing program 4 (fault-call:5 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1092.392425] univ8250_console_init+0x3e/0x4b [ 1092.392428] console_init+0x4f7/0x761 [ 1092.392432] start_kernel+0x59c/0x8c5 [ 1092.392435] x86_64_start_reservations+0x29/0x2b [ 1092.392438] x86_64_start_kernel+0x77/0x7b [ 1092.392441] secondary_startup_64+0xa4/0xb0 [ 1092.392443] [ 1092.392444] -> #0 (console_owner){-.-.}: [ 1092.392456] lock_acquire+0x16f/0x3f0 [ 1092.392459] vprintk_emit+0x385/0x690 [ 1092.392462] vprintk_default+0x28/0x30 [ 1092.392465] vprintk_func+0x7e/0x189 22:52:18 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000080)={0x2, 0x1}) ioctl$KVM_NMI(r0, 0xae9a) [ 1092.392468] printk+0xba/0xed [ 1092.392471] should_fail+0x6f1/0x85c [ 1092.392475] __should_failslab+0x121/0x190 [ 1092.392478] should_failslab+0x9/0x14 [ 1092.392482] __kmalloc+0x71/0x750 [ 1092.392486] __tty_buffer_request_room+0x1fb/0x5c0 [ 1092.392490] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 1092.392492] pty_write+0x133/0x200 [ 1092.392496] tty_put_char+0x130/0x160 [ 1092.392500] __process_echoes+0x5c8/0xa40 [ 1092.392504] n_tty_receive_buf_common+0xc13/0x28e0 [ 1092.392507] n_tty_receive_buf+0x31/0x40 [ 1092.392510] tty_ioctl+0xe91/0x1510 [ 1092.392514] do_vfs_ioctl+0xd5f/0x1380 [ 1092.392517] ksys_ioctl+0xab/0xd0 [ 1092.392521] __x64_sys_ioctl+0x73/0xb0 [ 1092.392524] do_syscall_64+0xfd/0x620 [ 1092.392527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.392529] [ 1092.392532] other info that might help us debug this: [ 1092.392534] [ 1092.392536] Chain exists of: [ 1092.392538] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 1092.392553] [ 1092.392556] Possible unsafe locking scenario: [ 1092.392559] [ 1092.392563] CPU0 CPU1 [ 1092.392567] ---- ---- [ 1092.392569] lock(&(&port->lock)->rlock); [ 1092.392578] lock(&port_lock_key); [ 1092.392586] lock(&(&port->lock)->rlock); [ 1092.392593] lock(console_owner); [ 1092.392599] [ 1092.392601] *** DEADLOCK *** [ 1092.392603] [ 1092.392607] 4 locks held by syz-executor.4/6973: 22:52:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564000300004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:18 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x71a000) 22:52:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) [ 1092.392609] #0: 00000000095345b8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1092.392624] #1: 0000000086a210de (&o_tty->termios_rwsem/1){++++}, at: n_tty_receive_buf_common+0x8a/0x28e0 [ 1092.392642] #2: 00000000d17097bf (&ldata->output_lock){+.+.}, at: n_tty_receive_buf_common+0xbd6/0x28e0 [ 1092.392656] #3: 0000000081217a28 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 1092.392668] [ 1092.392670] stack backtrace: [ 1092.392675] CPU: 0 PID: 6973 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 22:52:18 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1092.392682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.392685] Call Trace: [ 1092.392689] dump_stack+0x197/0x210 [ 1092.392693] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1092.392697] __lock_acquire+0x2e19/0x49c0 [ 1092.392700] ? mark_held_locks+0x100/0x100 [ 1092.392703] ? find_held_lock+0x35/0x130 [ 1092.392706] ? kvm_sched_clock_read+0x9/0x20 [ 1092.392710] ? vprintk_emit+0x360/0x690 [ 1092.392714] ? trace_hardirqs_off+0x62/0x220 [ 1092.392717] lock_acquire+0x16f/0x3f0 [ 1092.392720] ? vprintk_emit+0x348/0x690 [ 1092.392723] vprintk_emit+0x385/0x690 [ 1092.392725] ? vprintk_emit+0x348/0x690 [ 1092.392728] vprintk_default+0x28/0x30 [ 1092.392731] vprintk_func+0x7e/0x189 [ 1092.392734] printk+0xba/0xed [ 1092.392737] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1092.392740] ? ima_match_policy+0xa13/0x13c0 [ 1092.392744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.392747] ? ___ratelimit+0x60/0x595 [ 1092.392750] should_fail+0x6f1/0x85c [ 1092.392753] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1092.392757] __should_failslab+0x121/0x190 22:52:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x2, &(0x7f0000000040)) [ 1092.392760] should_failslab+0x9/0x14 [ 1092.392762] __kmalloc+0x71/0x750 [ 1092.392765] ? __lock_is_held+0xb6/0x140 [ 1092.392769] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 1092.392772] __tty_buffer_request_room+0x1fb/0x5c0 [ 1092.392776] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 1092.392779] ? do_raw_spin_lock+0xc8/0x240 [ 1092.392781] pty_write+0x133/0x200 [ 1092.392784] tty_put_char+0x130/0x160 [ 1092.392787] ? dev_match_devt+0x90/0x90 [ 1092.392790] ? tty_buffer_space_avail+0x5c/0xb0 22:52:18 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x760000) [ 1092.392793] ? pty_write_room+0xc8/0xf0 [ 1092.392796] ? pty_stop+0x1b0/0x1b0 [ 1092.392799] __process_echoes+0x5c8/0xa40 [ 1092.392802] n_tty_receive_buf_common+0xc13/0x28e0 [ 1092.392805] ? n_tty_receive_buf2+0x40/0x40 [ 1092.392808] n_tty_receive_buf+0x31/0x40 [ 1092.392811] tty_ioctl+0xe91/0x1510 [ 1092.392814] ? tty_vhangup+0x30/0x30 [ 1092.392817] ? mark_held_locks+0x100/0x100 [ 1092.392820] ? proc_cwd_link+0xe0/0x1d0 [ 1092.392822] ? __fget+0x340/0x540 [ 1092.392825] ? __might_sleep+0x95/0x190 [ 1092.392828] ? tty_vhangup+0x30/0x30 [ 1092.392831] do_vfs_ioctl+0xd5f/0x1380 [ 1092.392834] ? selinux_file_ioctl+0x46f/0x5e0 [ 1092.392837] ? selinux_file_ioctl+0x125/0x5e0 [ 1092.392841] ? ioctl_preallocate+0x210/0x210 [ 1092.392844] ? selinux_file_mprotect+0x620/0x620 [ 1092.392847] ? iterate_fd+0x360/0x360 [ 1092.392850] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1092.392853] ? fput+0x128/0x1a0 [ 1092.392856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1092.392860] ? security_file_ioctl+0x8d/0xc0 [ 1092.392862] ksys_ioctl+0xab/0xd0 22:52:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564000500004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1092.392865] __x64_sys_ioctl+0x73/0xb0 [ 1092.392868] do_syscall_64+0xfd/0x620 [ 1092.392872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1092.392874] RIP: 0033:0x45a679 [ 1092.392894] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1092.392898] RSP: 002b:00007f069239cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1092.392906] RAX: ffffffffffffffda RBX: 00007f069239cc90 RCX: 000000000045a679 22:52:18 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1092.392911] RDX: 0000000020000040 RSI: 0000000000005412 RDI: 0000000000000004 [ 1092.392915] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1092.392920] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f069239d6d4 [ 1092.392925] R13: 00000000004c5069 R14: 00000000004da458 R15: 0000000000000005 [ 1092.416663] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1093.250739] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1093.268688] kobject: 'loop0' (000000003b0661c9): kobject_uevent_env [ 1093.280741] kobject: 'loop0' (000000003b0661c9): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1093.291413] kobject: 'loop3' (00000000b750f610): kobject_uevent_env 22:52:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x4b47, &(0x7f0000000040)) 22:52:18 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x960000) 22:52:18 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x0, {}, 'bond_slave_1\x00'}) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)=ANY=[@ANYRES32=r4, @ANYBLOB='\a\x00\b\x00\x00\x00\x00\x00\x00X/'], &(0x7f0000000340)=0xf) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={r4, 0xcea5}, &(0x7f00000000c0)=0x8) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r7, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r7, &(0x7f0000000400)=""/128) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = getpid() r10 = getpgid(0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = socket(0x2000000000000021, 0x2, 0x10000000000002) dup2(r11, r12) kcmp(r9, r10, 0x0, r8, r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r10, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)='&\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r6, r7, 0x0, 0x9, &(0x7f0000000140)='/dev/fb0\x00', r13}, 0x30) fcntl$setown(0xffffffffffffffff, 0x8, r14) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r5, 0x84c}, 0x8) 22:52:18 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564000600004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1093.316111] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1093.352045] kobject: 'loop4' (000000008970d007): kobject_uevent_env 22:52:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x4b49, &(0x7f0000000040)) 22:52:18 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0xa07100) [ 1093.381529] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1093.411706] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env 22:52:18 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @rand_addr=0x55}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bonave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x2) [ 1093.445429] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1093.477621] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1093.484826] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:52:19 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564000900004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5409, &(0x7f0000000040)) 22:52:19 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x1000000) [ 1093.528126] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1093.534614] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1093.547516] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1093.554168] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:52:19 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r1, &(0x7f0000000240)=""/204, 0xffffff83) r3 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r3}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x30, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, 0x0) fstatfs(r4, &(0x7f0000000200)=""/128) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r4, 0xc040564b, &(0x7f0000000180)={0x6, 0x0, 0x1007, 0xd87, 0x8, {0x9, 0xcb77}}) sendmsg$nl_generic(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x1a, 0x200, 0x70bd2a, 0x25dfdbfd, {0x7}, [@typed={0x14, 0x16, @ipv6=@loopback}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008450}, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1093.587624] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1093.606231] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:52:19 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x540b, &(0x7f0000000040)) 22:52:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564000a00004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1093.642127] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1093.675087] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:52:19 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x2000000) 22:52:19 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1093.708967] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1093.736190] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:52:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x540c, &(0x7f0000000040)) [ 1093.773702] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1093.786215] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:52:19 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x10000000) 22:52:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564000b00004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:19 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1093.818652] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1093.840821] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:52:19 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0xac141400) 22:52:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x540d, &(0x7f0000000040)) [ 1093.881615] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1093.908378] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1093.938540] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1093.954152] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1093.982726] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1094.020163] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1094.040854] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1094.050770] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1094.064042] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1094.070930] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1094.081443] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1094.088288] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1094.098901] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1094.105710] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1094.117930] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1094.124389] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1094.134605] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1094.143305] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1094.153506] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1094.173074] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1094.197145] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1094.203613] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1094.233887] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1094.243556] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1094.264630] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1094.277781] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1094.297688] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1094.311866] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1094.331872] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1094.346410] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1094.375175] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1094.381666] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1094.407178] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1094.423811] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1094.446191] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1094.452671] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1094.483233] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1094.496194] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1094.530512] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1094.545850] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:52:20 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000280)={0x1, r0}) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r2, 0x602, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r3, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r3, &(0x7f0000000400)=""/128) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 22:52:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564000c00004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5413, &(0x7f0000000040)) 22:52:20 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x4e24, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @broadcast}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r1, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r1, &(0x7f0000000400)=""/128) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x9010, @dev={0xfe, 0x80, [], 0x1b}, 0x3d25}}, 0x8d, 0x2, 0x0, 0x6, 0x22}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r2, 0x2}, 0x8) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1094.576231] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1094.582701] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1094.593939] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1094.644127] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:52:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5414, &(0x7f0000000040)) 22:52:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:20 executing program 5: syz_extract_tcp_res(&(0x7f0000000080), 0x20, 0xffffffc1) getpeername$tipc(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x0, {0x2, 0x4e24}, 'bond_slava_1\x00\x00\x00\x04'}) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) fallocate(r0, 0x10, 0x7ff, 0x8000) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) [ 1094.701017] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1094.734597] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:52:20 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @broadcast}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) fstatfs(r0, &(0x7f0000000200)=""/128) r1 = add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)="d5b5c92ed7c9ab24bb94", 0xa, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r1, 0x8c, 0xf8}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'sha256-ssse3\x00'}}, &(0x7f0000000300)="b9eca8b399418df2b472b7b9894ae2ace46d9ac3fed23b49bacd449ec6a23f1c60020bef6b9dd1dd898571fa0562df7665a61eb61dcf23fde828dade1fd6860c6081c9b2d725033eaf54df028d373795c6aa49951547e4de5df90955b9d4e306d35336fe65896a4fefd4d1ecae40fbba96b67875df0c706dcdb1f0ebedc70a562a6e1a62cde333f73bcc1512", &(0x7f00000003c0)=""/248) ioctl$SIOCRSACCEPT(r0, 0x89e3) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r2, 0x4605, &(0x7f0000000000)) 22:52:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564000e00004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1094.763846] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env 22:52:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5415, &(0x7f0000000040)) [ 1094.818370] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:52:20 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x10000, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000080)=""/41) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:20 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)={r4, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000080)={r4, 0x4e, "c69690675c9a6f019eb0939bae284ffceb6bdb79771f2b1401b30b262a6c09881bfc07e6ab1056122abdce4adeb9b6b440212ade3c094904817417b41d29539ed7898df82a8e63ab28c4bc9b0a35"}, &(0x7f0000000140)=0x56) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1094.861171] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1094.878132] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1094.913784] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1094.943795] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:52:20 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x70, {}, 'bond_slave_1\x00'}) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f0000000140)={0x0, 0x8, 0x3, [], &(0x7f0000000100)=0x81}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x3, 0x80000) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f00000000c0)) 22:52:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5416, &(0x7f0000000040)) 22:52:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564000f00004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1094.972552] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1095.002808] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:52:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000140)=""/140) close(r0) sendmmsg$inet_sctp(r0, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x0, @dev}, {0x0, @random="d293c85bdba0"}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) [ 1095.021422] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1095.041881] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:52:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:20 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/d\xcd\xdf\xc4hoop-control\x00', 0x20040, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:20 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) [ 1095.083362] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1095.113507] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:52:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5418, &(0x7f0000000040)) 22:52:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564004800004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1095.139807] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1095.166071] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:52:20 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x800, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000dc0)=0x14, 0x80800) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000e00)={@mcast1, @mcast2, @local, 0x7f, 0x7ff, 0x7ff, 0x480, 0x1f, 0x180000, r1}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r2, 0x4605, &(0x7f0000000000)) 22:52:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x541b, &(0x7f0000000040)) [ 1095.212777] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1095.235919] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:52:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:20 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000005f80)={0x4, 0x800000000000002a, 0x1, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) r2 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) sysfs$2(0x2, 0x40, &(0x7f00000002c0)=""/240) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r3 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f0000000080)={0x3, 'nr0\x00', {0xdd47}, 0x8}) ioctl$USBDEVFS_SETCONFIGURATION(r3, 0x4605, &(0x7f0000000000)) [ 1095.265693] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1095.280691] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:52:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564655800004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:20 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) munlockall() r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1095.326913] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1095.341598] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1095.357371] ion_buffer_destroy: buffer still mapped in the kernel [ 1095.369242] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env 22:52:20 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x541d, &(0x7f0000000040)) 22:52:20 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8200, 0x0) [ 1095.387933] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1095.410906] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env 22:52:20 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x6, {{0x2, 0x4e23, @multicast2}}}, 0x88) setxattr$security_selinux(&(0x7f0000000180)='./file1\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:auth_cache_t:s0\x00', 0x22, 0x1) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r1, &(0x7f00000004c0)='./file1\x00', 0x100000000) inotify_init() fstatfs(r1, &(0x7f0000000400)=""/128) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1024) ioctl$TIOCCBRK(r0, 0x5428) ioctl$USBDEVFS_SETCONFIGURATION(0xffffffffffffffff, 0x4605, &(0x7f0000000000)=0x5) [ 1095.439981] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:52:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564006000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1095.486755] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1095.508626] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:52:21 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {0x2, 0x0, @multicast2}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r1, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r1, &(0x7f0000000400)=""/128) accept4$nfc_llcp(r1, &(0x7f0000000080), &(0x7f0000000100)=0x60, 0x81800) 22:52:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x541f, &(0x7f0000000040)) 22:52:21 executing program 2: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) fstatfs(r0, &(0x7f0000000200)=""/128) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x6) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000100)=0x300000000) read(r1, &(0x7f0000000240)=""/204, 0xffffff83) r3 = dup(r2) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x0, r3}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000125bd7000fcdbdf2501000000000000000b0000000014001462726f6141636100000000696e6b0000c38659d92e7320ae8a7bada464132f0ca0fc66c8da12722c30e004f6973b316a224857d11ee5d877bfd108c1f8d31a08fbd559d41e2c9f11d687bd557a17bf219dc2c91b5232c9685d609f3e746e99306b631ed255f31df58e012cece3c3b9def1fb05eda8a1e72cdc3fd79ef0c8fe1e4e769050d26334bc4e78303c6c91ab17fe8d935ec4"], 0x30}, 0x1, 0x0, 0x0, 0x40008000}, 0xc804) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r4, 0x4605, &(0x7f0000000000)) [ 1095.536213] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1095.558567] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:52:21 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x0, @random="092bb5b4b16c"}, 0x0, {}, 'rose0\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000080)) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1095.600581] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1095.621787] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:52:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5421, &(0x7f0000000040)) 22:52:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564586500004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1095.669892] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1095.682406] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:52:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:21 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)=0x1000) inotify_init1(0x80000) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000003c0)=@add_del={0x2, &(0x7f0000000280)='lo\x00'}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000080)={r2, 0x0, 0x7, 0x34c}) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x80002710}, 0x10) [ 1095.713506] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1095.729556] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1095.751338] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env 22:52:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5423, &(0x7f0000000040)) [ 1095.770035] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1095.797455] kobject: 'loop3' (00000000b750f610): kobject_uevent_env 22:52:21 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) fstatfs(r0, &(0x7f0000000200)=""/128) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000080)=0x7fffffff, &(0x7f00000000c0)=0x4) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) 22:52:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000900010067726564008100004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) [ 1095.814292] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:52:21 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) [ 1095.849988] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1095.870393] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:52:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5424, &(0x7f0000000040)) 22:52:21 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, {0x0, @random="000000ba00"}, 0x0, {0x2, 0x4e20}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x209080, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1095.900042] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1095.919260] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1095.954335] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1095.978545] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1095.998791] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1096.020554] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1096.037281] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1096.045547] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1096.055613] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1096.062173] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1096.073989] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1096.080589] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1096.090660] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1096.097304] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1096.107389] kobject: 'loop2' (00000000f36b67ee): kobject_uevent_env [ 1096.113947] kobject: 'loop2' (00000000f36b67ee): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1096.124030] kobject: 'loop5' (000000006c89a6b2): kobject_uevent_env [ 1096.130654] kobject: 'loop5' (000000006c89a6b2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1096.140755] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1096.147471] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1096.158477] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1096.165769] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1096.175885] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1096.182425] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1096.192460] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1096.199072] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1096.209040] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1096.215580] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1096.225498] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1096.231929] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1096.241860] kobject: 'loop3' (00000000b750f610): kobject_uevent_env [ 1096.248448] kobject: 'loop3' (00000000b750f610): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1096.258367] kobject: 'loop1' (00000000ea149db5): kobject_uevent_env [ 1096.264856] kobject: 'loop1' (00000000ea149db5): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1096.274654] kobject: 'loop4' (000000008970d007): kobject_uevent_env [ 1096.281245] kobject: 'loop4' (000000008970d007): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:52:22 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x2000, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f00000000c0)={{0x0, 0x0, @descriptor="1056b47c15f6a70c"}}) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fb0\x00', 0x600, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r2, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r2, &(0x7f0000000400)=""/128) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000100), 0x4) 22:52:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5425, &(0x7f0000000040)) 22:52:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006772656400d700004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:22 executing program 5: r0 = socket(0xa, 0x1, 0x0) close(r0) sendmmsg$inet_sctp(r0, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0xfffffffffffffe1d}], 0x1, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80504800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x3d, 0x400, 0x70bd26, 0x25dfdbfc, {0xb}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x800) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x40, @empty}, {0x0, @random="00000500"}, 0x0, {0x2, 0x4e24, @rand_addr=0x5}, 'bcsf0\x00'}) r1 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x4605, &(0x7f0000000000)) 22:52:22 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) r1 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) r2 = syz_open_dev$vbi(0x0, 0x1, 0x2) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f00000000c0)=0x0) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f0000000100)=r3) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f00000001c0)=r3) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/202) 22:52:22 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYRES16], 0xfffffffffffffd95) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2e0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fe0ffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) 22:52:22 executing program 0: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2b}}, {0x0, @random="231b9d3e666c"}, 0x0, {0x2, 0x0, @remote}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) 22:52:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="25ead76c72448db3bb270a01009abf5ed8b0604ba1fd968c841540d40063b031d3873fce0509a62a9ab1e721dd889b11969a3b68ae10a32a201100046f4759a7f5bbeae9f75d3e666b139a0100000000000000ad4416ea207be78a69e66c2614a6ddf4e61d8d30cb97a6cd33560618adbc7ad7aa8dd46085b5a166fe0700350cebacccfd1667c2235c11589ee3da5df74e9aae51d820ef86c5078c393f8d6a51ddc3d915e8facd044a19530f16d8f79399058deb7c38353c31691fc96fc6b593f2a3eaa162f097775dc0f868e8e4502a3098f9dcd6c52658b8c0aa81ea689c1f26bd848de339b509584fe53e18b6bbb9e7d1cfbc63ce02e564379cc4774da5c582bcf6054b54aeb0e3d31f0fbe2fb1d1a8474e8dead07230139d6a726e8496759166c580a9c6799b01b4b6bdd2a126306506aa821b2b369c7b4359285fdea75d01bb9ff82d12fccdd0a63840965670b47c77368b7be3538ad602c91e79c4133771d748c6efec45d04036903b3959968254f42406f4b549721a92a3fbc0ee53a8f61765caf1ad2549a5fe85350a3c2ad169b0b5d46382a831d6d7379cb526846ec3f1bd4a48ca6cbc26daf7706464c207ee053c166181efde086d0285483ca2212c9f406c4bc314b9fee884c2eccc9459a24a7baea548"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffffffffffffe, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5427, &(0x7f0000000040)) 22:52:22 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @random="231b993e666c"}, 0x0, {}, 'bond_slave_1\x00'}) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fb0\x00', 0x80, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x4605, &(0x7f0000000000)) [ 1096.686115] kobject: 'loop0' (000000003b0661c9): kobject_uevent_env [ 1096.692590] kobject: 'loop0' (000000003b0661c9): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:52:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000002400072f50e8376cee3f82b200000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006772656400f000004c000200080005000000000008000500000000003800030010000000000000000001000000000000000000000000000000000000000000000000000000000002000000000000"], 0x7c}}, 0x0) 22:52:22 executing program 2: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @dev}, {0x0, @link_local}, 0x6e, {0x2, 0x0, @remote}, 'ip6erspan0\x00'}) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(r0, &(0x7f00000004c0)='./file1\x00', 0x100000000) fstatfs(r0, &(0x7f0000000400)=""/128) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x0, 0x81) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000300)={r3, 0x7, "75f0f695add7c3"}, &(0x7f0000000340)=0xf) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e24, 0x81, @local, 0x7ff}}}, 0x84) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x0, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r4, 0x4605, &(0x7f0000000000)) 22:52:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x56) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0xfffffff