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"}, 0x1008, 0x40890, &(0x7f0000000000)={0x22, 0x5, 0x3f, 0x1, 0x1c}, 0x6) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2000, 0x0) close(r0) [ 2243.784147] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:31 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x6558) 21:51:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = socket(0x40000000015, 0x5, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:31 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x2000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x1, 0x6}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2000000010000d0400"/20, @ANYRES32=r8, @ANYBLOB="032b019e5d4774ae200108000000005de4c8"], 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xc01, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PRIMARY={0x8, 0xb, r4}]}}}]}, 0x3c}}, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r8, 0x1, 0x6, @local}, 0x10) openat$cgroup_procs(r6, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r9 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r10 = dup(r9) write$FUSE_OPEN(r10, &(0x7f0000000700)={0x20}, 0x20) ioctl$TCSETS2(r10, 0x402c542b, &(0x7f0000000280)={0x6, 0x0, 0x1000, 0x1, 0x81, "5a3e2067379a249ef577cd263876cde2b79485", 0x8, 0x8}) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2000000fffffffffeffffff60e3060000180000fe8000000000000000000000000000bbff0200000000000000000000000000010000907800000000fe8000"/78], 0x0) 21:51:31 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa0000, &(0x7f0000000140)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x81) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8000) 21:51:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xd8eeff7f}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2244.022088] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 2244.077922] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = socket(0x40000000015, 0x5, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:31 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x401, @loopback, 0xa3}}, 0x3, 0xfff}, &(0x7f0000000240)=0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in6={{0xa, 0x4e22, 0x5c00000, @remote, 0xff}}}, &(0x7f0000000340)=0x84) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, &(0x7f0000000100)={0x6, 0x1, @raw_data=[0x400, 0x8, 0x6, 0x7, 0x800, 0x3, 0x6, 0x81, 0x8, 0x3, 0x3, 0x2, 0x6, 0x40, 0x100, 0x7]}) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) ioctl$DRM_IOCTL_RM_MAP(r3, 0x4028641b, &(0x7f0000000380)={0x0, 0x1, 0x1, 0x54, &(0x7f0000fe9000/0x2000)=nil, 0x9}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='o\x00', 0x67b7e37d0c2632b6, 0x0) ioctl$int_in(r4, 0x800000c0045005, &(0x7f0000000000)) fcntl$setsig(r4, 0xa, 0x1c) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) bind$alg(r3, &(0x7f00000003c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x58) mmap$binder(&(0x7f0000fe8000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0x0) ioctl$SIOCNRDECOBS(r4, 0x89e2) 21:51:31 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1e, 0x8000000000000002, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x108) ftruncate(r1, 0x200004) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f00000000c0)='./bus\x00', 0xacd, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000100)="e1921d95a163c488282f863844812a7efcb7038b302cafdadf8cdc158e3021f18d587ce107554d56714fb0033628d4019ee88c06e8da723ba39cfc440d2649197f1c4884cc359e83ecd3d38cf28376e863d6464f006fc12b8dc44ec7ee1f92f62604b49968962d0249066d0ee8b610fba30d253c093f1c713be0f0f470fdac93d78b373b63", 0x85, 0x3}], 0x100400, &(0x7f00000002c0)={[{@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3ff}}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@user_xattr='user_xattr'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}], [{@permit_directio='permit_directio'}, {@subj_user={'subj_user'}}]}) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40201, 0x0) dup2(r2, r4) socket$nl_route(0x10, 0x3, 0x0) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 21:51:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xf0ffffff}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2244.427526] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2244.436278] audit: type=1400 audit(1573077091.860:271): avc: denied { map } for pid=19835 comm="syz-executor.5" path="/dev/hwrng" dev="devtmpfs" ino=15249 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:random_device_t:s0 tclass=chr_file permissive=1 21:51:31 executing program 3: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = socket(0x40000000015, 0x5, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2244.577086] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0xc) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000506096368fe07072b03003700000a0014000200450201070300001419001a00120002000e00010006000300"/57, 0x39}], 0x1) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2244.758154] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2244.870357] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 2244.909528] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.5'. 21:51:32 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x6600) 21:51:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xf97b0000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0x19c, &(0x7f0000000180)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x166, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@ndisc_ns={0x87, 0x0, 0x0, @empty, [{0x2, 0x5, "7690031824963716cad9816ede8944ea4a33f0471ece702ff7e01b80ee6a23fb36511c33bfde"}, {0x5, 0x4, "114a35dd2537329330ba94dd61c04f4de9a18bb8167fdd46e86622f0e8d7d422"}, {0x1, 0x1a, "43661873fb91411b9173da4bb46cff29ec51d434af7b977065ab9581697fc56c93a60a008145c413d6ef4114bc1802de1934b43819b1d71e25845448246d9bc6226e9853550e19678026ab99127648495d1e87df989db7600e46b6032ce0cf375ebff6bdde5f97a3cbdaafb9017fb7978a2ede3588f5787834657d8395df5a490d25aec23da28023104e01a9bee0fe6505c1cdd81e3273da70e1bb44fa3bce478cca694ea64b081b817a7284734b06bf9808bff2cee52d398e70cff3593c63eb0291aaed1ee2437722b041f34defe71d"}, {0x19, 0x6, "e00b5a324ef0082c2fadd0c8a229df27fa792ea9a463a1e1e517052bf9df67e4dd022bb8e3d8ebfba2314796888490000a65b15e"}]}}}}}}, 0x0) 21:51:32 executing program 0: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @remote}, 0x0, {0x2, 0x0, @dev}, '\x00\x00\x00 \x01\x00'}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48c}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x68d, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0xf00309802cec87f1) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) ppoll(&(0x7f0000000200)=[{r1, 0x14}], 0x1, &(0x7f0000000240), &(0x7f0000000280)={0x400}, 0x8) 21:51:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = socket(0x40000000015, 0x5, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2245.074584] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r1) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) r4 = dup3(r1, r3, 0x80000) setsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f0000000000)=0x1, 0x4) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffffbe, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000008003b0e4b6b7824eeea41c900000000", @ANYRES32=0x0, @ANYBLOB="f12bf53cd16b758a0c036b42", @ANYRES32=0x6, @ANYBLOB="180012000800010076742e3889c569000c000200cb1a7d71"], 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x800) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'eql\x00', 0x1}, 0x18) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$RTC_UIE_ON(r6, 0x7003) [ 2245.149382] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:32 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_setup(0xa, &(0x7f0000000000)=0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000080)=ANY=[@ANYBLOB="06000000000000000000000000007982d5bcae8791d967"]) io_submit(r1, 0x1, &(0x7f0000000b80)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xa6}]) 21:51:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = socket(0x40000000015, 0x5, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x10}, [@ldst={0x4, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:51:32 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000200)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60e3060000180000de800000000500000000bbff0200000000ef010000907800000000fe80000000000000e2fbdd5bae70c66defa5f5aeaa87302e68d3d426b062d2917b1c18b1ae859b5cdfe2739f373fdd69f816f7180b4cebc4208e34bb46de5111aee855903d71538feff81f1b6ef42baf2ec598d4ef0cfca5c54cf78faf2544fe947359e7d39ba6e0777f21b4da32e4ffc900fbf080223aee713938d7872aed5af973056add8427b52a1a038f76ccc76b73be1611f4889f8ebe3170324aada3c2a7"], 0x0) [ 2245.445379] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2245.483063] net_ratelimit: 20 callbacks suppressed [ 2245.483070] protocol 88fb is buggy, dev hsr_slave_0 [ 2245.493233] protocol 88fb is buggy, dev hsr_slave_1 [ 2245.498314] protocol 88fb is buggy, dev hsr_slave_0 [ 2245.503388] protocol 88fb is buggy, dev hsr_slave_1 21:51:33 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) r1 = msgget$private(0x0, 0x23cea33ffd51e6f6) r2 = getuid() r3 = geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000440)={{0x0, r2, 0x0, r3, 0x0, 0x20}, 0x0, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r4}) mount$9p_unix(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='9p\x00', 0x800080, &(0x7f0000000240)={'trans=unix,', {[{@access_any='access=any'}, {@cache_mmap='cache=mmap'}], [{@subj_role={'subj_role', 0x3d, '\\cpusetcgroupem0'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}, {@subj_role={'subj_role', 0x3d, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}, {@seclabel='seclabel'}, {@obj_user={'obj_user', 0x3d, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00'}}, {@obj_type={'obj_type', 0x3d, 'security.selinux\x00'}}, {@pcr={'pcr', 0x3d, 0x3b}}, {@euid_eq={'euid', 0x3d, r3}}, {@pcr={'pcr', 0x3d, 0x5}}]}}) 21:51:33 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) sched_setaffinity(0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffcd1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x200}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) close(r0) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x20) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getpid() ftruncate(r4, 0x200004) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) sendfile(r0, r4, 0x0, 0x80001d00c0d0) [ 2245.563032] protocol 88fb is buggy, dev hsr_slave_0 [ 2245.568181] protocol 88fb is buggy, dev hsr_slave_1 [ 2245.658744] SELinux: Context unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 is not valid (left unmapped). [ 2245.733437] 9pnet: p9_fd_create_unix (20852): problem connecting socket: ./bus: -111 [ 2245.787960] 9pnet: p9_fd_create_unix (20797): problem connecting socket: ./bus: -111 21:51:33 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x6800) 21:51:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = socket(0x40000000015, 0x5, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xfffff000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:33 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x52b5, 0x0, 0x10000000, 0xffffffffffffffff, r2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r3, &(0x7f0000000480), 0x2e9, 0x0) 21:51:33 executing program 5: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12048}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) ioctl$TIOCCBRK(r1, 0x5428) 21:51:33 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/capi/capi20ncci\x00', 0x800, 0x0) r1 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x7f, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000600)=@assoc_id=r3, &(0x7f0000000640)=0x4) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2246.058293] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2246.119136] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xc, 0x48a204) bind$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x6, 0x9, 0x5e, "0bfbd1553440b4c5f32750b9b9b9ebe8cf1e2a544a3124dc7d4df63a20818cad43ede56c3b633b7214cb69b48274d004ff563a8ea81516366c555662a76073", 0xe}, 0x60) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}) 21:51:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xffffff7f}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:33 executing program 5: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12048}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) ioctl$TIOCCBRK(r1, 0x5428) 21:51:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) socket(0x40000000015, 0x5, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2246.398673] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000080)=0x3f, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x0, 0xfd0d, 0x8, 0x7}, 0x10) syz_emit_ethernet(0xfdef, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60e3060000180000fe80000000000000000000a9e7c88bc1bbe6a600000000ac1c000000000000010000907800000000fe800000000000000000000000000000700efbe6a332450fe28f776c9b267f2e9c517ccfa74176670f13cf943d7eb1a190052b721f588e98a911b6cc44008776aa9ae46c3ced5f58a9a5715dac3c074a6656471e335df0d7639028987c3b0fbab0a34d0d858a302cbf094e67955012dc17992f2bd274fc6b42972bc50a5d"], 0x0) 21:51:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xffffff9e}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2246.603027] protocol 88fb is buggy, dev hsr_slave_0 [ 2246.608129] protocol 88fb is buggy, dev hsr_slave_1 [ 2246.613260] protocol 88fb is buggy, dev hsr_slave_0 [ 2246.618319] protocol 88fb is buggy, dev hsr_slave_1 [ 2246.651837] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes [ 2246.724840] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:34 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x6c00) 21:51:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x200, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x242, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000080)={0x7b8, 0x4}) r4 = socket$inet6(0xa, 0x800000003, 0xff) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x1fe, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000087ec6f6b0dbbd9cb02bf1168f", @ANYRES32=r4], 0x1c}}, 0x0) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) r7 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r8 = dup(r7) r9 = dup(r7) r10 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r11 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)='F', 0x1, r10) add_key$keyring(&(0x7f0000003dc0)='keyring\x00', 0x0, 0x0, 0x0, r11) r12 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r11) keyctl$clear(0x7, r12) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ioctl$USBDEVFS_SUBMITURB(r9, 0x8038550a, &(0x7f00000001c0)=@urb_type_interrupt={0x1, {0xc}, 0x8, 0xa0, &(0x7f0000000140)="815968a97f55c1e84352d8c12cf20980021091c26a7426c718fda8e0e4a0420c03b20eaae6d55d867d003b", 0x2b, 0x3, 0x18, 0x0, 0x3f, 0x1000, &(0x7f0000000180)="ffede9fe0180a3b0d34544f2a7444114ea6b"}) ioctl$SIOCNRDECOBS(r8, 0x89e2) fanotify_mark(r6, 0x0, 0x20, r9, &(0x7f0000000100)='./file0\x00') 21:51:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xfffffff0}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:34 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0xd, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2247.270789] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2247.310556] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:51:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 21:51:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x7ffffffff000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0x3}, @sack_perm, @window, @sack_perm], 0x4) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x332, 0x0) fchmod(0xffffffffffffffff, 0x27a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$KDGETLED(r3, 0x4b31, &(0x7f00000001c0)) ioctl$KVM_RUN(r2, 0xae80, 0x900000000000000) r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000080)=0x6, 0x4) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="b800000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="78e06bb1fc7d290400800000", @ANYRES32=0x6], 0x4}}, 0x0) 21:51:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x42, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f008001fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108098da1924425181aa5", 0x0, 0x100}, 0x28) [ 2247.766710] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2247.816979] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:35 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:35 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x6d02) 21:51:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x40030000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:35 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 2248.239799] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:35 executing program 5: close(0xffffffffffffffff) pipe(&(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\ap\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write(0xffffffffffffffff, 0x0, 0x0) [ 2248.337550] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:35 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) read$usbfs(r1, &(0x7f0000000180)=""/254, 0xfe) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xf0ffffff7f0000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:36 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x4d5, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x5}}, 0xe8) sendmmsg(r0, &(0x7f0000000240), 0x400000000000052, 0x0) [ 2248.712309] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2248.726174] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:36 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000240)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [{[{0x9100, 0x6, 0x0, 0x4}], {0x8100, 0x0, 0x1, 0x3}}], {@ipv6={0x86dd, {0x0, 0x6, "002004", 0x2cb, 0x0, 0x0, @remote, @mcast2, {[], @dccp={{0x4e24, 0x4e22, 0x3e78, 0x1, 0x6, 0x0, 0x0, 0x2, 0x1, "06e59c", 0x4b, "43d7d3"}, "860626a814c601b24a816711918b28d60a7c98dd6cd10410c9c15b3bbb16acf496c8af910b9d386689d75dfd5770f596e430ed1ee537fe6ae6fe573faf18999e104e0d8307d4c8f5a2e5179546b4b69024b210ba2458ab00"/103}}}}}}, 0x0) 21:51:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0x3}], 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x27a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x900000000000000) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="78e06bb1fc7d290400800000", @ANYRES32=0x6, @ANYBLOB], 0x4}}, 0x0) 21:51:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xf0ffffffffffff}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:36 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x7400) [ 2249.080419] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2249.102072] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xfffffffffffffc1b) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="18049f678100"], 0x6) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:51:36 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@sco, &(0x7f00000001c0)=0x80) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0x5e, &(0x7f0000000000)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x28, 0x0, 0x0, @remote, @mcast2, {[@dstopts={0xff, 0x0, [], [@pad1]}], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x100000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0x3}], 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x27a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x900000000000000) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), 0x4) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="78e06bb1fc7d290400800000", @ANYRES32=0x6, @ANYBLOB], 0x4}}, 0x0) [ 2249.522477] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2249.629111] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:37 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2000000ffff0000000087dd68e3060000180000fe8000000000000000000000100000bbff0200000000000000000000000000010000907800000000fe8000"/78], 0x0) syz_emit_ethernet(0x101b, &(0x7f0000000180)={@local, @random="10def25394f6", [{[], {0x8100, 0x2, 0x1, 0x4}}], {@llc={0x4, {@snap={0xa9, 0xab, "1386", 'Is,', 0xf8, "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"}}}}}, &(0x7f0000000000)={0x0, 0x2, [0x4f3, 0xe8a, 0xc2a, 0x66b]}) [ 2249.733604] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x20, 0x70bd25, 0x25dfdbfd}, 0x1c}}, 0x659d2369f0013242) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0x0, 0x4}, 0x0) r5 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x102, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x2}, 0xd00, 0x0, 0xf56f, 0x0, 0x200, 0x0, 0x801}, 0x0, 0x800000000000000, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) dup(0xffffffffffffffff) socket$inet6(0xa, 0x80002, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa00, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x1ff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) sendmsg$key(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x8010) creat(&(0x7f00000003c0)='./file0\x00', 0x100) r7 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) timerfd_gettime(r7, &(0x7f0000000400)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0], 0x14) 21:51:37 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x200000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:37 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x5, 0x0, 0x0, 0x6}, 0x1c) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x0, 0x800, 0x8001}}, 0x30) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xa}}, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2250.063136] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:37 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x7a00) 21:51:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x332, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)) ioctl$KVM_RUN(r2, 0xae80, 0x900000000000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="78e06bb1fc7d290400800000", @ANYRES32=0x6, @ANYBLOB="900012000c0001006970366772650000800002001400070000000000000000000000ffffe000000114000600fe8800000000000000000000000000011400070054fe55a73990441fd4fcb3fda9f9002708001500def60e000800"], 0x5}}, 0x0) 21:51:37 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0x80045505, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2250.235408] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:37 executing program 5: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x2, 0x6, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:51:37 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60e3060000b80d207d4e0b116a00000000000000000000bbff0200000000000000000000000400010000907800000000fe8000"/78], 0x0) 21:51:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x300000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:37 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2250.609543] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2250.699466] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:38 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:38 executing program 0: close(0xffffffffffffffff) pipe(&(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\b/\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write(0xffffffffffffffff, 0x0, 0x0) [ 2250.763038] net_ratelimit: 20 callbacks suppressed [ 2250.763045] protocol 88fb is buggy, dev hsr_slave_0 [ 2250.773265] protocol 88fb is buggy, dev hsr_slave_1 [ 2250.778387] protocol 88fb is buggy, dev hsr_slave_0 [ 2250.783502] protocol 88fb is buggy, dev hsr_slave_1 21:51:38 executing program 5: 21:51:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x400000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:38 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2e, 0x600000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000040)={0x0, 0x0, 0x7, 0x1, 0x2}) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x400, 0x0) fcntl$setpipe(r1, 0x407, 0x2) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2250.957014] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2251.030703] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:38 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x8100) 21:51:38 executing program 0: 21:51:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:38 executing program 5: 21:51:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x500000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:38 executing program 0: [ 2251.316714] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:38 executing program 5: 21:51:38 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)={0x6, 0x1, 0x6, 0x4, 0x9f8}) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x8000, 0x8, 0x8000, 0x6, 0x1, 0x0, 0x1}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2251.460374] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2251.483075] protocol 88fb is buggy, dev hsr_slave_0 [ 2251.488178] protocol 88fb is buggy, dev hsr_slave_1 21:51:39 executing program 5: 21:51:39 executing program 0: [ 2251.627515] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2251.723055] protocol 88fb is buggy, dev hsr_slave_0 [ 2251.728258] protocol 88fb is buggy, dev hsr_slave_1 [ 2251.733417] protocol 88fb is buggy, dev hsr_slave_0 [ 2251.738566] protocol 88fb is buggy, dev hsr_slave_1 21:51:39 executing program 0: 21:51:39 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xdf00) 21:51:39 executing program 5: 21:51:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x600000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:39 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x128140, 0x0) r2 = accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @empty}, &(0x7f0000000180)=0x10, 0x80000) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') ioctl$TCSETXF(r2, 0x5434, &(0x7f0000000240)={0x0, 0x0, [0x7, 0x2, 0x7fff, 0x0, 0x8], 0x200}) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000001c0)) 21:51:39 executing program 0: 21:51:39 executing program 5: [ 2252.302081] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2252.349623] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:39 executing program 0: 21:51:39 executing program 5: 21:51:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:39 executing program 0: 21:51:40 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) ppoll(&(0x7f0000000000)=[{r2, 0x2028}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000180)={0x80}, 0x8) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2252.690832] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:40 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xf000) 21:51:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x700000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:40 executing program 5: 21:51:40 executing program 0: 21:51:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:40 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) socketpair$tipc(0x1e, 0xa, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x40000) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000200)={0x1}) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000180)={0xfffffffffffffffe, 0x100000001, 0x7fff}) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x10, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x2000, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:40 executing program 0: 21:51:40 executing program 5: [ 2253.293425] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2253.311187] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:40 executing program 5: 21:51:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xa00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:41 executing program 0: [ 2253.618953] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2253.639230] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:41 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x34000) 21:51:41 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:41 executing program 5: 21:51:41 executing program 0: 21:51:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xe00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:41 executing program 5: [ 2254.181570] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2254.226848] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:41 executing program 0: 21:51:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x86, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x17b) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) read(r0, &(0x7f00000000c0)=""/235, 0xeb) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x4) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 21:51:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000380)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 21:51:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xf00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2254.624448] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2254.698805] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:42 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x400300) 21:51:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x2, 0x2}) 21:51:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:42 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)='F', 0x1, r1) keyctl$read(0x15, r2, 0x0, 0x0) add_key$keyring(&(0x7f0000003dc0)='keyring\x00', 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000180)={r3, 0x40, 0xed}, &(0x7f00000001c0)={'enc=', 'oaep', ' hash=', {'sha256-ce\x00'}}, &(0x7f0000000240)="31f34bfcd1c9d77e3bc7e6518ece43dcbc8ff06736cec839184cb3c3719d9f6621655ddbd96e093b5791a54987f11a7fcb15d60d83d662f9acce1dd3c63a81f8", &(0x7f0000000280)=""/237) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x1400000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:42 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'bridge_slave_0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/35]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r2, 0x80006) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 2255.446430] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2255.521122] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:43 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) sigaltstack(&(0x7f0000fee000/0x11000)=nil, &(0x7f0000000000)) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:43 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000000016, &(0x7f00000004c0)) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) 21:51:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x2000000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2255.858244] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2255.883026] net_ratelimit: 20 callbacks suppressed [ 2255.883032] protocol 88fb is buggy, dev hsr_slave_0 [ 2255.893075] protocol 88fb is buggy, dev hsr_slave_1 [ 2255.898157] protocol 88fb is buggy, dev hsr_slave_0 [ 2255.903217] protocol 88fb is buggy, dev hsr_slave_1 [ 2255.935836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2255.963015] protocol 88fb is buggy, dev hsr_slave_0 [ 2255.968148] protocol 88fb is buggy, dev hsr_slave_1 21:51:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:43 executing program 5: r0 = msgget$private(0x0, 0x23cea33ffd51e6f6) r1 = getuid() r2 = geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000440)={{0x0, r1, 0x0, r2, 0x0, 0x20}, 0x0, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r3}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffff7, 0x9, &(0x7f0000001540)=[{&(0x7f0000000200)="14657a1b452ea9de86f15adc7aa3e09d606a41ea0c5fa6b5b97c38119efac1c583784add4f595a1deb865b86231a518a5ab3c86846049799a350ef34408d7e03744ed02a7495f95497eb6b83474c2159adf13f", 0x53, 0x40}, {&(0x7f0000000100)="15d4af3b90d33886ec90af7854179e52678724680eeb34fb0cdb9a0eae13203a52f123bbcc5b3b28852be4b611171656f1158f536328", 0x36, 0x3}, {&(0x7f0000000280)="ec1a851e4bc0f95c8534e70a85272427cfd6642397afd5", 0x17, 0x200000000000000}, {&(0x7f00000002c0)="99989ac76407c0c7cca1fbdd79e836d62b8db21311377d38a984e620f49c9938fb8289c318f98d66dac2edda1941c1629a8a687de1dbb0ad71bc39dbd34d98b24382d28f9161c0a2c3de0a8375abf59b94db35739cc9bda0bebad22690c8efd2a615b0cf2bf18e4a517774d093137680a3170abbe4", 0x75, 0x8}, {&(0x7f0000000440)="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", 0x1000, 0x3}, {&(0x7f0000000340)="b3977bff230c90df938f643151f712e6c995b0b0e348f1a1da5e8cf635f2fce11e95ae8f08bad8e99bfc500a11a2dce47123f966c2a4da84d853e49209ca42d0aeba23749d87134d095b3c6ee65ca02c80f8f10fd1add92c6cb5d8df2ee73bc706676e49ab195b2aee24d167d0f338c4a8aeb464d04922f2d61b0a14bf98479c681afe606c9c936da48ae187c567ac7181a432503111da35b09471863e24474a21817e66e77edde6b565853b8e39845358c629504b3922b780a59d63f9cbac58", 0xc0, 0xfffffffffffffff8}, {&(0x7f0000001440)="34703dd0ac5740a555f7722a14de5abfe747cc551701e84b871932dc580ba8c098bc20ccb7c36134509c6bf13171b05e1e50548b93fc6f217a71ab37d2e5380ccd63fed3319101b1367f35a69ac5a0c602cb43aa49681dd128e0b1c683b048", 0x5f, 0x3ff}, {&(0x7f00000014c0)="3648b1b8bb36", 0x6, 0x200}, {&(0x7f0000001500)="24259e53d417e5c98b7b40946a3fd05710daf01a10e0d4ad1edaa8b2aec578edc8087d9e0d554a9567cdfeeb1e62f8ef28a02c5b16faebc4564d9fbd", 0x3c, 0xce6}], 0x40040, &(0x7f0000001640)={[{@nonumtail='nnonumtail=1'}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@smackfsdef={'smackfsdef'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ',cpuset}posix_acl_access-eth1#'}}, {@audit='audit'}, {@audit='audit'}, {@dont_measure='dont_measure'}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfshat={'smackfshat', 0x3d, 'ppp0ppp0'}}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f0000000400)={&(0x7f0000000140)=@caif, 0x4d, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x60) [ 2256.176822] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:43 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x6b6b6b) 21:51:43 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = socket$netlink(0x10, 0x3, 0x6) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x1, 0x6}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2000000010000d0400"/20, @ANYRES32=r9, @ANYBLOB="032b019e5d4774ae200108000000005de4c8"], 0x20}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xc01, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PRIMARY={0x8, 0xb, r5}]}}}]}, 0x3c}}, 0x0) r10 = msgget$private(0x0, 0x23cea33ffd51e6f6) r11 = getuid() r12 = geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) msgctl$IPC_SET(r10, 0x1, &(0x7f0000000440)={{0x0, r11, 0x0, r12, 0x0, 0x20}, 0x0, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r13}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000180)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e21, 0x81, 0x4e20, 0x5, 0xa, 0x80, 0x20, 0x73, r5, r11}, {0x9, 0x9, 0x800, 0x2, 0x9, 0x3ff, 0x0, 0x5}, {0x4, 0xfffffffffffff65c, 0x9, 0x8}, 0x80000001, 0x6e6bbd, 0x0, 0x0, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xf}, 0x4d2, 0x120}, 0x3, @in=@rand_addr=0x124, 0x3502, 0x0, 0x3, 0x4, 0x10001, 0x8, 0x401}}, 0xe8) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 21:51:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x3f00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:43 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'bridge_slave_0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/35]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r2, 0x80006) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 2256.382855] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 21:51:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:44 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000300)=@nameseq={0x1e, 0x1, 0x0, {0x40}}, 0x10) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000380)={r5, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x7f, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) syz_extract_tcp_res(&(0x7f0000000200), 0x91, 0x10000) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000100)={r5, 0xfffffff8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000180)={r6}, &(0x7f00000001c0)=0x8) r7 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r7, &(0x7f0000000300)=@id={0x1e, 0x3, 0x3, {0x4e21, 0x1}}, 0x10) sendmsg$tipc(r7, &(0x7f0000000040)={&(0x7f0000000000)=@nameseq={0x1e, 0x2, 0x0, {0x40, 0x4}}, 0x10, 0x0}, 0x0) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200, 0x0) ioctl$UI_BEGIN_FF_ERASE(r8, 0xc00c55ca, &(0x7f00000000c0)={0x2, 0x3, 0x979e}) 21:51:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x4800000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2256.784446] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2256.962184] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:44 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) accept(r0, &(0x7f0000000400)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000380)=0x80) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x107c80, 0x0) r2 = socket(0xa, 0x3, 0x8) r3 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0xfffffffffffffe90, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r5 = gettid() waitid(0x2, r5, &(0x7f0000000040), 0x20000000, &(0x7f0000000480)) sendmsg$key(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r4, @ANYRESDEC=r5]], 0xfffffffffffffe56}}, 0x20004850) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000240), r4, 0xfffffffc}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x1, r4, 0x1c, 0x1, @ib={0x1b, 0x1, 0x7, {"1f56166030a109bd069b0bc707258d2e"}, 0x0, 0x1f, 0x1}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r6}}, 0x18) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2257.003054] protocol 88fb is buggy, dev hsr_slave_0 [ 2257.008262] protocol 88fb is buggy, dev hsr_slave_1 [ 2257.013416] protocol 88fb is buggy, dev hsr_slave_0 [ 2257.018473] protocol 88fb is buggy, dev hsr_slave_1 21:51:44 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'bridge_slave_0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/35]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r2, 0x80006) sendfile(r1, r2, 0x0, 0x8000fffffffe) 21:51:44 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r3, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r10, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r15}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x1, 0x6}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r12, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2000000010000d0400"/20, @ANYRES32=r15, @ANYBLOB="032b019e5d4774ae200108000000005de4c8"], 0x20}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xc01, 0x0, 0x0, {0x0, 0x0, 0x0, r15}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PRIMARY={0x8, 0xb, r11}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PRIMARY={0x8, 0xb, r15}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2000000010000d0400"/20, @ANYRES32=r8, @ANYBLOB="032b019e5d4774ae200108000000005de4c8"], 0x20}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xc01, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PRIMARY={0x8, 0xb, r4}]}}}]}, 0x3c}}, 0x0) r16 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x7, 0xa0300) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0xc, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1821600}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @map={0x18, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @exit, @exit, @call={0x85, 0x0, 0x0, 0x32}, @generic={0x7f, 0xa, 0xe, 0xfa, 0x3}, @exit]}, &(0x7f0000000140)='GPL\x00', 0x7fffffff, 0x0, 0x0, 0x40f00, 0x1, [], r4, 0x6, r16, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x8, 0x6, 0x2}, 0x10}, 0x70) r17 = open(&(0x7f0000000080)='./file1\x00', 0x808042, 0x0) fcntl$setlease(r17, 0x400, 0x0) rename(&(0x7f0000fdbff8)='./file0\x00', &(0x7f0000000000)='./file1\x00') acct(0x0) [ 2257.130356] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x4c00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:44 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xf0ffff) 21:51:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:44 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x1, 0x0, 0x1}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x140200, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev, @in=@loopback}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) syz_emit_ethernet(0xfdef, &(0x7f0000000280)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86e560e3010000180000fe8000000000000000000000000000a7f28a1a1613db0ec898d7fc8bbbff020000000000000000000000000001000090781c000000fe8000000000000000000000000000000bec16219c3a70f03f5defc20cca13817ef558e99e"], 0x0) [ 2257.399465] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x400000, 0x174) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x33, &(0x7f0000000040)=0x8, 0x4) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x2000) [ 2257.579734] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x6000000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:45 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'bridge_slave_0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/35]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r2, 0x80006) sendfile(r1, r2, 0x0, 0x8000fffffffe) 21:51:45 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x87}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x80000000000001}, {{@in=@multicast1, 0x4d3, 0x6c}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x2}}, 0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r4, 0xc02c5341, &(0x7f0000000200)) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r6, 0x800442d3, &(0x7f00000000c0)={0xac0, 0x4fe, 0x9, @broadcast, 'tunl0\x00'}) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x42042, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r7, 0x4040ae72, &(0x7f0000000080)={0xc1, 0x80, 0x5, 0x3a9dd596900f0de7, 0x3}) r8 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 21:51:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2257.890451] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:45 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x80000001, 0x401000) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000200)={0x4, 0x8008, 0x9f, 0xfffffe97, 0x0}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000280)={r4, 0xffffd202}, &(0x7f00000002c0)=0x8) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000001c0)=0x1) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2258.025915] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x6800000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:45 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x1000000) 21:51:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:45 executing program 0: madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback, 0x60000000}, 0x1c) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@initr0, @ldst={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffec}]}, 0x0, 0x0, 0xe1, &(0x7f0000000200)=""/225, 0x0, 0x6, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x0, 0xffffffff, 0x78}, 0x10}, 0x70) signalfd4(r1, 0x0, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) [ 2258.467549] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2258.542650] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)='F', 0x1, r1) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0xfdef, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60e3060000180002008000000000000000000000000000bbff02ffffffffffffffef0600000000000000907800000000fe800000000000000100000000000000be76d67d171581bea4b61b662d43a0e6944e083067b2aeae835dccce6e0b1ad53038bbead78aad5279deb203880a829a534c9ba4a5437214821583607379ba72a4583dda21c0e339ef2d"], 0x0) r3 = dup2(r0, r2) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000100)={0x5, 0x8000, 0x0, 0x100000001, 0x0, 0x1f}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f0000000000)) getuid() 21:51:46 executing program 0: pipe(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000280)=""/135, 0x87}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000140)={0x615, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xa}}}, {{0x2, 0x4e22, @local}}}, 0x104) preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) accept4(r0, 0x0, &(0x7f0000000000), 0xacaf146cc87d5989) 21:51:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x6c00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:46 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0x1ff, 0x5) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$security_smack_transmute(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x3) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000280)={0x7, 0x8}, 0x10) [ 2258.896540] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:46 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000180)="7ee81dc04509b73f412fc9a2259ea8a1773e4ad841e903be4b8d59dcaf6e555c4cde147e5dcf2fde1f6eb3715f9932ffd8df1b62fea1f3dfb8510f9889020956cdf960f98528db544ab8038ff585791b20e3cea27b654ae64724317da119555e542e11854837e29395b7ee7f2fba81a9bdea9491a317cc351dc4d44cbe0fa0da031102e288cbe171f96b37ab7457ff57be4f4d55", 0x94) r3 = syz_open_dev$sndpcmc(&(0x7f0000001440)='/dev/snd/pcmC#D#c\x00', 0x9, 0x1000c0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r3, 0x800442d4, &(0x7f0000001480)=0x6) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2259.006518] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x10101, 0x2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x11051000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r3, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10001}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x44808}, 0x8480c) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000000), 0x1c) r5 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$TCSETSW(r5, 0x5403, &(0x7f0000000140)={0xf1fb, 0x8, 0x6, 0x7fff, 0x6, 0x80, 0xe2, 0x0, 0x7dd1, 0x0, 0x4, 0x3}) sendmmsg$inet6(r0, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="01388a9ed948077770721099898401b713757c137db6b7b942d80a8b7ed6ac1fd87dbb971e28dace", 0x28}], 0x1}}], 0x1, 0x40880) 21:51:46 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x2000000) [ 2259.230950] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x7400000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:46 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000040)=0x4, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) [ 2259.432678] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x180) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) setgid(0x0) socket$alg(0x26, 0x5, 0x0) setgid(0x0) syz_open_dev$swradio(&(0x7f0000000500)='/dev/swradio#\x00', 0x0, 0x2) getgroups(0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)=0xffffffffffffffea) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0x4, 0x0, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000100), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/cuse\x00', 0x2, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000240)={0x0, 0x0, 0x7ff}) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='./file0\x00') sendto(0xffffffffffffffff, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) fchmod(r0, 0x100) recvmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x70}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000003000), 0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={0x0, 0x4}, &(0x7f00000004c0)=0x8) r2 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'hsr0\x00'}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000600)={0x980000, 0x1, 0x0, [], &(0x7f00000001c0)={0xf0f045, 0x8, [], @p_u16=&(0x7f00000006c0)=0xdc6}}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r3, 0x0, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2259.512639] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x1c7d9, 0x0, [], [{}, {0x0, 0x0, 0x80000001}]}) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000080)) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000000000000d9c701000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008600"/159]) dup2(0xffffffffffffffff, r0) r3 = open$dir(0x0, 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) mknodat(r3, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) renameat2(r3, &(0x7f0000000000)='./file1\x00', r3, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x19, 0x6, 0x80}}) 21:51:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7ff) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@sha1={0x1, "e8cc5216781cc1f06c89062cda80c0223342b6c5"}, 0x15, 0x4) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000040)={0x40, 0xfffa, [0x7, 0x3ff, 0x3f, 0x7, 0x9c], 0x7}) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0x9e, &(0x7f0000000200)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0xfffffffffffffe2c, 0x0, 0x0, @remote, @mcast2, {[@dstopts={0x0, 0x0, [], [@ra={0x5, 0x2, 0x2}, @pad1]}, @hopopts={0x511774bf2492a2b2, 0x1, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @dstopts={0xc, 0x3, [], [@padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x80}, @pad1, @enc_lim={0x4, 0x1, 0x9c}]}], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x7a00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2259.870807] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2259.908801] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:47 executing program 5: socket$rds(0x15, 0x5, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x18d, 0x0) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f00000000c0)=0x3) readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x3b6) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x88048a81}, 0xc, 0x0}, 0x11) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f0000000200)=0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000700)={0x20}, 0x20) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r7 = dup(r6) write$FUSE_OPEN(r7, &(0x7f0000000700)={0x20}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000240)={'vxcan1\x00', r5}) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e21, @local}, 0xffffffffffffff27) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(0xffffffffffffffff, 0x1) recvmsg(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) [ 2260.110433] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:47 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x3000000) 21:51:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:47 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x9effffff00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2260.411814] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2260.439205] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xc4eeff7f00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2260.701241] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2260.713211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2000000ffffdfffffff86dd60e3060000180000fe8000000000000000000000000000bbff0200000000000000000000000000010000907800000000fe8000"/78], 0x0) 21:51:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/access\x00', 0x2, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)={r1}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e22, @broadcast}, 0xc) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x2) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getpgid(0x0) r2 = inotify_init1(0x0) gettid() r3 = getpid() fcntl$setown(0xffffffffffffffff, 0x8, r3) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) ptrace$setregset(0x4209, r4, 0x20000004, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) tkill(0x0, 0x3a) r6 = syz_open_procfs(r5, 0x0) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000000}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x10000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r7, 0x4c80, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setresuid(0x0, 0xee01, 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') r8 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r9 = dup(r8) write$FUSE_OPEN(r9, &(0x7f0000000700)={0x20}, 0x20) r10 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r10) r11 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r12 = dup(r11) write$FUSE_OPEN(r12, &(0x7f0000000700)={0x20}, 0x20) read(r12, &(0x7f00000002c0)=""/226, 0x7) r13 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp6\x00') read(0xffffffffffffffff, &(0x7f0000000040)=""/230, 0x1c02fa81) listen(r13, 0x6) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000600), 0x2f0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) 21:51:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xd8eeff7f00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2261.099866] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:48 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x4000000) [ 2261.163081] net_ratelimit: 20 callbacks suppressed [ 2261.163087] protocol 88fb is buggy, dev hsr_slave_0 [ 2261.173177] protocol 88fb is buggy, dev hsr_slave_1 [ 2261.178290] protocol 88fb is buggy, dev hsr_slave_0 [ 2261.183392] protocol 88fb is buggy, dev hsr_slave_1 21:51:48 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) getegid() r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) r3 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r3, 0xb) shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x2000) shmctl$SHM_LOCK(r3, 0xb) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000000)=0x1f, &(0x7f0000000040)=0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) [ 2261.447041] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2261.893062] protocol 88fb is buggy, dev hsr_slave_0 [ 2261.898186] protocol 88fb is buggy, dev hsr_slave_1 21:51:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8d9) syz_read_part_table(0x0, 0xaaaaaaaaaaaaab6, &(0x7f00000028c0)=[{0x0, 0x0, 0x3307}, {&(0x7f0000000000)="c9c2", 0x2}]) 21:51:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xf0ffffff00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:49 executing program 0: perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f00000000c0)={0x0, 0x1, 0xfffffbff, [], &(0x7f0000000040)={0xc9c4eda05f056865, 0x7ff, [], @ptr=0x42}}) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x9b9) syz_open_dev$dspn(0x0, 0x0, 0x20000) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x42) 21:51:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x400, 0x0) r4 = accept4$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c, 0x100000) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x4e21, 0x2, @rand_addr="2891c2bcc2f8f0c361eb1f10df767db5", 0x7}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60e3060000180000fe8000000000000000000000000000bbff020000000000000000000000010000907800000000fe8000"/76], 0x0) [ 2262.131988] protocol 88fb is buggy, dev hsr_slave_0 [ 2262.137172] protocol 88fb is buggy, dev hsr_slave_1 [ 2262.142291] protocol 88fb is buggy, dev hsr_slave_0 [ 2262.147429] protocol 88fb is buggy, dev hsr_slave_1 [ 2262.165355] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2262.210036] block nbd0: Unsupported socket: shutdown callout must be supported. [ 2262.215409] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:49 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x5000000) [ 2262.256396] block nbd0: Unsupported socket: shutdown callout must be supported. 21:51:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:49 executing program 0: perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) syz_open_dev$ndb(0x0, 0x0, 0x0) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f00000000c0)={0x0, 0x1, 0xfffffbff, [], &(0x7f0000000040)={0xc9c4eda05f056865, 0x7ff, [], @ptr=0x42}}) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x9b9) syz_open_dev$dspn(0x0, 0x0, 0x20000) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x42) 21:51:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xf97b000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:49 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}, 0x8000000}, 0x1c) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0xfffffffffffffd08) write$UHID_DESTROY(r4, &(0x7f0000000140), 0x4) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) ioctl$USBDEVFS_SETCONFIGURATION(r6, 0x80045505, &(0x7f0000000180)=0xeb7e) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaa192bce5e2dfb86dd60d8652b00180600fe8000000000000000000d00000000aafe80f6dd0000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="600200009078000002020000"], 0x0) [ 2262.547344] block nbd0: Unsupported socket: shutdown callout must be supported. [ 2262.585416] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2262.595321] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:50 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffffffffffe52, &(0x7f0000000100)={&(0x7f0000000300)={0x14, 0x0, 0x9, 0x319}, 0x14}}, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000200)={0x1, 0x7}, 0x2) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="50506a23b6d8114bb5", @ANYRES16=r5, @ANYBLOB="01000000000000010000140000904c00070008000200000000007c9a47356e54adf8f03324a83132c15f39c2c51c4f85888f5c1a9381bdbafb393f0645a4a13e0129b9090f02651bd869d7d0a33fd29ce74e8244ad55a9f3c54db7f5ea9c273a4ac720ed80ce17883b36d23e1ee199d60dafb5050fdf09a111fda8531900c4b106400b1e03cc14904eda3a1519b17531b552c0dcf380c41de89f93b330f34600a146507d3cd59b71ed9e0bb8521f"], 0x20}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100002}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x48, r5, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4000}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r6 = socket(0x10, 0x80002, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmmsg$alg(r6, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 21:51:50 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x184cecc64450d376, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000180)) umount2(&(0x7f0000000040)='./file0\x00', 0x5) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000000)=@req={0x6, 0x1, 0x8045, 0x8}, 0x10) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xffffff7f00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='tmpfs\x00\x80\n\x0f\xa0\'\x87\x9e\xee\xde.$^\x19\x15\xb8.\x19\x1c\xae\xf6\xbf\x9c\xda~\xf7\xb4lE\x82j\x00\x88\xfb_\xab\xf8\x9c\x1f\xc59\xd4\xb5\xd9\x19', 0x2000002, 0x0) chdir(&(0x7f0000000300)='./file0\x00') symlink(&(0x7f0000000500)='.\x00', &(0x7f00000004c0)='./file0\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) umount2(&(0x7f00000001c0)='./file0/../file0/file0\x00', 0x80000000002) fchdir(r0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0/../file0/file0\x00', &(0x7f0000000080)={0xa9, 0x2, "f2ce8cb0549cd35352ffd2433e0bb3faab20073589b49351f44f2018d68571324718c703049690232ae7325e78de651f8d15dedf45edeab137b2b93e6d2f578082e335b31a0dfe98332965c46a637415d6e77eda62997fb867a07b70bc6748842f8673f6754261ed307e5698e12604e69abf07c19f126452fb3ef3c9ecff82e3ac4e3c4e53e76c36a1585c7e4acc46a56c54ecd261549b48a54e49d2a8e24f9855"}, &(0x7f0000000140), 0x400) [ 2262.964425] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2263.015415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:50 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd5cbc1bc40b928d291d43d2bacf1b60e3060000180000fe8000000000000000000000000000bbff0200000000000000000000000000010300000000000000fe8000"/92], 0x0) 21:51:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:50 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x6000000) 21:51:50 executing program 0: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(r1, &(0x7f0000000100)='./file0/file0\x00', r1, &(0x7f0000000000)='./file0\x00', 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="97978737bbc29a9de656dfe116ff2d166bd4c3da7043e90c78bbe5abc74444ea4f5d7eabae4d6d26b2de2f831694e7ce60d37353ebbaee6c4a1fcc931d09ab275befd671009a00504ff1f0422d90f10188d8095f"], 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r2, 0x800, 0x0, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'batadv0\x00'}}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x10000001) 21:51:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xffffffff00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2263.366857] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2263.554380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2263.711860] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2265.817192] IPVS: ftp: loaded support on port[0] = 21 [ 2265.941014] chnl_net:caif_netlink_parms(): no params data found [ 2265.996628] bridge0: port 1(bridge_slave_0) entered blocking state [ 2266.003099] bridge0: port 1(bridge_slave_0) entered disabled state [ 2266.010965] device bridge_slave_0 entered promiscuous mode [ 2266.018467] bridge0: port 2(bridge_slave_1) entered blocking state [ 2266.024981] bridge0: port 2(bridge_slave_1) entered disabled state [ 2266.032852] device bridge_slave_1 entered promiscuous mode [ 2266.098865] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2266.110396] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2266.128579] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2266.137568] team0: Port device team_slave_0 added [ 2266.143661] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2266.152396] team0: Port device team_slave_1 added [ 2266.161423] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2266.177004] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2266.256579] device hsr_slave_0 entered promiscuous mode [ 2266.283142] net_ratelimit: 20 callbacks suppressed [ 2266.283148] protocol 88fb is buggy, dev hsr_slave_0 [ 2266.293159] protocol 88fb is buggy, dev hsr_slave_1 [ 2266.298246] protocol 88fb is buggy, dev hsr_slave_0 [ 2266.303301] protocol 88fb is buggy, dev hsr_slave_1 [ 2266.312252] device hsr_slave_1 entered promiscuous mode [ 2266.363171] protocol 88fb is buggy, dev hsr_slave_0 [ 2266.368302] protocol 88fb is buggy, dev hsr_slave_1 [ 2266.375258] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2266.390794] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2266.407019] bridge0: port 2(bridge_slave_1) entered blocking state [ 2266.413538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2266.420107] bridge0: port 1(bridge_slave_0) entered blocking state [ 2266.426486] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2266.515025] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2266.521217] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2266.530794] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2266.540243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2266.557847] bridge0: port 1(bridge_slave_0) entered disabled state [ 2266.599096] bridge0: port 2(bridge_slave_1) entered disabled state [ 2266.610365] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2266.627951] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2266.634240] 8021q: adding VLAN 0 to HW filter on device team0 [ 2266.644560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2266.652095] bridge0: port 1(bridge_slave_0) entered blocking state [ 2266.658453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2266.684753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2266.692380] bridge0: port 2(bridge_slave_1) entered blocking state [ 2266.698756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2266.745487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2266.753528] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2266.765473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2266.787795] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2266.806934] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2266.822695] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2266.850620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2266.858980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2266.867364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2266.880049] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2266.895249] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2266.902244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2266.940160] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2266.963192] protocol 88fb is buggy, dev hsr_slave_0 [ 2266.968245] protocol 88fb is buggy, dev hsr_slave_1 21:51:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$ax25(r0, &(0x7f00000003c0)={{0x3, @netrom}, [@default, @rose, @rose, @rose, @netrom, @netrom, @bcast, @netrom]}, &(0x7f0000000240)=0x48) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f00000002c0)={{0x29, @local, 0x4e22, 0x4, 'lblcr\x00', 0x18, 0x0, 0x8}, {@empty, 0x4e24, 0x2, 0x4, 0xdc6, 0x9}}, 0x44) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000480)={{0x8}, {0x4}}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x67569de56747e9d7, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xdbc}, 0x200000000, 0x2}, 0x0, 0x0, r2, 0x2) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) r5 = accept(0xffffffffffffffff, 0x0, 0x0) recvmsg(r5, &(0x7f000000b680)={0x0, 0x0, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x5}], 0x1}, 0x0) getsockname$tipc(0xffffffffffffffff, 0x0, 0x0) r6 = getpid() ptrace(0xffffffffffffffff, r6) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420b, 0x0, 0x0, 0x0) eventfd(0x200) 21:51:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:54 executing program 0: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000002c0)='./file0/file0\x00', r1, &(0x7f0000000180)='./file0/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(r1, &(0x7f0000000100)='./file0/file0\x00', r1, &(0x7f0000000000)='./file0\x00', 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="97978737bbc29a9de656dfe116ff2d166bd4c3da7043e90c78bbe5abc74444ea4f5d7eabae4d6d26b2de2f831694e7ce60d37353ebbaee6c4a1fcc931d09ab275befd671009a00504ff1f0422d90f10188d8095f"], 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x2c, r2, 0x800, 0x0, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'batadv0\x00'}}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x10000001) 21:51:54 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0xfffffffffffff000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:54 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000040)=0x2, 0x8bcc) r1 = open(&(0x7f0000000180)='./file0\x00', 0x1, 0x0) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) ioctl$int_out(r2, 0xa8c2, &(0x7f0000000300)) recvfrom$unix(r1, &(0x7f00000001c0)=""/185, 0xb9, 0x2020, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e24}, 0x6e) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="50506a23b6d8114bb5", @ANYRES16=r8, @ANYBLOB="01000000000000010000140000904c00070008000200000000007c9a47356e54adf8f03324a83132c15f39c2c51c4f85888f5c1a9381bdbafb393f0645a4a13e0129b9090f02651bd869d7d0a33fd29ce74e8244ad55a9f3c54db7f5ea9c273a4ac720ed80ce17883b36d23e1ee199d60dafb5050fdf09a111fda8531900c4b106400b1e03cc14904eda3a1519b17531b552c0dcf380c41de89f93b330f34600a146507d3cd59b71ed9e0bb8521f"], 0x20}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r6, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40810940}, 0xffffffd3, &(0x7f0000000480)={&(0x7f00000005c0)={0x40, r8, 0x7dac7771f78c9eff, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x162}, @TIPC_NLA_NODE={0x24}, @TIPC_NLA_NET={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) r9 = dup(r4) write$FUSE_OPEN(r9, &(0x7f0000000700)={0x20}, 0x20) ioctl$SG_GET_COMMAND_Q(r9, 0x2270, &(0x7f0000000000)) prctl$PR_GET_DUMPABLE(0x3) r10 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r11 = dup(r10) write$FUSE_OPEN(r11, &(0x7f0000000700)={0x20}, 0x20) ioctl$TIOCPKT(r11, 0x5420, &(0x7f0000000500)=0x4) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000090000000000000001000100000000000200000000000000060000000000000000000000000000000000000000000000000000000000000087000000018000000002000000000000d1000000000000000400000000000000f40a00000000000000000000000000000000000000000000000000000000c5a700"/256]) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 21:51:54 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x7000000) [ 2267.083028] protocol 88fb is buggy, dev hsr_slave_0 [ 2267.088127] protocol 88fb is buggy, dev hsr_slave_1 [ 2267.164931] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2267.196538] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:55 executing program 0: r0 = socket(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/dlm_plock\x00', 0x101000, 0x0) write$P9_RUNLINKAT(r3, &(0x7f0000001100)={0x7, 0x4d, 0x1}, 0x7) write$nbd(r2, &(0x7f0000000080)={0x67446698, 0x1, 0x3, 0x0, 0x2, "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"}, 0x1010) 21:51:56 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xa000000) [ 2268.535252] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000005ffc)=0x2, 0x4) connect$inet6(r0, &(0x7f0000001ff2)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x11, &(0x7f0000005ffc)=0x2, 0x4) open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000080)={0x15, 0x2c, &(0x7f0000000040)="ee67960f03fe880c81574347e78aec3632d31b7f71a0b7e9e0aa79de6a522ec200fab6ef7b2f462b464a602b"}) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x7fffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r7 = gettid() sched_setaffinity(r7, 0x8, &(0x7f00000000c0)=0x6) r8 = socket$kcm(0x29, 0x5, 0x0) sendfile(r8, r6, 0x0, 0x10001) ioctl$sock_proto_private(r8, 0x89e6, 0x0) 21:51:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:56 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r4) accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x80000) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r5) dup(r1) lseek(r1, 0x243, 0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)={[{0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x21c00, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x14) close(0xffffffffffffffff) socket$inet(0x2, 0x4000000805, 0x0) socket(0xa, 0x2, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x4, 0x20000) ioctl$USBDEVFS_GET_SPEED(r3, 0x551f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) setreuid(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/de\xdfvnull\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) [ 2268.775752] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x4}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2268.990758] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000005ffc)=0x2, 0x4) connect$inet6(r0, &(0x7f0000001ff2)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x11, &(0x7f0000005ffc)=0x2, 0x4) open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000080)={0x15, 0x2c, &(0x7f0000000040)="ee67960f03fe880c81574347e78aec3632d31b7f71a0b7e9e0aa79de6a522ec200fab6ef7b2f462b464a602b"}) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x7fffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r7 = gettid() sched_setaffinity(r7, 0x8, &(0x7f00000000c0)=0x6) r8 = socket$kcm(0x29, 0x5, 0x0) sendfile(r8, r6, 0x0, 0x10001) ioctl$sock_proto_private(r8, 0x89e6, 0x0) 21:51:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2269.148845] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)={[{0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x21c00, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x14) close(0xffffffffffffffff) socket$inet(0x2, 0x4000000805, 0x0) socket(0xa, 0x2, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x4, 0x20000) ioctl$USBDEVFS_GET_SPEED(r3, 0x551f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) setreuid(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/de\xdfvnull\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) [ 2269.322790] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x5}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:57 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xc000000) 21:51:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)={[{0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x21c00, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x14) close(0xffffffffffffffff) socket$inet(0x2, 0x4000000805, 0x0) socket(0xa, 0x2, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x4, 0x20000) ioctl$USBDEVFS_GET_SPEED(r3, 0x551f) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) setreuid(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/de\xdfvnull\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) 21:51:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000005ffc)=0x2, 0x4) connect$inet6(r0, &(0x7f0000001ff2)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x11, &(0x7f0000005ffc)=0x2, 0x4) open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x3, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000080)={0x15, 0x2c, &(0x7f0000000040)="ee67960f03fe880c81574347e78aec3632d31b7f71a0b7e9e0aa79de6a522ec200fab6ef7b2f462b464a602b"}) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x7fffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r7 = gettid() sched_setaffinity(r7, 0x8, &(0x7f00000000c0)=0x6) r8 = socket$kcm(0x29, 0x5, 0x0) sendfile(r8, r6, 0x0, 0x10001) ioctl$sock_proto_private(r8, 0x89e6, 0x0) [ 2269.670916] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2269.738297] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:57 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() getpgid(0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$setown(0xffffffffffffffff, 0x8, 0x0) socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) dup2(0xffffffffffffffff, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x40002) ioctl$int_in(r1, 0x80006080045017, &(0x7f0000000140)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x6, &(0x7f0000000100)) 21:51:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x6}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xd512, 0xe0b7}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x71, &(0x7f0000000100), &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000240)=0xfb) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xffffffff}, &(0x7f0000000080)=0x8) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000140)='./bus\x00', 0x3, 0x7, &(0x7f0000000580)=[{&(0x7f0000000280)="a0fa5175f238f20e36d1ddba92ab922504e5b9f75363533528c2e34df7ecbca585c4f283f4e85c4b33e3d7fced7c70a49aaf49b655e837ab1e36f59ea869ff067d6d", 0x42, 0x7}, {&(0x7f0000000180)="dfa0d17856c58d11744da1f65df0", 0xe, 0x49}, {&(0x7f0000000300)="66ad2941c3346ebc473ea32d287bd86dc210dbf10e3005c51944aa61c13827e915501978c610485c7e714bac7da90dba44b97652fd93076bf2bd38025ffcdb9d6bd949870dba", 0x46, 0x5}, {&(0x7f0000000380)="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", 0xfb, 0x9fc6000000000}, {&(0x7f0000000200), 0x0, 0x1}, {&(0x7f0000000480)="830da9141ba2986012ed6988fa4c6d4edc0e083bd6545b77da1431f3a6b87e8261ebd0c7b8672198c7ff96fec04e87d5f5aa47f1d6d6d919c5bdd94b6db651e66856a24d12f2c62a2951a9588e4f3142af8e0d86226dd8591e726a02984dfff588fdf10beef5e4f41cb3bfe799ac6ad494a7ddae05a769bf9b6befef80f064137eb8de48d1c2aa4b2d227fb7f1ea26374364c503df52a6b8ea61cc94d6cbe75f4840db14719ccc8942a8583caabd6508df823c93b04a62378d94d5757167a81cd5ba4aa911aed78156af02426f1edb74ab479ad0607d01f2c32f49e49433a9c304ff19ab95c48f98f1e1637fa51ce7d3a9de6aaade43", 0xf6, 0x8080000000}, {&(0x7f0000000a80)="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", 0x1000, 0x3}], 0x100000, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 21:51:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2270.157476] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:57 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) openat$cgroup(r2, &(0x7f00000003c0)='syz\xff\x0f', 0x200002, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7fffffff, 0x20820) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r9, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) socket$caif_stream(0x25, 0x1, 0x0) getsockopt$inet_pktinfo(r9, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x1, 0x6}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2000000010000d0400"/20, @ANYRES32=r14, @ANYBLOB="032b019e5d4774ae200108000000005de4c8"], 0x20}}, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xc01, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_PRIMARY={0x8, 0xb, r10}]}}}]}, 0x3c}}, 0x0) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000180)={r14, 0x7562, 0x8, 0x7f, 0x2, 0x20, 0x2}) ioctl$KVM_SET_DEBUGREGS(r7, 0x4080aea2, &(0x7f0000000100)={[0xd000, 0x6000, 0x1, 0xba48a414895f4694], 0x1f, 0x10, 0xff}) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8, 0xa, 0x0, 0x0, 0x4}, 0xfffffdde) syz_emit_ethernet(0x1, &(0x7f0000000200)=ANY=[@ANYRES64=r14], 0x0) [ 2270.247579] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2270.289011] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 21:51:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:58 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xe000000) 21:51:58 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2270.725597] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2270.764098] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:51:58 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) 21:51:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xd512, 0xe0b7}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x71, &(0x7f0000000100), &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000240)=0xfb) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xffffffff}, &(0x7f0000000080)=0x8) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000140)='./bus\x00', 0x3, 0x7, &(0x7f0000000580)=[{&(0x7f0000000280)="a0fa5175f238f20e36d1ddba92ab922504e5b9f75363533528c2e34df7ecbca585c4f283f4e85c4b33e3d7fced7c70a49aaf49b655e837ab1e36f59ea869ff067d6d", 0x42, 0x7}, {&(0x7f0000000180)="dfa0d17856c58d11744da1f65df0", 0xe, 0x49}, {&(0x7f0000000300)="66ad2941c3346ebc473ea32d287bd86dc210dbf10e3005c51944aa61c13827e915501978c610485c7e714bac7da90dba44b97652fd93076bf2bd38025ffcdb9d6bd949870dba", 0x46, 0x5}, {&(0x7f0000000380)="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", 0xfb, 0x9fc6000000000}, {&(0x7f0000000200), 0x0, 0x1}, {&(0x7f0000000480)="830da9141ba2986012ed6988fa4c6d4edc0e083bd6545b77da1431f3a6b87e8261ebd0c7b8672198c7ff96fec04e87d5f5aa47f1d6d6d919c5bdd94b6db651e66856a24d12f2c62a2951a9588e4f3142af8e0d86226dd8591e726a02984dfff588fdf10beef5e4f41cb3bfe799ac6ad494a7ddae05a769bf9b6befef80f064137eb8de48d1c2aa4b2d227fb7f1ea26374364c503df52a6b8ea61cc94d6cbe75f4840db14719ccc8942a8583caabd6508df823c93b04a62378d94d5757167a81cd5ba4aa911aed78156af02426f1edb74ab479ad0607d01f2c32f49e49433a9c304ff19ab95c48f98f1e1637fa51ce7d3a9de6aaade43", 0xf6, 0x8080000000}, {&(0x7f0000000a80)="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", 0x1000, 0x3}], 0x100000, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 21:51:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040), 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:58 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() getpgid(0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() fcntl$setown(0xffffffffffffffff, 0x8, 0x0) socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) dup2(0xffffffffffffffff, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002a00000084000000000000009500000000000000"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$dspn(0x0, 0x0, 0x40002) ioctl$int_in(r1, 0x80006080045017, &(0x7f0000000140)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x6, &(0x7f0000000100)) 21:51:58 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xa}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2271.299300] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2271.362425] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2271.403049] net_ratelimit: 30 callbacks suppressed [ 2271.403057] protocol 88fb is buggy, dev hsr_slave_0 [ 2271.413168] protocol 88fb is buggy, dev hsr_slave_1 21:51:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040), 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:51:58 executing program 0: memfd_create(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file1\x00', 0x0, 0x1) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000d40)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x2ad, 0xb9, 0x0, 0x80, 0x0, 0x0, 0xfffffffffffffffe, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x1}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000000)) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0) mount$9p_tcp(&(0x7f0000000500)='127.0.0.1\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x80, &(0x7f0000000100)=ANY=[@ANYBLOB="7472616e733d7463702c1f6f724a3562518c02e99853269e6fece5c47442307830303030303030303030300500000000000000636573733d616e792c70726976706f"]) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00000000c0)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000280)={0x9}, 0x9) 21:51:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:51:59 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0xf000000) [ 2271.643038] protocol 88fb is buggy, dev hsr_slave_0 [ 2271.648157] protocol 88fb is buggy, dev hsr_slave_1 [ 2271.653315] protocol 88fb is buggy, dev hsr_slave_0 [ 2271.658390] protocol 88fb is buggy, dev hsr_slave_1 21:51:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xe}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2271.758385] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2271.856516] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2271.890080] 9pnet: p9_fd_create_tcp (1242): problem connecting socket to 127.0.0.1 21:51:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040), 0x0, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2271.988784] 9pnet: p9_fd_create_tcp (1392): problem connecting socket to 127.0.0.1 21:51:59 executing program 0: memfd_create(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file1\x00', 0x0, 0x1) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000d40)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x2ad, 0xb9, 0x0, 0x80, 0x0, 0x0, 0xfffffffffffffffe, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x1}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000000)) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0) mount$9p_tcp(&(0x7f0000000500)='127.0.0.1\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x80, &(0x7f0000000100)=ANY=[@ANYBLOB="7472616e733d7463702c1f6f724a3562518c02e99853269e6fece5c47442307830303030303030303030300500000000000000636573733d616e792c70726976706f"]) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00000000c0)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000280)={0x9}, 0x9) 21:51:59 executing program 5: memfd_create(0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) mknod$loop(&(0x7f00000004c0)='./file1\x00', 0x0, 0x1) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000d40)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x2ad, 0xb9, 0x0, 0x80, 0x0, 0x0, 0xfffffffffffffffe, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x1}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_pts(0xffffffffffffffff, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000000)) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB], 0x0) mount$9p_tcp(&(0x7f0000000500)='127.0.0.1\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x80, &(0x7f0000000100)=ANY=[@ANYBLOB="7472616e733d7463702c1f6f724a3562518c02e99853269e6fece5c47442307830303030303030303030300500000000000000636573733d616e792c70726976706f"]) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00000000c0)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000280)={0x9}, 0x9) 21:51:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0x4e, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0xfc, @mcast2, @mcast2, {[], @icmpv6=@mld={0x84, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2272.146172] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:51:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:51:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2272.426897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2272.432503] 9pnet: p9_fd_create_tcp (1512): problem connecting socket to 127.0.0.1 [ 2272.457858] 9pnet: p9_fd_create_tcp (1567): problem connecting socket to 127.0.0.1 21:51:59 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) r0 = socket(0x1, 0x2, 0x13) write(r0, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed000000800328000800030001000000", 0x24) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r1, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="020a962f05bcd270000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x8000, 0x204, 0x1f, 0x3f, 0x1, 0xfffffffb, 0x7, r3}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r4, 0x4}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20004ffc, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r5, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 2272.483330] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2272.523069] protocol 88fb is buggy, dev hsr_slave_0 [ 2272.528191] protocol 88fb is buggy, dev hsr_slave_1 21:51:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0x31e, &(0x7f00000004c0)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x2e8, 0x0, 0x0, @remote, @mcast2, {[@dstopts={0x6c, 0x26, [], [@generic={0xff, 0xc5, "73710dbf6739c5e31f0f2ca5c6dfdf6ac667e41edf47b23782164c350e0bad70f483df7388e26877cec246ba6e1dd69a2cf36abe81bbf8b045dc1e260464f9aeb5fca9e0d501546eaf492b1cd7352ac93f7707cbf4a8d9359bca0566e32ff05430373a34275af674acc616b58fd560ed8ec9a2e27017c4941850d11e74be151491f943f0fb95369daed7d90b9cf14edc0dadcc78a6b8d990e9cfec36a7ba099694d369aa4754471913564a6ba959f98e13fd8c682b4e4f0c6c7355cb8f8bb8af93f5a04458"}, @pad1, @pad1, @generic={0xff, 0x53, "eef2b594e13306aae69404d511eef1dbb6f8ea8075b41cb0d3525f6daf842a0c0431503afee0633438946f123547fd36a05dd86ebbab758aaa137ac23f4290c197c14787fbcfef1b94958f9a88c2f430a41ebd"}, @pad1, @ra={0x5, 0x2, 0x5}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}]}, @fragment={0x2e, 0x0, 0xa5, 0x1, 0x0, 0x6, 0x67}, @dstopts={0x33, 0x0, [], [@ra={0x5, 0x2, 0x9}]}, @dstopts={0x3a, 0x20, [], [@generic={0x0, 0xe1, "565acae4dc1eba66af7b054cc390a466fdd8d71e08a18115c395a52ec9ae3b9297e0541b0898d1e7ca43fbd2ad30536fb98a1665394a1bacebba896441e3ac742881f79cda7de36e180e659b9487960d3dfebfa4278cd6043285172cdb324244d6971d67229ad1a91a99b032a650ca882f2031b1742dff081973617ac32378aa6326deaf17f39ccdfc9c4c486b24d36678bdf0c4d7c4fc5397bc8cce1361cf030114d8edfec8a3c3e38b4def2c4c4b1e58a57047548802e883ab8570abdcf35142cd577c9d28d44c0e6483854c8216614fd1d23bf8bcc264c20142a5c7b4ffba45"}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @mcast1}, @enc_lim={0x4, 0x1, 0x3b}]}, @srh={0x3a, 0xc, 0x4, 0x6, 0x6, 0x28, 0x4, [@local, @dev={0xfe, 0x80, [], 0x29}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty]}], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2272.533326] protocol 88fb is buggy, dev hsr_slave_0 [ 2272.538381] protocol 88fb is buggy, dev hsr_slave_1 21:52:00 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x10000000) 21:52:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x14}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000140)={0x100000000}) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1}}, 0x30) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf104340551378d4a}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r3, 0xc008551b, &(0x7f0000000040)={0x5, 0x8, [0x100, 0x1]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup3(r1, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000200)={0x8, 0xea98, 0x1, 0x0, 0x20, 0x8, 0xfff, 0x1, r7}, &(0x7f0000000280)=0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYPTR], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) pipe2$9p(&(0x7f0000000240), 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) [ 2272.910888] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2273.151098] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) r3 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000380)={r5, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x7f, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={r5, 0x10, &(0x7f0000000240)=[@in={0x2, 0x4e22, @multicast2}]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={r6, 0x4}, 0x8) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) setsockopt$packet_int(r2, 0x107, 0xb, &(0x7f0000000200)=0x8000, 0x4) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) getsockname$unix(r7, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e) 21:52:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x48}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2273.467488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2273.490129] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:00 executing program 0: r0 = open(&(0x7f00000001c0)='./file0/file0\x00', 0x40000, 0x2b0) clock_gettime(0x5, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000000)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0/file0\x00', 0x40c2, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000300)={0x0, 0x0, [], @raw_data=[0x7, 0x19e, 0x3ff, 0x80000000, 0x10000, 0x8, 0x1, 0x0, 0x9, 0x0, 0x9f, 0x0, 0x8, 0x10000, 0x4, 0x9ed, 0x4, 0xf0, 0xfffffffa, 0xffffb6a4, 0x0, 0xaa, 0x6b75, 0x5, 0x1, 0x1, 0xffff, 0x3, 0x20, 0x9, 0x1, 0x3f]}) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init() unlink(&(0x7f0000000040)='./file0\x00') write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) 21:52:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:01 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x13, 0x65, 0xffff, 0x8, 0x6, '9P2000'}, 0x13) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x0, {0x4}}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) stat(&(0x7f0000000140)='./file0\x00', 0x0) 21:52:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x4c}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:01 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x11000000) 21:52:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) ioctl(r0, 0x2, &(0x7f0000000100)) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) setsockopt$packet_int(r2, 0x107, 0x10, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0x52, &(0x7f0000000000)={@link_local, @broadcast, [{[], {0x8100, 0x6, 0x1, 0x1}}], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2273.772847] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2273.895969] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2273.977174] audit: type=1800 audit(1573077121.400:272): pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=116 res=0 21:52:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[]}, 0x1, 0x0, 0x0, 0x20002040}, 0x800) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCCBRK(r1, 0x5428) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) 21:52:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x60}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40400}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)={0x380, r1, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x34c4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x49}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffff000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x108}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}]}, @TIPC_NLA_LINK={0xf8, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x88}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5e8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9fb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5983}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6c03}]}]}, @TIPC_NLA_BEARER={0x110, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfff}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x100, @mcast1, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x7, @loopback, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1000}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffff9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfff}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}]}, 0x380}, 0x1, 0x0, 0x0, 0x20000080}, 0x100088c0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x14, 0x2, [@IFLA_BR_VLAN_DEFAULT_PVID={0x8}, @IFLA_BR_MCAST_ROUTER={0x8, 0x16, 0xfffffffc}]}}}]}, 0x44}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x0, {0x6, 0xfffffff9, "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", 0x7f, 0x9, 0x5, 0x2, 0x1, 0x7f, 0x80}, r5}}, 0x128) [ 2274.207224] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:01 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) vmsplice(r2, &(0x7f0000000240)=[{&(0x7f0000000000)="f35dcfe1fcafe695d832139a89dfdacfa60e772144521027ad59dbd82140e29a23130e3c5cb7b07bb15ecabea692fcd7bd31f069593fc5b27fa7ea030e4caa276afd2cee064a0819b7f66df37997925a61118b20a7a7ebd684e1579398f2d22f8a91aefc815b5e5450", 0x69}, {&(0x7f0000000180)="41d8b57f3370bc48146692605d612b12f734aae0fe271837cd8ff4ae6b473dd7f483b996bca69d2f8aec6367939ca1be33c0bdd398ded14abc28e21010feb0e1c76a0671c96f7a789334e5b885e941ce6176deaff37cf94725e424e726526b63a37fc77827ec0923758172b29463c9f9b10a3412dd796baeb45334f8bd6f045f739319dafd94bce9541c5d07808c116d351fd815bf452d1d264215cc", 0x9c}], 0x2, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2274.267368] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x68}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2274.416792] netlink: 'syz-executor.0': attribute type 39 has an invalid length. [ 2274.463955] netlink: 'syz-executor.0': attribute type 22 has an invalid length. 21:52:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) write$binfmt_elf32(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x8, 0x5, 0xc, 0x20000000000, 0x1, 0x6, 0x0, 0x1a4, 0x38, 0x1a8, 0x2, 0x7, 0x20, 0x1, 0x3, 0x2000, 0x1}, [{0x70000000, 0x5, 0x0, 0x0, 0xf428, 0x3a, 0x1}, {0x60000000, 0x5, 0x10001, 0x1, 0xc643, 0x3f, 0xffff, 0x1}], "34f065dd707b5a6173a2c24959f0248391c0c259032bf3e0bf", [[], [], [], [], [], [], [], []]}, 0x891) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x6, 0xfffffdaa) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2274.523821] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:02 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x12000000) 21:52:02 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x6c}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x9, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="25bca274769e620aa734faa872943afd874e2f98b479a7316270146d0e02f8e63ba8863cd7c2c6760253efa7d1bb051b595e05b15cf8365a3f0da7e82d27db105c8e862610a377b0bd1a59da9144e720643800"/97, 0x61, 0x1000}], 0x8000, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000000c0)={0x1000, 0x6}) [ 2274.810653] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:52:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{0x0}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2274.989096] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:02 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x0, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r1, 0x4) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) fcntl$addseals(r2, 0x409, 0x6) openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x802, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x2d, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000140)={0x1ff, 0xfffffffffffffffc, 0xa, 0x0, 0x0, 0x5}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 2275.146991] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:02 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x74}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:02 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000280)={'nat\x00', 0x0, 0x4, 0xc3, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000180)=""/195}, &(0x7f0000000300)=0x78) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2275.362041] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:02 executing program 0: getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x1c, 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x3305, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x101401) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xfffffffffffffff7, 0x4000) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) preadv(r3, &(0x7f0000001300)=[{&(0x7f0000000140)=""/133, 0x85}, {&(0x7f0000000200)=""/215, 0xd7}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x3, 0x8000) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x13012, r1, 0x0) 21:52:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7a}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2275.601505] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2447908d6c74a9185242c2def1a23b55c53bd125a97ff86dd60e30600000000000000000000000100009078010000000000000400fef8ffffffffffffffffffffffff00"/79], 0x0) [ 2275.813484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:03 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x13000000) 21:52:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:03 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x0, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r1, 0x4) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) fcntl$addseals(r2, 0x409, 0x6) openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x802, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x2d, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, &(0x7f0000000140)={0x1ff, 0xfffffffffffffffc, 0xa, 0x0, 0x0, 0x5}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 2275.920313] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf0}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@null, @bcast, @bcast, @null, @rose, @null, @null, @bcast]}, &(0x7f0000000180)=0x52deb4f97a1c319c, 0x0) sendto(r1, &(0x7f00000001c0)="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", 0x1000, 0x1, &(0x7f00000011c0)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x1000}, 0x80) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2af8500ffffffffffff86dd60e306003bd5c583c6f5ee74550000000000000000000000bbff0200000000000000000000000000010000907800000000fe8000"/78], 0x0) socket$alg(0x26, 0x5, 0x0) 21:52:03 executing program 0: socket$bt_rfcomm(0x1f, 0x51253494c4300a13, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xffffffffffffffe9, &(0x7f0000000580)=0x5) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x2, 0x5, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000005c0)="4acf665ff77df4f20690a5a83bc1a1e6519321db1dc2bf7eee06d978abdfbb33f3bc7025e6befda3c827875946eb75c14639ab6e76811a733653f72afc34e5fce1bed277a8faa02e6da16041b40bab677d6555e94a42b7ac236c8c35d729ac501cf28293c919f2f3ceec4703c892adeac90504aeb3ba485e09bda66d2b96124cabc4d2e653848e2bd909287d0d2c433d72bbd4333cf37f2a8972bba453c776d2c73c61b9fa2153405fc0253992c918682c7018f6a280a9ff312ae4a6996bd9547aed66e72f94342a7d27b9483f7e2e8e3c5bbb89452fd9bb6708ae89ba29", 0xde, 0xfffffffffffffffe) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400)=0x0, &(0x7f0000000540), &(0x7f00000006c0)=0x0) keyctl$chown(0x4, r2, r3, r5) socketpair$unix(0x1, 0x40000000008, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = socket(0xa, 0x3, 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f0000000440)=r8) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x89a2, &(0x7f0000000700)={'bridge0\x00\x00\x02\x00', 0x4}) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000480)) memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r6, &(0x7f0000000c40)=ANY=[], 0x0) close(r1) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$VHOST_SET_VRING_ERR(r9, 0x4008af22, 0x0) ioctl$KVM_GET_FPU(r9, 0x81a0ae8c, &(0x7f0000000180)) r10 = accept4$packet(r9, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001d80)=0x14, 0x0) listen(r10, 0xfffffffd) setsockopt$inet_sctp_SCTP_EVENTS(r7, 0x84, 0xb, &(0x7f0000000740)={0x41, 0x2, 0x4, 0x9, 0x23, 0x7ff, 0xac, 0x24, 0x7d, 0x3, 0xa0}, 0xb) process_vm_writev(r8, &(0x7f0000000bc0)=[{&(0x7f0000000980)=""/165, 0xa5}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)=""/52, 0x34}, {&(0x7f0000000a40)=""/73, 0x49}, {&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000780)=""/8, 0x8}], 0x6, &(0x7f0000001d00)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/129, 0x81}], 0x100000000000036d, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1f00}) ioctl$sock_inet6_SIOCADDRT(r11, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r12 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r12, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1f00}) ioctl$sock_inet6_SIOCADDRT(r12, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r13 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r13, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1f00}) ioctl$sock_inet6_SIOCADDRT(r13, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) r14 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r14, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x1f00}) ioctl$sock_inet6_SIOCADDRT(r14, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) sendmsg$key(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYPTR64=&(0x7f0000001dc0)=ANY=[@ANYPTR64=&(0x7f00000020c0)=ANY=[@ANYRES32, @ANYRES32=r11, @ANYPTR64=&(0x7f0000000900)=ANY=[@ANYRES64, @ANYPTR64, @ANYPTR64, @ANYRES32=r12, @ANYRES64=0x0, @ANYRES16=r13, @ANYRES64=r4, @ANYRESDEC, @ANYRESDEC=0x0], @ANYBLOB="c428cb2a1b14f69f2ea8ec1c6fe966a9cc5985216e6ba7f75b3ad87ec1b8654bd4bcdc4e0de96c5c3df866040ca83e2eafb2335f7cca0e02e6522afac08517e769cec86d0829d484a4afd3f8b83ca75d1f5ea146f55d93fbdacff47874f69c8d819e3099ab060fd8ab8ca1db1dccf44060e8fc4661cff946051d76b8c19ea459a98029fb3c024d27a1", @ANYRESDEC, @ANYRES32, @ANYRESOCT=r14, @ANYRESDEC]]], 0x8}}, 0xfffffffffffffff9) socket$nl_route(0x10, 0x3, 0x0) r15 = syz_open_dev$amidi(&(0x7f0000000880)='/dev/amidi#\x00', 0x9, 0x80000) sendmsg$nl_route(r15, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000002000290f000000000001acf2fbd06c53844a000000000000000409000000", @ANYRES32=0x0, @ANYRES32=0x0], 0x3}}, 0xfb8f27a1fc67befc) [ 2276.123420] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2276.265496] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb179", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x300}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2276.426835] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2276.486346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb179", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000300)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, 0x0) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x420ffe4, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000040)={{0x5}, 'port1\x00', 0x0, 0xf9c5611f68499783, 0x1, 0xfff, 0x0, 0xfffffff7, 0x8, 0x0, 0x4, 0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000000)=0x8000) [ 2276.668648] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2276.687273] net_ratelimit: 24 callbacks suppressed [ 2276.687280] protocol 88fb is buggy, dev hsr_slave_0 [ 2276.697305] protocol 88fb is buggy, dev hsr_slave_1 [ 2276.702422] protocol 88fb is buggy, dev hsr_slave_0 [ 2276.707530] protocol 88fb is buggy, dev hsr_slave_1 21:52:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x500}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:04 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x14000000) 21:52:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb179", 0x8}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2276.921048] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 2276.923028] protocol 88fb is buggy, dev hsr_slave_0 [ 2276.944222] protocol 88fb is buggy, dev hsr_slave_1 [ 2276.949300] protocol 88fb is buggy, dev hsr_slave_0 [ 2276.954379] protocol 88fb is buggy, dev hsr_slave_1 21:52:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) get_robust_list(r1, &(0x7f00000001c0)=&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f0000000200)=0x18) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x5, 0x8000, 0x6, 0x2, 0x0, 0x1}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60e3060000180000fe8093be1a33146948150000000000bbff0200000000000000000000000000010000907800000000fe8000000000000000002a0000000000"], 0x0) [ 2277.001623] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x28000, 0x0) sendto$inet(r1, &(0x7f0000000180)="97631ae4f77344a76c71325441340b8fc425163e99bb68b9b22d949a2e5aa80e57193c7b402497d4a91f71baa687fe486eceb206bac6f7129ea41a78ccaad66b8b6943690a08935644a491f73ad82bbdb75e533249d51279ab6fcdd592a191a0db8ea066bc157e64d94f024ef096060cf6e5af0c1e869ff0571d24f2f39d8df82dac17c2aad20ad7d0b1a29192784263e4635ec57e7da99b61fe7647a9057f02a368fa478db3994f03e38be15bdaa1426ccace905ad928ad0b830c51404a16e4538436ef7c8efc65a90fa6d0f1407b1339e4f54c140b9b3e5aeb9d4953bb23da94b33a497fb9c2fd49b993a74b301d3af56d", 0xf2, 0x40, &(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:52:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80801, 0x0) write$ppp(r1, &(0x7f0000000180)="0b436a3a676b1c8a9e2449e213cc4f93369a2c0129587bfcff7e75fdb8db56f2a982f766ed584af6990bf15d7f944464aa039a90e1e1e530facf501d1d49d00e115d67c6697500cdbc7e0d4dd0dd5430568853da0b25061b88233317f1b1e99ad5e12ca155cc73915b137bdea93e2f9432acfe5883197f787d592b9b09c99a1cbe943c659ea441e43b958c63c76e808ed1a3e72155730a83bc55978292db3954d92f91e989e68a12aa724e7cc98fcd35bd57e6cbb48388a0b1ca7ebfa0d871ae1ce6aba2d780f0928e03301ef622c9e0ea5eeb0b6b62e41d2acdd56aeeb6ba0f8d57ab29a5", 0xe5) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2277.314422] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2277.643042] protocol 88fb is buggy, dev hsr_slave_0 [ 2277.648156] protocol 88fb is buggy, dev hsr_slave_1 21:52:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x600}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faff", 0xc}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80801, 0x0) write$ppp(r1, &(0x7f0000000180)="0b436a3a676b1c8a9e2449e213cc4f93369a2c0129587bfcff7e75fdb8db56f2a982f766ed584af6990bf15d7f944464aa039a90e1e1e530facf501d1d49d00e115d67c6697500cdbc7e0d4dd0dd5430568853da0b25061b88233317f1b1e99ad5e12ca155cc73915b137bdea93e2f9432acfe5883197f787d592b9b09c99a1cbe943c659ea441e43b958c63c76e808ed1a3e72155730a83bc55978292db3954d92f91e989e68a12aa724e7cc98fcd35bd57e6cbb48388a0b1ca7ebfa0d871ae1ce6aba2d780f0928e03301ef622c9e0ea5eeb0b6b62e41d2acdd56aeeb6ba0f8d57ab29a5", 0xe5) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x7f, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0xcf3, @loopback, 0x2}}, 0x1000, 0x1, 0x0, 0x6, 0xb8e}, &(0x7f0000000040)=0x98) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) syz_open_procfs(r4, &(0x7f0000000000)='net/udp6\x00') 21:52:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400201) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) 21:52:05 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x15000000) [ 2277.824845] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2277.835097] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faff", 0xc}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2277.902031] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80801, 0x0) write$ppp(r1, &(0x7f0000000180)="0b436a3a676b1c8a9e2449e213cc4f93369a2c0129587bfcff7e75fdb8db56f2a982f766ed584af6990bf15d7f944464aa039a90e1e1e530facf501d1d49d00e115d67c6697500cdbc7e0d4dd0dd5430568853da0b25061b88233317f1b1e99ad5e12ca155cc73915b137bdea93e2f9432acfe5883197f787d592b9b09c99a1cbe943c659ea441e43b958c63c76e808ed1a3e72155730a83bc55978292db3954d92f91e989e68a12aa724e7cc98fcd35bd57e6cbb48388a0b1ca7ebfa0d871ae1ce6aba2d780f0928e03301ef622c9e0ea5eeb0b6b62e41d2acdd56aeeb6ba0f8d57ab29a5", 0xe5) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x81, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r2, 0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)='/selinux/member\x00', 0xffffffffffffffff}, 0x30) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r4) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x200600, 0x0) r6 = openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x404080, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r3, 0x7, r4, &(0x7f0000000280)={r5, r6}) r7 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r8 = dup(r7) write$FUSE_OPEN(r8, &(0x7f0000000700)={0x20}, 0x20) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r8, 0x84, 0x7, &(0x7f0000000040)={0x30}, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x2, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2, @loopback}, 0x28) [ 2278.037491] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2278.101278] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:05 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r1) r2 = dup(r1) write$P9_RRENAME(r2, &(0x7f0000000000)={0x7, 0x15, 0x4}, 0xffffffffffffffc3) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000040)) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000180)=ANY=[@ANYBLOB="018049a9d8f11abb97969209f00f9881bac24376aa0fdbef6f0343d49e63b9e18a000000ffffffffffff86dd60e3060000180000fe8000000000000000000000000000000000000000001d00000600a400ffffff7800000000fe000000e4836b66f6c42ce77aab0bec6ec49b0cd3eb2cfe18966c4b79eed6b7800afe9f"], 0x0) 21:52:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x700}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2278.300094] tls_set_device_offload_rx: netdev lo with no TLS offload 21:52:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faff", 0xc}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2278.379180] tls_set_device_offload_rx: netdev lo with no TLS offload [ 2278.425445] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2278.466063] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80801, 0x0) write$ppp(r1, &(0x7f0000000180)="0b436a3a676b1c8a9e2449e213cc4f93369a2c0129587bfcff7e75fdb8db56f2a982f766ed584af6990bf15d7f944464aa039a90e1e1e530facf501d1d49d00e115d67c6697500cdbc7e0d4dd0dd5430568853da0b25061b88233317f1b1e99ad5e12ca155cc73915b137bdea93e2f9432acfe5883197f787d592b9b09c99a1cbe943c659ea441e43b958c63c76e808ed1a3e72155730a83bc55978292db3954d92f91e989e68a12aa724e7cc98fcd35bd57e6cbb48388a0b1ca7ebfa0d871ae1ce6aba2d780f0928e03301ef622c9e0ea5eeb0b6b62e41d2acdd56aeeb6ba0f8d57ab29a5", 0xe5) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x6) pipe(0x0) setsockopt$inet6_int(r1, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x5, 0xffffff09) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000380)) getsockname$netlink(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) openat$ashmem(0xffffffffffffff9c, 0x0, 0x101000, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000380), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2c6c6f3008000000080104000003660000"]) open(&(0x7f0000000140)='./file0\x00', 0x20, 0x40) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200), 0xc) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x40000000, 0x0) 21:52:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff", 0xe}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0x80841) r2 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = getuid() syz_mount_image$ntfs(&(0x7f0000000340)='ntfs\x00', &(0x7f0000000480)='./file0\x00', 0x200, 0x3, &(0x7f00000005c0)=[{&(0x7f00000004c0)="e970df368e3beba07cb036128894d70078e755df03924dd6d9c027ef2c43bdb88406b3c698eead28b74e8af6b528ff50872a311aa05278f0ad008bed301165b592e1", 0x42, 0xc}, {&(0x7f0000000540)="eb4ca0339ad56f4d27320232582af7aad80836bfa428609b0abbec150222ba0ea7c1b9a784585821659a89da808756c61f2f5ae0a6be09098024b3e6", 0x3c}, {&(0x7f0000000580)="1d42cb4a57ce214bea7220bc0236d7bd81162b5488f4f05fa281a0", 0x1b, 0xff}], 0x0, &(0x7f0000000640)={[{@case_sensitive_yes='case_sensitive=yes'}, {@umask={'umask', 0x3d, 0x8a}}, {@case_sensitive_yes='case_sensitive=yes'}, {@errors_recover='errors=recover'}, {@errors_continue='errors=continue'}, {@nls={'nls', 0x3d, 'cp857'}}, {@disable_sparse_yes='disable_sparse=yes'}], [{@uid_gt={'uid>', r5}}, {@obj_role={'obj_role', 0x3d, '/dev/snd/pcmC#D#c\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'em0-'}}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000380)={r4, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x7f, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000180)={r4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x9, 0x1000, 0x8, 0x8, 0x4, 0x0, 0x1, 0xfff, r6}, &(0x7f0000000240)=0x20) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x281040, 0x0) r8 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) uselib(&(0x7f0000000740)='./file0/file0\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r8, 0x84, 0x70, &(0x7f0000000380)={r10, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x7f, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000002c0)={r10, 0x9}, &(0x7f0000000300)=0x8) ioctl$MON_IOCQ_RING_SIZE(r7, 0x9205) 21:52:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xa00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2278.703238] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2278.766859] overlayfs: unrecognized mount option "lo0" or missing value 21:52:06 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x16000000) 21:52:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80801, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:06 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x3) ioctl$VT_DISALLOCATE(r1, 0x5608) [ 2278.907898] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2278.937387] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2278.950994] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff", 0xe}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xe00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2279.099292] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2279.166629] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff", 0xe}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2279.318033] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2279.415640] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60e3060000180200fe8000000000000000000000000000bbff0200000000000000000015000000010000907800000000fe8000"/78], 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) flock(r3, 0x10) r4 = dup(r1) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) ioctl$USBDEVFS_REAPURBNDELAY(r4, 0x4008550d, &(0x7f0000000180)) r5 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}, 0x0, 0x8e, 0x5a}], 0x18) [ 2279.473102] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:07 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80801, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2279.727659] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:07 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x18000000) 21:52:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0f", 0xf}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2279.940672] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:07 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x3) ioctl$VT_DISALLOCATE(r1, 0x5608) 21:52:07 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80801, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x1400}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0f", 0xf}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getgid() setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:52:07 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x80801, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2280.425399] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2280.462656] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0f", 0xf}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x80801, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x2000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2280.749246] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:08 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x19000000) 21:52:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000200)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60e3060000180000fe8000000000000000000000000000bbff0200000000000000000000000000010000907800000000fe80000000000000000000000000000035388c901fb945c1af1b1391d276ce6845661883b440df3b09ca317b887a0a8e6d3abe495069bad53584863f5ad441d33b83fd960e404633eb2b6069c08d6409700b85d2039d00c99a4aec78f8dacb6463fc3eab61255837f5f7d5aad357ee3312bf21bdd20cccb7682891b7b02f95d82a35389622b0790757e5459b9a80335f43be757517791593520000000000"], 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) [ 2280.878618] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2280.984444] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2281.288805] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:09 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x3) ioctl$VT_DISALLOCATE(r1, 0x5608) 21:52:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x80801, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x3f00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:09 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) waitid(0x0, r1, &(0x7f0000000180), 0x80000000, &(0x7f0000000200)) 21:52:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2281.717986] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2281.739955] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2281.781678] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2281.803032] net_ratelimit: 26 callbacks suppressed [ 2281.803050] protocol 88fb is buggy, dev hsr_slave_0 [ 2281.813104] protocol 88fb is buggy, dev hsr_slave_1 21:52:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x4800}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2282.043108] protocol 88fb is buggy, dev hsr_slave_0 [ 2282.048293] protocol 88fb is buggy, dev hsr_slave_1 [ 2282.053445] protocol 88fb is buggy, dev hsr_slave_0 [ 2282.058500] protocol 88fb is buggy, dev hsr_slave_1 21:52:09 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x1a000000) 21:52:09 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1383, 0x2101) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r2) sendfile(r2, r1, &(0x7f0000000040)=0x1f, 0x80) fcntl$setsig(r1, 0xa, 0x21) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:52:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x80801, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2282.311365] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2282.355572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2282.407317] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2282.627079] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2282.690552] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2282.923025] protocol 88fb is buggy, dev hsr_slave_0 [ 2282.928238] protocol 88fb is buggy, dev hsr_slave_1 [ 2282.933366] protocol 88fb is buggy, dev hsr_slave_0 [ 2282.938413] protocol 88fb is buggy, dev hsr_slave_1 21:52:10 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getgid() setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:52:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60e3060000180000fe8000000000000000000000000000bbff0200000000010000000000000000010000907804000000fe8000"/78], 0x0) 21:52:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x4c00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:10 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x1c000000) [ 2283.182590] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2283.188725] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, 0x0, 0x0, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:10 executing program 5: socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:10 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60e3060000180000fe8000000000000000000000000000bbff02000000000000000000000000000100009078441d168400000000fe8000"/78], 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) ioprio_get$pid(0x3, r1) 21:52:10 executing program 5: socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:10 executing program 0: lookup_dcookie(0x0, &(0x7f00000001c0)=""/194, 0xc2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x18700, @mcast2, 0x6}}}, 0x84) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000000000)="fd", 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 21:52:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x6000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2283.581714] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:11 executing program 5: socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2283.665153] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140), 0x0, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2283.786210] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) prctl$PR_CAPBSET_READ(0x17, 0x5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) gettid() syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000100)="25bca274769e620aa734fa0003000000000000045c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd70000000053ef", 0x3a, 0x400}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6a6f75726e616c5f696f7072696f3d307830303030303030380a23d5ef1e090467bbf567ef4854059c7496e45f49c7859dd153f51d733c44247d9c0240b5af313abe0720f54a67aa685f3a5f100c4b5b65502591c0b8ea0d015adf61f5f6037efb67a269ab84fbb7d96d167232c1a1ca696f0f746d7d86cef93bd80940a2aa11923d17eef7730ed9ed50dc1cc17d9796b4955da268271f3790b009ad14853ac1042d140ea2a9620d6067d2d0843c04db42faae0c2d337647378dab4bfc1a7bae0e32601490a37b87edca510ebe8a0a45ad61f3bdc97c0d922e651b64ad664812c8a8b260dc7382a2cb43e165"]) write$cgroup_pid(r0, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x1800000000000000) 21:52:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140), 0x0, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 2284.075303] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:11 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x1d000000) 21:52:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x6800}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:11 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x80, 0xcf3, 0x2, 0x2, 0x5, 0x29f, 0x38, 0x22, 0x8001, 0x8001, 0x20, 0x2, 0xab, 0x3, 0x1}, [{0xe0000002, 0x7ff, 0x10000, 0x80000000, 0x4d, 0x1000, 0x6, 0x2}], "7dc4ff6f1d21031d728ef891988c27e250111d23a888e467da988e000448fc94763b161a5f2ce6bda1b5da755c42837abaea03a2913a4bf5766eae56987d0fbef217d1eeb9a37304a5788d0d6fc6b5f27d2039de193e9ef298326235ad9d0f861c574f91ac4eb8f1ff16395bdd08b5585146fccdf21eb2071bd381203e4facc0636548eafe2ab852c74df0a26d961cd4258fa7a60e3c00286a27abb47c166edb56a217394dffbd1b645fc2df871ff59b4e469670f2e4c710d9ed0e61d503f978d569ee7ca969b0206896", [[], [], [], [], [], [], [], []]}, 0x922) 21:52:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 2284.215766] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140), 0x0, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 21:52:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x6c00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2284.512541] EXT4-fs (loop0): Unrecognized mount option "journal_ioprio=0x00000008 [ 2284.512541] #Õï g»õgïHTœt–ä_IÇ…ÑSõs0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r6, @ANYBLOB="028ded95b373287ef66470940db342b4ac4e5347a7c8a8cc974dc00e23cdf187d67c61cf140389d2dc6129e077b4842ee70d31ea117b923318048130b19c6001f3a415d2e81cfea81af18975466b54b5418cd48006c242308d7e990a191f99f623e0cce329dfbccde7ce8bdd54c5fce02796d7e20a4c3cf399722cb8d890220b0c9ccfc623fb168ad04c141a1017a64fb26cf53192d9f20e8f25cfec15531dfdf279ddb30a43122f8fae5bd79abb59fce0b7ef147c72f40746b2845e03b26c887e34f0d45e3766440c0b1b684f77392150c10b45"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 21:52:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7400}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 21:52:12 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x1e000000) 21:52:12 executing program 3: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)=@v2={0x2, @aes256, 0x4, [], "13c38e178b4521f10126d7ed12a3ed34"}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) [ 2285.248449] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2285.306444] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7a00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 2285.443867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48847 sclass=netlink_route_socket pig=7894 comm=syz-executor.0 21:52:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2285.548650] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7894 comm=syz-executor.0 21:52:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000380)={r5, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x7f, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={r5, 0xfff}, &(0x7f0000000040)=0x8) syz_emit_ethernet(0xfffffffffffffdaf, &(0x7f0000000180)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @empty, {[@fragment={0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x64}, @routing={0x42, 0x0, 0x0, 0x1, 0x0, [@rand_addr="844a5985d378be51d8a1dde0b8f5b1b4", @ipv4={[], [], @multicast1}, @rand_addr="4b707d60f80cc2a241cb4104d9ea688f", @mcast2, @remote, @loopback, @empty, @dev={0xfe, 0x80, [], 0xc}]}, @srh={0x0, 0x0, 0x4, 0x0, 0x8, 0x18, 0xbfb0, [@empty, @empty, @mcast1]}, @fragment={0x3b, 0x0, 0x2, 0x0, 0x0, 0x4, 0x64}, @routing={0x5c, 0x0, 0x0, 0x9, 0x0, [@rand_addr="869aae52064c84ed117058b1e07a06dc", @empty, @mcast2]}, @fragment={0x62, 0x0, 0x4, 0x0, 0x0, 0x1, 0x80000068}, @dstopts={0x33, 0x0, [], [@enc_lim={0x4, 0x1, 0x4}, @pad1]}, @fragment={0x21a7ea64a1295db2, 0x0, 0xff, 0x0, 0x0, 0x3, 0x65}], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1c}}}}}}}, 0x0) [ 2285.664926] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2285.677219] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7894 comm=syz-executor.0 [ 2285.695257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7894 comm=syz-executor.0 21:52:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2285.722651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7894 comm=syz-executor.0 [ 2285.789468] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2285.882415] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7894 comm=syz-executor.0 [ 2285.961350] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7894 comm=syz-executor.0 [ 2286.073997] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7894 comm=syz-executor.0 [ 2286.141502] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7894 comm=syz-executor.0 [ 2286.172293] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7894 comm=syz-executor.0 [ 2286.186149] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:13 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000001000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2, 0xffffffff}, 0x10}, 0x70) socket(0x1, 0x800, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000080)=0x5, 0x4) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r5 = dup(r4) write$FUSE_OPEN(r5, &(0x7f0000000700)={0x20}, 0x20) ioctl$sock_proto_private(r5, 0x89e0, &(0x7f0000000140)="b61e0e472275ca1500dcc7de7c66fcb86dff091c8a1111671615ab082be5879ed6befdefc55bc6382e23820dbe17bd24e3ca8baea4c1643e386ce6c4d6e5bd34716107c0e88c9f5a83ca34f4170ec115d861d6e9b23219d334801380097ee7208603dfdfb37997984d3c25680c554148f845c258899a70dbfadd544b5212760b0136bd8a837761f079e6249892a9b1a04195bd5866d0727c2b0ee425ddef25cf21901a8e659d90df22411fe835f0feeb6fd3b1768281776cc06400c1d1cf69728dd47d6b3f84755463b13fd0111daae7823a7f84") exit(0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) ioctl$RNDCLEARPOOL(r5, 0x5206, &(0x7f00000000c0)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xcba) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r7 = dup(r6) write$FUSE_OPEN(r7, &(0x7f0000000700)={0x20}, 0x20) setsockopt$IP_VS_SO_SET_TIMEOUT(r7, 0x0, 0x48a, &(0x7f0000000080)={0x0, 0x1, 0x20000}, 0xc) 21:52:13 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000)=r4, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x1}, 0x3b0) syz_emit_ethernet(0xfdef, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c2000000ff0000fe80000000000000b883bbc2000000bbff020000000000000000000000fbdf436c3728642bd5ff266fac440000010000907800000000fe8000000000000000000000000000000000000000000000000000000082ad02ca037f08b3d8debc1ecd58917f19ae9a5fa7535ee8db07336bfbc81a41b618bd7a701ce73101e2773ba1d56341"], 0x0) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) r7 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r8 = dup(r7) write$FUSE_OPEN(r8, &(0x7f0000000700)={0x20}, 0x20) r9 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r9, 0x84, 0x70, &(0x7f0000000380)={r11, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x7f, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r11, 0x7f}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000280)={r12, 0x9fa}, &(0x7f00000002c0)=0x8) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{}]}) 21:52:13 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7bf9}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 21:52:13 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x20000000) 21:52:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2286.449498] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 2286.520076] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:14 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8000, 0x4000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000002540)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000325bd7000fedbdf2501000000e7ff020009000000000000000c00050089000000000000000c00060002000000000000000800010000000000876080279df58a56e2914a491130ba60306a107516ca79e7e7352375238851e45c7f6e30abece470a5bb95119d4f074720773788584d2ceba12aa50b071c826c97ce0c385e0b0000000000004955f093b4bfb03ccdb1f8c3b1c1a70c669e3a69c612c92332a7abe01abb3bd1f9424e4dc1f9c52f5ccd580e68e2ec21a0d8c8fd1324149fd4d506f14721e57dc2617318edefff944b4cc67cce356ed6e7c7befadc39"], 0x40}, 0x1, 0x0, 0x0, 0x20080400}, 0x1) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x855e, 0x6, 0x8200, 0x7, 0x0, 0x0, 0x1000}, 0x1c) r3 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000140)={0x1, 0x0, {0x5, 0x0, 0xd9, 0x7ff}}) syz_emit_ethernet(0x228f, &(0x7f0000000280)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @broadcast, [{[{0x9100, 0x6, 0x0, 0x4}], {0x8100, 0x1, 0x1}}], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x2251, 0x0, 0x0, @remote, @mcast2, {[@dstopts={0x11, 0x200, [], [@generic={0xfd, 0x1000, "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"}]}, @hopopts={0x32, 0x0, [], [@ra={0x5, 0x2, 0x19}]}, @dstopts={0x33, 0x7, [], [@padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x28, {0x4, 0x8, 0x80, 0x80, [0x100, 0x0, 0x200, 0xcd]}}, @jumbo={0xc2, 0x4, 0x80000001}, @enc_lim={0x4, 0x1, 0x1f}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, @routing={0x2c, 0x2, 0x2, 0x0, 0x0, [@mcast2]}, @dstopts={0x0, 0x21a, [], [@generic={0x9, 0xca, "a4cf437b6c3ede70828537e87d03640253246f068aed6e2a0f16bebccd4b2b40e0c39fb73b25b9aa2f28c052b442749a0f2796fa5a7e4761b0b1826ca4ce6e61dc872b3d8610016a1ee1eb8bda2e230d1849640ffd74c85c4f3bcf23775d45ee1f70303d5a3a9db440651e65e716dbcc883edda1424594af0278e64ffeb7c1ee6c0fedcc92a8c6c59cc569f5648ee679dee0b6a8e843e6628c7429fc97e089fb15ff7c6695db06b1dfc6ecdadaacad33355f442ef1a5ca4f5dd4ae897956950d6a8e8b63ab97d87db15e"}, @jumbo={0xc2, 0x4, 0x8001}, @enc_lim={0x4, 0x1, 0xb9}, @generic={0x8, 0x1000, "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"}]}], @udp={0x4e20, 0x4e22, 0xf1, 0x0, [@guehdr={0x1, 0x0, 0x1, 0x8, 0x100}], "9c7c8412f68d2623ba6e9d830d03013044c2257daa48ae2c7c4ded28a6b9240bb33926b28540b8c37e585e62f57ad8e64ab67601bb409e5ac2a35dd9450aacea3ffc6a1e5265ee07fedd02e68701e46e9af12efd53e3181c537458fefea6d590ef2bf4873bc7f7d08204a92b8b4014179fb451320c09608f99930250d6a59268c592e7cde4c0379dfbd9484b3e264ded898016f776a7b8d37bd6ba8c6576dde423a262b67d93f68166b7a3770e78aad540179a7889e2973f50776b91da7ff455fbc2dcf71c3fe0036aef033288043f488865e72a26eef54175a6aa4db9547b077d15b0c205"}}}}}}, 0x0) [ 2286.888450] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2286.920925] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2287.083093] net_ratelimit: 24 callbacks suppressed [ 2287.083101] protocol 88fb is buggy, dev hsr_slave_0 [ 2287.093244] protocol 88fb is buggy, dev hsr_slave_1 [ 2287.098346] protocol 88fb is buggy, dev hsr_slave_0 [ 2287.103446] protocol 88fb is buggy, dev hsr_slave_1 [ 2287.323131] protocol 88fb is buggy, dev hsr_slave_0 [ 2287.328309] protocol 88fb is buggy, dev hsr_slave_1 [ 2287.333432] protocol 88fb is buggy, dev hsr_slave_0 [ 2287.338578] protocol 88fb is buggy, dev hsr_slave_1 21:52:14 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000001000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2, 0xffffffff}, 0x10}, 0x70) socket(0x1, 0x800, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000080)=0x5, 0x4) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r5 = dup(r4) write$FUSE_OPEN(r5, &(0x7f0000000700)={0x20}, 0x20) ioctl$sock_proto_private(r5, 0x89e0, &(0x7f0000000140)="b61e0e472275ca1500dcc7de7c66fcb86dff091c8a1111671615ab082be5879ed6befdefc55bc6382e23820dbe17bd24e3ca8baea4c1643e386ce6c4d6e5bd34716107c0e88c9f5a83ca34f4170ec115d861d6e9b23219d334801380097ee7208603dfdfb37997984d3c25680c554148f845c258899a70dbfadd544b5212760b0136bd8a837761f079e6249892a9b1a04195bd5866d0727c2b0ee425ddef25cf21901a8e659d90df22411fe835f0feeb6fd3b1768281776cc06400c1d1cf69728dd47d6b3f84755463b13fd0111daae7823a7f84") exit(0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) ioctl$RNDCLEARPOOL(r5, 0x5206, &(0x7f00000000c0)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xcba) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r7 = dup(r6) write$FUSE_OPEN(r7, &(0x7f0000000700)={0x20}, 0x20) setsockopt$IP_VS_SO_SET_TIMEOUT(r7, 0x0, 0x48a, &(0x7f0000000080)={0x0, 0x1, 0x20000}, 0xc) 21:52:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf97b}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:14 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x21000000) 21:52:14 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) munmap(&(0x7f0000011000/0x4000)=nil, 0x4000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x8000, 0x6, 0x8000, 0xc000, 0x0, 0x4, 0x4}, 0x1c) syz_emit_ethernet(0xfdef, &(0x7f0000000100)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x0, 0x0, @remote, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffff0a000000}}}}}}}, 0x0) 21:52:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x401}, 0x20}}, 0x0) [ 2287.635275] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2287.646370] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:15 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002c00)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000002d00)=0xe8) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x501, 0x0, 0xfffffffe, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_ROUTER={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x22, &(0x7f0000000080)="cf5f6284bc03aee55c38a9cae6562dbc887f38403544745a4fa5abc185eaa0d17a9cf74776f3d296030819fbd926c78ff4d5e80941c5c1c811cb6745fa1388", 0x3f) 21:52:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x401}, 0x20}}, 0x0) 21:52:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x401}, 0x20}}, 0x0) 21:52:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{0x0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 2288.043668] protocol 88fb is buggy, dev hsr_slave_0 [ 2288.049363] protocol 88fb is buggy, dev hsr_slave_1 [ 2288.175822] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:15 executing program 0: request_key(0x0, 0x0, &(0x7f0000000100)='/dev/net/tun\x00', 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x202081) openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x3, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) tkill(r1, 0x9) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) write$P9_RCLUNK(r3, &(0x7f0000000000)={0x7, 0x79, 0x2}, 0x7) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x5f, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x1, 0x0, 0x5, 0x2}}}}}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000340)='\t', 0x1, 0x200400cf, 0x0, 0x0) 21:52:15 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x34000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{0x0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) 21:52:15 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x22000000) 21:52:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0xc, 0x4, 0x81000000004, 0x8000000007, 0x0, r0}, 0x2c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="18006041ebdf74075ced00000000", @ANYRES32=r1, @ANYBLOB="0000000065ee23eb06000000009500000000000000"], &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1034, &(0x7f00000014c0)=""/4096}, 0x48) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) ioctl$TCFLSH(r6, 0x540b, 0x9) r7 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r8 = dup(r7) write$FUSE_OPEN(r8, &(0x7f0000000700)={0x20}, 0x20) getpeername$inet(r8, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000000c0)=0x876) [ 2288.566302] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2288.630239] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x400300}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) 21:52:16 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f4cc65ee3f065d2bc069345512429067402e11c5fb9bf297773e098ab7b5b81fb263ec6e2b5dd4307d02c9052ca0229a3945269dc9233fcf608"], 0x1) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x1, 0x4, 0x2, 0x0, r2}) dup(r1) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) r4 = dup2(r3, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0x20}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r6, r4}) 21:52:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{0x0}], 0x1}}], 0x1, 0x10000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:16 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f0000000040)={0x8, 0x101, 0x1, {0xa83, 0x8, 0x9, 0x3}}) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x80200, 0x0) write$P9_RRENAME(r2, &(0x7f0000000240)={0x7, 0x15, 0x2}, 0x7) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)={0x20, 0x3ff, 0x1}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000200)) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) sendmsg$sock(r4, 0x0, 0x20) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000300)) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400, 0x0) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000140)=""/101) stat(0x0, &(0x7f0000000380)) prctl$PR_SET_DUMPABLE(0x4, 0x2) dup2(r1, r0) [ 2288.859573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8}]}}}]}, 0x3c}}, 0x0) [ 2289.034273] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2289.081496] Unknown ioctl 19264 21:52:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf0ffff}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2289.224636] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:16 executing program 3: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7c8, 0x400000) write$FUSE_INIT(r3, &(0x7f00000000c0)={0x138, 0x0, 0x6, {0x7, 0x1f, 0x80, 0x102420, 0x1, 0x100, 0x0, 0x2}}, 0x50) ioctl$FIBMAP(r2, 0x1, 0x0) 21:52:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:16 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x24000000) [ 2289.471133] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:52:16 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x1000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8}]}}}]}, 0x3c}}, 0x0) 21:52:17 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) syz_open_dev$dmmidi(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x3e, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000f00000a0700ff2eff07000000000000000000000000000000000000000000004200000000000000018000000000000300000000000000000000000055aa", 0x40, 0x1c0}]) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140), 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, 0x0) socket$inet6(0xa, 0x8004808000080003, 0x3) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f0000000540)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) syz_open_procfs(0x0, 0x0) creat(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x1) socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000200)=0x14) bind$unix(r0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) 21:52:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@noalign='noalign'}]}) pselect6(0x40, &(0x7f0000000080)={0xfffffffffffffff9, 0x1, 0xee34, 0x60d38355, 0x1000, 0x5, 0x7fff, 0x3}, &(0x7f00000000c0)={0x10000, 0x3f, 0x3, 0x1, 0x8, 0x4, 0x7, 0x5}, &(0x7f0000000100)={0xfff, 0x6, 0xf5, 0x4, 0x9, 0x9, 0xe6, 0x5}, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={0x9}, 0x8}) [ 2289.645895] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2289.814301] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x2000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xa}], 0x3, 0x0) [ 2289.984878] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8}]}}}]}, 0x3c}}, 0x0) 21:52:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x3000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2290.169599] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:17 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2290.331264] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:17 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x25000000) [ 2290.512016] FAULT_INJECTION: forcing a failure. [ 2290.512016] name failslab, interval 1, probability 0, space 0, times 0 21:52:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xa}], 0x3, 0x0) 21:52:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x4000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2290.618884] CPU: 0 PID: 10223 Comm: syz-executor.5 Not tainted 4.19.82 #0 [ 2290.625848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2290.635211] Call Trace: [ 2290.637824] dump_stack+0x172/0x1f0 [ 2290.641469] should_fail.cold+0xa/0x1b [ 2290.645363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2290.650470] ? lock_downgrade+0x880/0x880 [ 2290.654650] __should_failslab+0x121/0x190 [ 2290.658883] should_failslab+0x9/0x14 [ 2290.662683] kmem_cache_alloc_node+0x26c/0x710 21:52:18 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x240, &(0x7f0000000280), 0x1000000000000246, &(0x7f00000002c0)=""/18, 0xfffffe42}, 0x10000) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x6aaf5e50b06f19b7, 0x0, &(0x7f0000000000)) gettid() ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x2403, 0xffffffffffffffff) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) [ 2290.667282] __alloc_skb+0xd5/0x5f0 [ 2290.670928] ? skb_scrub_packet+0x490/0x490 [ 2290.675255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.680812] ? netlink_autobind.isra.0+0x228/0x310 [ 2290.681805] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2290.685835] netlink_sendmsg+0x97b/0xd70 [ 2290.685859] ? netlink_unicast+0x720/0x720 [ 2290.685878] ? selinux_socket_sendmsg+0x36/0x40 [ 2290.685896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.712794] ? security_socket_sendmsg+0x8d/0xc0 [ 2290.717548] ? netlink_unicast+0x720/0x720 [ 2290.721791] sock_sendmsg+0xd7/0x130 [ 2290.725506] ___sys_sendmsg+0x803/0x920 [ 2290.729479] ? copy_msghdr_from_user+0x430/0x430 [ 2290.734239] ? lock_downgrade+0x880/0x880 [ 2290.738403] ? kasan_check_read+0x11/0x20 [ 2290.742555] ? __fget+0x367/0x540 [ 2290.746012] ? iterate_fd+0x360/0x360 [ 2290.749820] ? __fget_light+0x1a9/0x230 [ 2290.753796] ? __fdget+0x1b/0x20 [ 2290.757179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2290.762739] __sys_sendmsg+0x105/0x1d0 21:52:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x5000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2290.766659] ? __ia32_sys_shutdown+0x80/0x80 [ 2290.771088] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2290.775846] ? do_syscall_64+0x26/0x620 [ 2290.779827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2290.785183] ? do_syscall_64+0x26/0x620 [ 2290.789156] __x64_sys_sendmsg+0x78/0xb0 [ 2290.793234] do_syscall_64+0xfd/0x620 [ 2290.797047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2290.802238] RIP: 0033:0x45a219 [ 2290.805431] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2290.824334] RSP: 002b:00007fd1c93c5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2290.832044] RAX: ffffffffffffffda RBX: 00007fd1c93c5c90 RCX: 000000000045a219 [ 2290.839307] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2290.846574] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2290.853841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1c93c66d4 [ 2290.861111] R13: 00000000004c875f R14: 00000000004ded58 R15: 0000000000000005 [ 2290.927724] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xa}], 0x3, 0x0) 21:52:18 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tkill(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r4 = getgid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={r3, 0x0, r4}, 0xc) syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x5}, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @remote, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "488800", 0x0, 0x0, 0x0, @empty, @local}}}}}}}, 0x0) 21:52:18 executing program 5 (fault-call:2 fault-nth:1): r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:18 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x6000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2291.269702] FAULT_INJECTION: forcing a failure. [ 2291.269702] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.300198] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2291.324058] CPU: 0 PID: 10546 Comm: syz-executor.5 Not tainted 4.19.82 #0 [ 2291.331015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2291.340364] Call Trace: [ 2291.342965] dump_stack+0x172/0x1f0 [ 2291.346609] should_fail.cold+0xa/0x1b [ 2291.350516] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2291.355623] ? lock_downgrade+0x880/0x880 [ 2291.359780] __should_failslab+0x121/0x190 [ 2291.364014] should_failslab+0x9/0x14 [ 2291.367817] kmem_cache_alloc_node_trace+0x274/0x720 [ 2291.372922] ? __alloc_skb+0xd5/0x5f0 [ 2291.376734] __kmalloc_node_track_caller+0x3d/0x80 [ 2291.381671] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2291.386342] __alloc_skb+0x10b/0x5f0 [ 2291.390061] ? skb_scrub_packet+0x490/0x490 [ 2291.394396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2291.399941] ? netlink_autobind.isra.0+0x228/0x310 [ 2291.404884] netlink_sendmsg+0x97b/0xd70 [ 2291.408975] ? netlink_unicast+0x720/0x720 [ 2291.413218] ? selinux_socket_sendmsg+0x36/0x40 [ 2291.417886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2291.423428] ? security_socket_sendmsg+0x8d/0xc0 [ 2291.428189] ? netlink_unicast+0x720/0x720 [ 2291.432430] sock_sendmsg+0xd7/0x130 [ 2291.436143] ___sys_sendmsg+0x803/0x920 [ 2291.440138] ? copy_msghdr_from_user+0x430/0x430 [ 2291.444903] ? lock_downgrade+0x880/0x880 [ 2291.449061] ? kasan_check_read+0x11/0x20 [ 2291.453220] ? __fget+0x367/0x540 [ 2291.456681] ? iterate_fd+0x360/0x360 [ 2291.460488] ? __fget_light+0x1a9/0x230 [ 2291.464473] ? __fdget+0x1b/0x20 [ 2291.467843] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2291.473388] __sys_sendmsg+0x105/0x1d0 [ 2291.477279] ? __ia32_sys_shutdown+0x80/0x80 [ 2291.481702] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2291.486460] ? do_syscall_64+0x26/0x620 [ 2291.490443] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2291.495809] ? do_syscall_64+0x26/0x620 [ 2291.499798] __x64_sys_sendmsg+0x78/0xb0 [ 2291.503874] do_syscall_64+0xfd/0x620 [ 2291.507688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2291.512876] RIP: 0033:0x45a219 [ 2291.516080] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2291.534978] RSP: 002b:00007fd1c93c5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2291.542689] RAX: ffffffffffffffda RBX: 00007fd1c93c5c90 RCX: 000000000045a219 [ 2291.549966] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2291.557231] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2291.564510] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1c93c66d4 [ 2291.571778] R13: 00000000004c875f R14: 00000000004ded58 R15: 0000000000000005 21:52:19 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x26000000) 21:52:19 executing program 5 (fault-call:2 fault-nth:2): r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:19 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tkill(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)=0x0) r4 = getgid() setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={r3, 0x0, r4}, 0xc) syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x5800f000}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x5}, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @remote, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "488800", 0x0, 0x0, 0x0, @empty, @local}}}}}}}, 0x0) 21:52:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xa}], 0x3, 0x0) 21:52:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xa}], 0x3, 0x0) [ 2292.031787] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:19 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x10000, 0x0) r3 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="4a75f7112ecd02003e17f358efe254593565010002bfca62f452ac1ba97ca1fbe16b72e600", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000380)={r5, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x6, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000340)={r5, @in={{0x2, 0x4e22, @loopback}}, 0x513, 0x3}, &(0x7f0000000400)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB="4bb3a90d47d856397a"], &(0x7f0000000480)=0xd) close(r1) socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r10, 0x84, 0x70, &(0x7f0000000380)={r12, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x7f, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000600)={0x4, 0x8401, 0x5, 0x6, r12}, &(0x7f0000000640)=0x10) r13 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x46e81, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$sndseq(r13, &(0x7f0000000280)=[{0x2, 0x1, 0x3d, 0x96, @tick=0x21, {0x81, 0x1}, {0x4}, @raw32={[0x8, 0x80000001, 0x6]}}, {0xa6, 0x1f, 0x9, 0x5, @time={r14, r15+30000000}, {0x20, 0x2}, {0x8, 0x7}, @connect={{0x9, 0x7}, {0x8, 0x3}}}], 0x60) r16 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="2400622c08142300002c0009a600000000000000000000ebc7de9ff75e5a9939320000", @ANYRES32=r8], 0x2}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) r17 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r18 = dup(r17) write$FUSE_OPEN(r18, &(0x7f0000000700)={0x20}, 0x20) sendto$ax25(r18, &(0x7f0000000500)="d6e8c6b51be68fbf52f8cecba134c50216fc9d7943ce4dd80e6e82b56ad7652f66c477634aeb1dafb388273725b567fdc1f0874cb317c5750adbe15ee521fc114a7b7abb37f67186c53ea26f82c079d68c72e8b40430e6c27b5cdef4176bedc1bc769ab5cecd93e2d693f7831a907ad61347893443794d3e6d648d3c", 0x7c, 0x40086, &(0x7f0000000580)={{0x3, @bcast, 0x5}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default]}, 0x48) [ 2292.203038] net_ratelimit: 26 callbacks suppressed [ 2292.203045] protocol 88fb is buggy, dev hsr_slave_0 [ 2292.213183] protocol 88fb is buggy, dev hsr_slave_1 [ 2292.231274] selinux_nlmsg_perm: 22 callbacks suppressed [ 2292.231286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48847 sclass=netlink_route_socket pig=10714 comm=syz-executor.0 [ 2292.281939] FAULT_INJECTION: forcing a failure. [ 2292.281939] name failslab, interval 1, probability 0, space 0, times 0 [ 2292.299266] CPU: 0 PID: 10747 Comm: syz-executor.5 Not tainted 4.19.82 #0 [ 2292.306200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2292.315566] Call Trace: [ 2292.318163] dump_stack+0x172/0x1f0 [ 2292.321816] should_fail.cold+0xa/0x1b [ 2292.325710] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2292.330819] ? netlink_deliver_tap+0x146/0xc20 [ 2292.335402] __should_failslab+0x121/0x190 [ 2292.339633] should_failslab+0x9/0x14 [ 2292.343436] kmem_cache_alloc+0x47/0x700 [ 2292.347495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.353028] ? check_preemption_disabled+0x48/0x290 [ 2292.358039] ? lock_acquire+0x16f/0x3f0 [ 2292.362016] skb_clone+0x156/0x3e0 [ 2292.365572] netlink_deliver_tap+0x97b/0xc20 [ 2292.369995] netlink_unicast+0x5a8/0x720 [ 2292.374054] ? netlink_attachskb+0x770/0x770 [ 2292.378473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.384013] netlink_sendmsg+0x8ae/0xd70 [ 2292.388107] ? netlink_unicast+0x720/0x720 [ 2292.392347] ? selinux_socket_sendmsg+0x36/0x40 [ 2292.397016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.402581] ? security_socket_sendmsg+0x8d/0xc0 [ 2292.407345] ? netlink_unicast+0x720/0x720 [ 2292.411591] sock_sendmsg+0xd7/0x130 [ 2292.415310] ___sys_sendmsg+0x803/0x920 [ 2292.419286] ? copy_msghdr_from_user+0x430/0x430 [ 2292.424046] ? lock_downgrade+0x880/0x880 [ 2292.428196] ? kasan_check_read+0x11/0x20 [ 2292.432345] ? __fget+0x367/0x540 [ 2292.435810] ? iterate_fd+0x360/0x360 [ 2292.439616] ? __fget_light+0x1a9/0x230 [ 2292.443594] ? __fdget+0x1b/0x20 [ 2292.446960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2292.452495] __sys_sendmsg+0x105/0x1d0 [ 2292.456379] ? __ia32_sys_shutdown+0x80/0x80 [ 2292.460789] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2292.465652] ? do_syscall_64+0x26/0x620 [ 2292.469618] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.474991] ? do_syscall_64+0x26/0x620 [ 2292.478966] __x64_sys_sendmsg+0x78/0xb0 [ 2292.483027] do_syscall_64+0xfd/0x620 [ 2292.486833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.492013] RIP: 0033:0x45a219 [ 2292.495195] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2292.514087] RSP: 002b:00007fd1c93c5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2292.521817] RAX: ffffffffffffffda RBX: 00007fd1c93c5c90 RCX: 000000000045a219 [ 2292.529090] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2292.536355] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2292.543637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1c93c66d4 [ 2292.550906] R13: 00000000004c875f R14: 00000000004ded58 R15: 0000000000000005 [ 2292.588632] protocol 88fb is buggy, dev hsr_slave_0 [ 2292.593735] protocol 88fb is buggy, dev hsr_slave_1 [ 2292.598846] protocol 88fb is buggy, dev hsr_slave_0 [ 2292.603943] protocol 88fb is buggy, dev hsr_slave_1 21:52:20 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x28000000) [ 2292.667374] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10714 comm=syz-executor.0 [ 2292.681033] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10714 comm=syz-executor.0 [ 2292.694413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10714 comm=syz-executor.0 [ 2292.703403] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2292.706854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10714 comm=syz-executor.0 21:52:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xa}], 0x3, 0x0) 21:52:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xa000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2292.830408] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10714 comm=syz-executor.0 [ 2292.896370] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10714 comm=syz-executor.0 [ 2292.966705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10714 comm=syz-executor.0 [ 2293.003975] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2293.028732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10714 comm=syz-executor.0 21:52:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 2293.092314] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10714 comm=syz-executor.0 [ 2293.186656] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xe000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:20 executing program 0: r0 = epoll_create(0x1ff) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x10400) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000140)=@ccm_128={{0x304}, "9d746707b080e525", "c0a73dc7a90586ed229d444ac278d1cf", "96edccfc", "6d15d869b6108578"}, 0x28) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f0000000080)={0x5, {{0xa, 0x4e23, 0x80000001, @loopback, 0x7}}}, 0x88) dup2(r0, r1) [ 2293.323045] protocol 88fb is buggy, dev hsr_slave_0 [ 2293.328219] protocol 88fb is buggy, dev hsr_slave_1 [ 2293.333333] protocol 88fb is buggy, dev hsr_slave_0 [ 2293.338386] protocol 88fb is buggy, dev hsr_slave_1 21:52:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 2293.470786] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2293.561959] input: syz1 as /devices/virtual/input/input9 21:52:21 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x29000000) [ 2293.641600] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2293.741538] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 21:52:21 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000002a0005c5ffffff080d0000000200001f01000000190103c9130001000180000050000000586700a28663b3", 0x2f}], 0x1}, 0x0) r1 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="014765ab7df185000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e20, 0x6, @mcast1, 0x2000000}}, [0xfffffffffffffffb, 0x4, 0x7f, 0x2, 0x800, 0xc9df, 0x200, 0x81, 0x0, 0x0, 0xf29, 0x5, 0x7, 0x3187, 0x7ff]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x1, 0x1000, 0x75b, 0x1, 0x8}, &(0x7f0000000000)=0x98) [ 2294.157925] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x3, 0x0) 21:52:21 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x14000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:21 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000040)={0x2, 0x7fff}) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000002c0)="ad56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg$sock(r2, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)="526b60ef8c0fbf8238f26ecdafbf97e69541b19392b3252280155728", 0x2000091c}], 0x1}}], 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) [ 2294.389621] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 2294.410224] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2294.470830] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2294.486034] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x3, 0x0) 21:52:22 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x2a000000) 21:52:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:22 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x20000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2294.772066] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 2294.871333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2294.892198] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x3, 0x0) [ 2294.957119] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:22 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x3f000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2295.094283] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0}], 0x3, 0x0) [ 2295.198065] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='sched\x00') mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x1010002, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@msize={'msize'}}, {@uname={'uname', 0x3d, '^-nodevself*'}}, {@version_9p2000='version=9p2000'}, {@fscache='fscache'}, {@mmap='mmap'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f00000000c0)={0x1000000}) [ 2295.411814] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 2295.480339] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:22 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x48000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:23 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x2c000000) 21:52:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0}], 0x3, 0x0) 21:52:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000200000002000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0x3, 0x4) [ 2295.680424] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x4c000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2295.916784] EXT4-fs (loop0): Can't read superblock on 2nd try [ 2295.933015] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 2295.965998] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:23 executing program 0: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x9, 0x5, 0x7e, 0x1f, 0x0, 0x6, 0x4c00, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x10b, 0xfff}, 0x20000, 0x8, 0x6, 0x8, 0x8, 0x7fffffff, 0x3}, r0, 0xa, r2, 0x2) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xf) process_vm_writev(r0, &(0x7f0000000000), 0x1, &(0x7f0000001680)=[{&(0x7f0000000040)=""/59}, {&(0x7f0000000100)=""/157}, {&(0x7f0000000080)=""/41}, {&(0x7f00000001c0)=""/148}, {&(0x7f0000000280)=""/200}, {&(0x7f0000000380)=""/56}, {&(0x7f00000004c0)=""/4096}, {&(0x7f00000014c0)=""/194}, {&(0x7f00000015c0)=""/177}], 0x1, 0x0) 21:52:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{0x0}], 0x3, 0x0) [ 2296.063408] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2296.139238] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2296.253201] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x60000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2296.383041] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0x3, 0x0) [ 2296.518982] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2296.591612] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:24 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x2d000000) 21:52:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080), 0x4) bind$alg(r2, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x83) r3 = accept4(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xfffffffffffffc01) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') sendfile(r3, r4, 0x0, 0x1000007ffff000) 21:52:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x68000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0x3, 0x0) 21:52:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffda9, 0x0, 0x0, 0xfffffffffffffed4) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000080)={{{@in=@local, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000000)=0xe8) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2296.913097] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2296.951108] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)}], 0x3, 0x0) 21:52:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x6c000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2297.183475] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40", 0x5}], 0x3, 0x0) 21:52:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x74000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2297.526103] net_ratelimit: 24 callbacks suppressed [ 2297.526109] protocol 88fb is buggy, dev hsr_slave_0 [ 2297.531172] protocol 88fb is buggy, dev hsr_slave_1 [ 2297.541253] protocol 88fb is buggy, dev hsr_slave_0 [ 2297.546339] protocol 88fb is buggy, dev hsr_slave_1 21:52:25 executing program 0: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x1d, 0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000240)) sendto$inet6(r2, 0x0, 0xfff3, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0xa) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendto$unix(r6, &(0x7f0000000140), 0x35000, 0x0, 0x0, 0x429) recvfrom(r6, &(0x7f0000005280)=""/4101, 0x1005, 0x0, 0x0, 0x1f4) r7 = socket$alg(0x26, 0x5, 0x0) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$unix(r8, &(0x7f0000000140), 0x35000, 0x0, 0x0, 0x429) recvfrom(r8, &(0x7f0000005280)=""/4101, 0x1005, 0x0, 0x0, 0x1f4) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x6}, 0x8) [ 2297.582907] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2297.600368] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:25 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x2e000000) 21:52:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2297.803032] protocol 88fb is buggy, dev hsr_slave_0 [ 2297.808307] protocol 88fb is buggy, dev hsr_slave_1 [ 2297.813423] protocol 88fb is buggy, dev hsr_slave_0 [ 2297.818477] protocol 88fb is buggy, dev hsr_slave_1 21:52:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40", 0x5}], 0x3, 0x0) 21:52:25 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7a000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2298.003025] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40", 0x5}], 0x3, 0x0) [ 2298.354051] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 2298.451540] protocol 88fb is buggy, dev hsr_slave_0 [ 2298.456666] protocol 88fb is buggy, dev hsr_slave_1 21:52:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb", 0x8}], 0x3, 0x0) 21:52:26 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x30000000) 21:52:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7fffeec4}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2298.847067] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2298.871188] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7fffeed8}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb", 0x8}], 0x3, 0x0) [ 2299.209456] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2299.300997] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:28 executing program 0: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x1d, 0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000240)) sendto$inet6(r2, 0x0, 0xfff3, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0xa) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendto$unix(r6, &(0x7f0000000140), 0x35000, 0x0, 0x0, 0x429) recvfrom(r6, &(0x7f0000005280)=""/4101, 0x1005, 0x0, 0x0, 0x1f4) r7 = socket$alg(0x26, 0x5, 0x0) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$unix(r8, &(0x7f0000000140), 0x35000, 0x0, 0x0, 0x429) recvfrom(r8, &(0x7f0000005280)=""/4101, 0x1005, 0x0, 0x0, 0x1f4) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x6}, 0x8) 21:52:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb", 0x8}], 0x3, 0x0) 21:52:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xb, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x9effffff}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:28 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x31000000) 21:52:28 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$vbi(0x0, 0x2, 0x2) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000280)={0xfffb, 0x2, 0x3f, 0x4}, 0xffffff26) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000340)={0x0, 0x7, 0xfffffffffffff322, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x1a1, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000240)={0x5, 0x10, 0xfa00, {&(0x7f0000000740), r2}}, 0x18) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000000380)=@tipc=@name, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000400)=""/146, 0x92}, {&(0x7f00000004c0)=""/115, 0x73}], 0x2, &(0x7f0000000540)=""/201, 0xc9}, 0x80}], 0x1, 0x10000, &(0x7f0000000640)) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) r5 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r6 = dup(r5) write$FUSE_OPEN(r6, &(0x7f0000000700)={0xe, 0x0, 0x0, {0x0, 0x8}}, 0xffffffffffffff96) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f0000000980)={0x0, 0x140000, r1}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, r7}) r9 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r10 = dup(r9) write$FUSE_OPEN(r10, &(0x7f0000000700)={0x20}, 0x20) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r10, 0xc0184900, &(0x7f0000000300)={0x4, 0x29, 0x1, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r11, 0x1, r12, &(0x7f0000000680)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000080)={r8, 0x40000, r10}) syz_open_dev$sndpcmp(0x0, 0xfffffffffffffffe, 0x0) perf_event_open(&(0x7f00000009c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000a40), 0xa}}, 0x0, 0x8, r10, 0x0) r13 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r13, &(0x7f0000000140)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendmmsg(r13, &(0x7f00000092c0), 0x400000000000064, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000001540)) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) r14 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r15 = dup(r14) write$FUSE_OPEN(r15, &(0x7f0000000700)={0x20}, 0x20) r16 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r17 = dup(r16) write$FUSE_OPEN(r17, &(0x7f0000000a80)={0x20, 0xf461d4caa2696470}, 0x20) r18 = accept$inet6(r17, 0x0, &(0x7f00000006c0)) epoll_ctl$EPOLL_CTL_ADD(r15, 0x1, r18, &(0x7f0000000940)={0x1}) [ 2300.808572] validate_nla: 10 callbacks suppressed [ 2300.808581] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2300.821195] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 2300.858675] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2300.872902] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40", 0x9}], 0x3, 0x0) 21:52:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xc4eeff7f}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2301.151872] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:28 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000180)=0x10) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r4) dup(r3) r5 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x6, 0x200000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r5, 0x80045530, &(0x7f0000000100)=""/33) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000000)={{0x0, 0x0, @reserved="f76f3c3a1b6b2c48b1d2a83d3c2504e9476acb84f7f3db42573661011a0bfd58"}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000080)=@nat={'%at\x00', 0x19, 0x1, 0x1a8, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000620], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"/424]}, 0x220) 21:52:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40", 0x9}], 0x3, 0x0) [ 2301.472302] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40", 0x9}], 0x3, 0x0) [ 2301.731199] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 2301.889718] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2301.976970] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2302.603034] net_ratelimit: 26 callbacks suppressed [ 2302.603041] protocol 88fb is buggy, dev hsr_slave_0 [ 2302.613092] protocol 88fb is buggy, dev hsr_slave_1 [ 2302.923081] protocol 88fb is buggy, dev hsr_slave_0 [ 2302.928201] protocol 88fb is buggy, dev hsr_slave_1 [ 2303.013073] protocol 88fb is buggy, dev hsr_slave_0 [ 2303.018185] protocol 88fb is buggy, dev hsr_slave_1 [ 2303.723175] protocol 88fb is buggy, dev hsr_slave_0 [ 2303.728294] protocol 88fb is buggy, dev hsr_slave_1 [ 2303.733403] protocol 88fb is buggy, dev hsr_slave_0 [ 2303.738474] protocol 88fb is buggy, dev hsr_slave_1 21:52:31 executing program 0: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x1d, 0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000240)) sendto$inet6(r2, 0x0, 0xfff3, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0xa) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendto$unix(r6, &(0x7f0000000140), 0x35000, 0x0, 0x0, 0x429) recvfrom(r6, &(0x7f0000005280)=""/4101, 0x1005, 0x0, 0x0, 0x1f4) r7 = socket$alg(0x26, 0x5, 0x0) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$unix(r8, &(0x7f0000000140), 0x35000, 0x0, 0x0, 0x429) recvfrom(r8, &(0x7f0000005280)=""/4101, 0x1005, 0x0, 0x0, 0x1f4) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x6}, 0x8) 21:52:31 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x32000000) 21:52:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xa}], 0x0, 0x0) 21:52:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xd8eeff7f}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:31 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46802) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r5, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./bus\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000040000,user_id=\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0, @ANYBLOB=',aow_other\x00\x00,default_permissions,blksize=0x0000000000000000,default_permissions,allow_other,allow_other,blksize=0x0000000000000800,default_permissions,max_read=0x0000000000000001,blksize=0x00000']) read$FUSE(r6, &(0x7f0000000540), 0x1000) write$FUSE_INTERRUPT(r6, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) read$FUSE(r6, &(0x7f0000003000), 0x1150) writev(r6, &(0x7f0000000740)=[{&(0x7f0000000580)="8bb65daad9c75845f4163fb3535b17e3f94770d7f1d559d09fccb7dfc184d20e936dd7cbf0eb7b95141247c1b7e59fecad14ed3f1cd5318f91aaef7b38fdccf3f9216bda9c8b74169d355cf8dc88835d1cf241276ac599f58388e9bfdfdc1bb6bfdfa6aba1b4b793b23dd22cb0b3305aa6b32c163fb839312e318aad22afe289cf9ee92cd92f929da53bafe0a770d54300a29f84aebe31f27d941fafb6afbc1f6a8f5be0b2eeaabd756949446dfcd77189b2", 0xb2}, {&(0x7f0000000440)="8022d7a7f3b771857ba5f515ab580ca539f776c7cb5e3c395151967dfdb2fa39386b7cb4a0f3f8ca695073f536e9e115a92d7b098bbf2923e6648c176a35f2f0494518", 0x43}, {&(0x7f0000000500)="a26eef7907c98bceda6d428a23c1acac2c20b79c94c3cc00f93aef2718efd6fe2cf124260ffde9124dc585349eaf88c81bdf889d69bc1cd8f8", 0x39}, {&(0x7f0000000640)="46ca99d43ab03da55d1ffc0c717f7bacc8565b3b53d4dd34de50e24077a1ea45af3b0a13c2c13d2177bef6bec525344f56791a71916906587618f2fd0d132cb44dd731353cf0dfd3a0228ab778f02b6a3b500d145d7885e2d74a77", 0x5b}], 0x4) mount(&(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='./file1/../file0\x00', &(0x7f00000002c0)='reiserfs\x00', 0x20000, &(0x7f0000000300)='io.stat\x00') ftruncate(r2, 0x48280) r7 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000004c0)='./file0\x00') rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r4, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) syz_open_procfs(0x0, 0x0) 21:52:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xe, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2303.922129] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2303.945375] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) [ 2303.949807] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2303.988447] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xa}], 0x0, 0x0) 21:52:31 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf0ffffff}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:31 executing program 0: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x1d, 0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = syz_open_procfs(0x0, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000240)) sendto$inet6(r2, 0x0, 0xfff3, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0xa) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendto$unix(r6, &(0x7f0000000140), 0x35000, 0x0, 0x0, 0x429) recvfrom(r6, &(0x7f0000005280)=""/4101, 0x1005, 0x0, 0x0, 0x1f4) r7 = socket$alg(0x26, 0x5, 0x0) r8 = accept4(r7, 0x0, 0x0, 0x0) sendto$unix(r8, &(0x7f0000000140), 0x35000, 0x0, 0x0, 0x429) recvfrom(r8, &(0x7f0000005280)=""/4101, 0x1005, 0x0, 0x0, 0x1f4) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x6}, 0x8) [ 2304.229702] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:31 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000200)={@broadcast, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "88dc3a", 0x10, 0x0, 0x0, @dev, @mcast2, {[], @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "96e266", 0x0, "3db41b"}}}}}}}, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) getpeername$llc(r1, &(0x7f0000000000), &(0x7f0000000040)=0x10) [ 2304.359520] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xa}], 0x0, 0x0) [ 2304.497960] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2304.532421] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf97b0000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2304.637071] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:32 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x34000000) 21:52:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x12, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x10}, @exit], {0x95, 0x74}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x32) setpriority(0x0, 0x0, 0x6) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) write$cgroup_pid(r2, &(0x7f00000000c0)=r3, 0x12) r4 = dup(r0) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r4, 0x800455d1, &(0x7f0000000040)) 21:52:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount(&(0x7f0000000180)=@loop={'/dev/loop', 0x0}, &(0x7f00000001c0)='./file0/file1\x00', 0x0, 0x4241000, 0x0) read$FUSE(r0, &(0x7f0000000540), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) read$FUSE(r0, &(0x7f0000003000), 0x1150) write$FUSE_ENTRY(r0, &(0x7f0000000240)={0x90, 0x0, 0x2, {0x400000000001, 0x0, 0x1f, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4}}}, 0x90) [ 2304.976850] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:32 executing program 1 (fault-call:6 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x40000000000001, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x88, 0x64, 0x0, &(0x7f0000000080)) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f00000000c0)="5f421f6092d97636df8307048ded454e49223b2f9b608d8e0aa38e9271e0119c0dcd55d93b704ed451a6b6a02be5a47dd6e4674c9c7fd9abbcd41bb3bf4c3fb8906de1badd4d3c945836d22c4a901c7f061c3abc2d72379cb3273f5321e321a5326a5bee069362ec45bb26e091d83afa0b862042cc1a56266ccb99e2acb3bd711be3d3df782dc5d9fc5ed51d675d0f26e596669bbd5a04958be7", 0x9a) [ 2305.130088] FAULT_INJECTION: forcing a failure. [ 2305.130088] name failslab, interval 1, probability 0, space 0, times 0 21:52:32 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xfffff000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2305.188879] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 2305.216758] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2305.278233] CPU: 0 PID: 14035 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2305.285304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2305.294654] Call Trace: [ 2305.297247] dump_stack+0x172/0x1f0 [ 2305.300884] should_fail.cold+0xa/0x1b [ 2305.304784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2305.309889] ? lock_downgrade+0x880/0x880 [ 2305.314040] __should_failslab+0x121/0x190 [ 2305.318279] should_failslab+0x9/0x14 [ 2305.322081] __kmalloc+0x2e2/0x750 [ 2305.322100] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2305.331233] ? fput+0x128/0x1a0 [ 2305.331247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2305.331264] ? strnlen_user+0x15f/0x1e0 [ 2305.344012] ? __x64_sys_memfd_create+0x13c/0x470 [ 2305.348856] __x64_sys_memfd_create+0x13c/0x470 [ 2305.353530] ? memfd_fcntl+0x1750/0x1750 [ 2305.357581] ? do_syscall_64+0x26/0x620 [ 2305.357599] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2305.366133] ? trace_hardirqs_on+0x67/0x220 [ 2305.370458] do_syscall_64+0xfd/0x620 [ 2305.370477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.370491] RIP: 0033:0x45a219 [ 2305.379441] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2305.379466] RSP: 002b:00007f8eb9ea8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 21:52:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000029000100000001000000000003"], 0x1}}, 0x0) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r5 = dup(r4) write$FUSE_OPEN(r5, &(0x7f0000000700)={0x20}, 0x20) ioctl$KDGKBENT(r5, 0x4b46, &(0x7f0000000000)={0x1f, 0xc0, 0x40}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfece) splice(r1, 0x0, r3, 0x0, 0x200000011002, 0x0) 21:52:32 executing program 0: socket$alg(0x26, 0x5, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x400, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000100)={0x6, 0x3, 0x12c, 0x7f}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0xfffffffffffffe3e, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x24ba9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioprio_set$pid(0x2, 0x0, 0x7e39) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1c000, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f00000005c0)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = geteuid() r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r11) stat(&(0x7f0000000600)='./file1\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) r15 = socket$inet6(0xa, 0x100000003, 0x3a) r16 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r18 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r18, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r18, 0x0, 0x30, &(0x7f0000001980)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) setsockopt$inet_group_source_req(r18, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r19 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r19, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r19, 0x0, 0x30, &(0x7f0000001980)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) setsockopt$inet_group_source_req(r19, 0x0, 0x2c, &(0x7f0000000080)={0x10001, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @loopback}}}, 0x108) r20 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r20, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r20, 0x0, 0x30, &(0x7f0000001980)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"/130], 0x90) setsockopt$inet_group_source_req(r20, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r21 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r24 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r24, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_group_source_req(r24, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r25 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r25, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r25, 0x0, 0x30, &(0x7f0000001980)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001800000000"], 0x90) setsockopt$inet_group_source_req(r25, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r26 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r26, 0x0, 0x30, &(0x7f0000001980)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/144], 0x90) setsockopt$inet_group_source_req(r26, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r27 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r27, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r27, 0x0, 0x30, &(0x7f0000001980)=ANY=[], 0x0) setsockopt$inet_group_source_req(r27, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r28 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x3, 0x20000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) r30 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r31, 0x0) getresgid(&(0x7f0000000580)=0x0, 0x0, &(0x7f0000000600)) r33 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000640)='/dev/video37\x00', 0x2, 0x0) r34 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r35, 0x0) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r37 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r37, 0x0, 0x0, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r37, 0x0, 0x30, &(0x7f0000001980)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) r38 = getpid() sched_setscheduler(r38, 0x5, &(0x7f0000000380)) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r40 = getegid() setresgid(0x0, r40, 0x0) fchown(0xffffffffffffffff, r39, r40) r41 = getpid() sched_setscheduler(r41, 0x5, &(0x7f0000000380)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001000)=0xfffffef3) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r44 = getegid() setresgid(0x0, r44, 0x0) fchown(0xffffffffffffffff, r43, r44) r45 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002d00)={&(0x7f0000002c40)='])+\xe4\x00\x19I0z\xf9\xdc~\xb0\xba\r\x9f\xf1q\xe5\x19\xa3\xf4R\xf6yae+\xa1\xbc\x1dqP\xcd|\xbf(\xe0L\x87\xbf\xc26\xaa\xf2Hb\xa7\xae\xd7\xb9\xfb\xf1+\xea\xd6\xfa\xf9\xc4}\xb6\x14{\x91\x86B\xbc\x91\x9d:\xedx\x1fIK B\xd8@\xe7\xa9\xc8\xdd)\x91.\x83\xbfo\xa0\a\xb5&\xfd\xb5W\x8f\xfeN\xeaH\xf8\xc3%<\x7f\xdc\xa9\xa6Uua\xaf\xc6L\xbd\xbfz@z\x84`\x8e\xa4\x1b\x82\xb0\x99Oe\xde\v\xd3\xadg\x96\xf0g\v\x8f_\x94\xda\xbd\xf9\x80\xb4\xd0C\xdd<\x96\xea\x98\x7f\xb3'}, 0x10) sendmmsg$unix(r17, &(0x7f0000000e80)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="fa9447514a0b48331e20b9ba6828aedd71762333360506362cc11ab7fdc8bd6a90d837ed53427023bfcb9c769712cec51269821008dc2f5b36ea6ea4852918e01f6d0487b3024f57e4f1c1a92ad451389a50abc397adff5fcdebc24310b5daca12666eebe2a77e41f1f3b5ed083399d516519d4efc902a7b1132ce1fdba99a2d78df1b00b123c89f41d11d98158f4aa70529a5ad3f7b704bdd44ce4e", 0x9c}, {&(0x7f00000001c0)="25fe777ccac8f16f94d57b81fce50216a47a399fb495eb64236697fa87db7d598e70d0fd1f533ad99862a4b56bca", 0x2e}], 0x2, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r18, r19, r20, r16]}}, @cred={{0x1c, 0x1, 0x2, {r21, r22, r23}}}, @rights={{0x24, 0x1, 0x1, [r16, r15, r45, r24, r25]}}, @rights={{0x1c, 0x1, 0x1, [r26, r27, r28]}}, @cred={{0x1c, 0x1, 0x2, {r29, r31, r32}}}, @rights={{0x14, 0x1, 0x1, [r33]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r35, r36}}}], 0xe0, 0x4000000}, {&(0x7f0000000880)=@abs={0x0, 0x0, 0x4e26}, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000900)="802c3640e40a7b9499ab0ce02b754ddaceb78ebc001528d0f4aba4ef1c7de3b42797d38d1c2f5caa507fa72805ca648918c92fecbad94d028b44c498c87ca4f25563034397635043f0e16e7b603190929be172343ee90db8cfe1bd986d5f0ba68f0d9b220a79cdcfa5f221c890c91c1747ad5ba1a468f3c7213272d4802c28181f8080a27f4b9e0fe9d7e1be4705576ac63ced2db392bb2d50871c59777d4ae0c32cf27c2b24c7cd336e87caef83af2c8458b73c9b116e4aefa8ebc0ebcd7b29d66769c7b311ae8afc105ffddcca0dc756563380f9ad8f09481b991ce29cc863b59e39ea45750682d3d8a49cda", 0xed}, {&(0x7f0000000a00)="80c83bbdc5894750629e0619818d9da86748870e3f2e00bd893ea6fd6fa5072476de03288fcda493dfd976deafd4958137e4a5b907739c2e9c432fb53c117de24fd6d7576bfa1a9547f60b9d55b8a90d29c716dd06cf3acb66d505468674448db8684acbbcc8d7f588f98976c9796c8b421979939d24fca76cdec2859947703185cc1240d75bda19fe8fbd8430da8bef96fe0a4bf8d539ec3d775c63f2712f53f73f4a87b1bdb2a5e40b8417ba9031bf3793d1d5146d088a0921b9044c58dd04b93841e014100bb8b942c6078bd44acf719a560ceb2b0d972c13bd9a9193223035df2e539dd6916a9c3a8c7631f9070c74dad0486199a1b6f5913c6922", 0xfd}, {&(0x7f0000000b00)="18d1badda865057bc0b8b08dc03176ce0e59ceed01a2c596204aa60edf662922bdc61648a9780b41bd7a741e4c1834c46db6d875c66e46de1c02c78ac58bd582f177fb04f00b4f099b8c812eabea", 0x4e}], 0x3, &(0x7f0000000d00)=[@rights={{0x1c, 0x1, 0x1, [r15, r37, r16]}}, @cred={{0x1c, 0x1, 0x2, {r38, 0x0, r40}}}, @cred={{0x1c, 0x1, 0x2, {r41, r42, r44}}}], 0x60, 0x20020041}, {&(0x7f0000000d80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000e40), 0x0, 0x0, 0x0, 0x4000010}], 0x3, 0x4000) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000006c0)={{}, {0x1, 0x1}, [{0x2, 0xb2873204540e1077, r2}, {0x2, 0x4}, {0x2, 0x7, r4}, {0x2, 0x4, r6}, {0x2, 0x1, r8}, {0x2, 0x1, r9}, {0x2, 0x5, r11}, {0x2, 0x4, r12}, {0x2, 0x2, r14}, {0x2, 0x2, 0xffffffffffffffff}], {}, [{0x8, 0x7, r40}], {0x10, 0x8}, {0x20, 0xbf869d4da56544fe}}, 0x7c, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000180)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) r47 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001500)='/selinux/checkreqprot\x00', 0x883, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x4, 0x0, 0x4, 0xf8, 0x0, 0x2, 0x40000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x8000, 0x1ff, 0x1952, 0x1d, 0x9, 0x5, 0x400}, r46, 0xf, r47, 0x8) r48 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r48, &(0x7f0000000080)={0xf}, 0x20000357) [ 2305.379478] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 000000000045a219 [ 2305.379491] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 2305.401551] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2305.401560] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eb9ea96d4 [ 2305.401568] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:33 executing program 1 (fault-call:6 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xffffff7f}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2305.691168] FAULT_INJECTION: forcing a failure. [ 2305.691168] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.736926] CPU: 1 PID: 14285 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2305.743879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2305.753228] Call Trace: [ 2305.755827] dump_stack+0x172/0x1f0 [ 2305.759469] should_fail.cold+0xa/0x1b [ 2305.763363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2305.768466] ? lock_downgrade+0x880/0x880 [ 2305.772624] __should_failslab+0x121/0x190 [ 2305.776876] should_failslab+0x9/0x14 [ 2305.780677] kmem_cache_alloc+0x2ae/0x700 [ 2305.784829] ? __alloc_fd+0x44d/0x560 [ 2305.788657] ? shmem_destroy_callback+0xc0/0xc0 [ 2305.793327] shmem_alloc_inode+0x1c/0x50 [ 2305.797384] alloc_inode+0x64/0x190 [ 2305.801019] new_inode_pseudo+0x19/0xf0 [ 2305.805002] new_inode+0x1f/0x40 [ 2305.808367] shmem_get_inode+0x84/0x780 [ 2305.812341] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2305.817183] shmem_file_setup+0x66/0x90 [ 2305.821162] __x64_sys_memfd_create+0x2a2/0x470 [ 2305.825830] ? memfd_fcntl+0x1750/0x1750 [ 2305.829887] ? do_syscall_64+0x26/0x620 [ 2305.833862] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2305.838444] ? trace_hardirqs_on+0x67/0x220 [ 2305.842790] do_syscall_64+0xfd/0x620 [ 2305.846599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.851785] RIP: 0033:0x45a219 [ 2305.854977] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2305.873873] RSP: 002b:00007f8eb9ea8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 21:52:33 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x3a000000) 21:52:33 executing program 0: socket$alg(0x26, 0x5, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x400, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000100)={0x6, 0x3, 0x12c, 0x7f}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0xfffffffffffffe3e, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x24ba9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioprio_set$pid(0x2, 0x0, 0x7e39) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1c000, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f00000005c0)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = geteuid() r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r11) stat(&(0x7f0000000600)='./file1\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r14) r15 = socket$inet6(0xa, 0x100000003, 0x3a) r16 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r17 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r18 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r18, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r18, 0x0, 0x30, &(0x7f0000001980)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) setsockopt$inet_group_source_req(r18, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r19 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r19, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r19, 0x0, 0x30, &(0x7f0000001980)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) setsockopt$inet_group_source_req(r19, 0x0, 0x2c, &(0x7f0000000080)={0x10001, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @loopback}}}, 0x108) r20 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r20, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r20, 0x0, 0x30, &(0x7f0000001980)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"/130], 0x90) setsockopt$inet_group_source_req(r20, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r21 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r24 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r24, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_group_source_req(r24, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r25 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r25, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r25, 0x0, 0x30, &(0x7f0000001980)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001800000000"], 0x90) setsockopt$inet_group_source_req(r25, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r26 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r26, 0x0, 0x30, &(0x7f0000001980)=ANY=[@ANYBLOB="010000000000000002000000e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/144], 0x90) setsockopt$inet_group_source_req(r26, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r27 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r27, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r27, 0x0, 0x30, &(0x7f0000001980)=ANY=[], 0x0) setsockopt$inet_group_source_req(r27, 0x0, 0x2c, &(0x7f0000000080)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) r28 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x3, 0x20000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) r30 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r31, 0x0) getresgid(&(0x7f0000000580)=0x0, 0x0, &(0x7f0000000600)) r33 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000640)='/dev/video37\x00', 0x2, 0x0) r34 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r35, 0x0) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r37 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r37, 0x0, 0x0, &(0x7f00000002c0)={@multicast2, @remote}, 0xc) setsockopt$inet_MCAST_MSFILTER(r37, 0x0, 0x30, &(0x7f0000001980)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) r38 = getpid() sched_setscheduler(r38, 0x5, &(0x7f0000000380)) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r40 = getegid() setresgid(0x0, r40, 0x0) fchown(0xffffffffffffffff, r39, r40) r41 = getpid() sched_setscheduler(r41, 0x5, &(0x7f0000000380)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001000)=0xfffffef3) stat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r44 = getegid() setresgid(0x0, r44, 0x0) fchown(0xffffffffffffffff, r43, r44) r45 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002d00)={&(0x7f0000002c40)='])+\xe4\x00\x19I0z\xf9\xdc~\xb0\xba\r\x9f\xf1q\xe5\x19\xa3\xf4R\xf6yae+\xa1\xbc\x1dqP\xcd|\xbf(\xe0L\x87\xbf\xc26\xaa\xf2Hb\xa7\xae\xd7\xb9\xfb\xf1+\xea\xd6\xfa\xf9\xc4}\xb6\x14{\x91\x86B\xbc\x91\x9d:\xedx\x1fIK B\xd8@\xe7\xa9\xc8\xdd)\x91.\x83\xbfo\xa0\a\xb5&\xfd\xb5W\x8f\xfeN\xeaH\xf8\xc3%<\x7f\xdc\xa9\xa6Uua\xaf\xc6L\xbd\xbfz@z\x84`\x8e\xa4\x1b\x82\xb0\x99Oe\xde\v\xd3\xadg\x96\xf0g\v\x8f_\x94\xda\xbd\xf9\x80\xb4\xd0C\xdd<\x96\xea\x98\x7f\xb3'}, 0x10) sendmmsg$unix(r17, &(0x7f0000000e80)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="fa9447514a0b48331e20b9ba6828aedd71762333360506362cc11ab7fdc8bd6a90d837ed53427023bfcb9c769712cec51269821008dc2f5b36ea6ea4852918e01f6d0487b3024f57e4f1c1a92ad451389a50abc397adff5fcdebc24310b5daca12666eebe2a77e41f1f3b5ed083399d516519d4efc902a7b1132ce1fdba99a2d78df1b00b123c89f41d11d98158f4aa70529a5ad3f7b704bdd44ce4e", 0x9c}, {&(0x7f00000001c0)="25fe777ccac8f16f94d57b81fce50216a47a399fb495eb64236697fa87db7d598e70d0fd1f533ad99862a4b56bca", 0x2e}], 0x2, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r18, r19, r20, r16]}}, @cred={{0x1c, 0x1, 0x2, {r21, r22, r23}}}, @rights={{0x24, 0x1, 0x1, [r16, r15, r45, r24, r25]}}, @rights={{0x1c, 0x1, 0x1, [r26, r27, r28]}}, @cred={{0x1c, 0x1, 0x2, {r29, r31, r32}}}, @rights={{0x14, 0x1, 0x1, [r33]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r35, r36}}}], 0xe0, 0x4000000}, {&(0x7f0000000880)=@abs={0x0, 0x0, 0x4e26}, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000900)="802c3640e40a7b9499ab0ce02b754ddaceb78ebc001528d0f4aba4ef1c7de3b42797d38d1c2f5caa507fa72805ca648918c92fecbad94d028b44c498c87ca4f25563034397635043f0e16e7b603190929be172343ee90db8cfe1bd986d5f0ba68f0d9b220a79cdcfa5f221c890c91c1747ad5ba1a468f3c7213272d4802c28181f8080a27f4b9e0fe9d7e1be4705576ac63ced2db392bb2d50871c59777d4ae0c32cf27c2b24c7cd336e87caef83af2c8458b73c9b116e4aefa8ebc0ebcd7b29d66769c7b311ae8afc105ffddcca0dc756563380f9ad8f09481b991ce29cc863b59e39ea45750682d3d8a49cda", 0xed}, {&(0x7f0000000a00)="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", 0xfd}, {&(0x7f0000000b00)="18d1badda865057bc0b8b08dc03176ce0e59ceed01a2c596204aa60edf662922bdc61648a9780b41bd7a741e4c1834c46db6d875c66e46de1c02c78ac58bd582f177fb04f00b4f099b8c812eabea", 0x4e}], 0x3, &(0x7f0000000d00)=[@rights={{0x1c, 0x1, 0x1, [r15, r37, r16]}}, @cred={{0x1c, 0x1, 0x2, {r38, 0x0, r40}}}, @cred={{0x1c, 0x1, 0x2, {r41, r42, r44}}}], 0x60, 0x20020041}, {&(0x7f0000000d80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000e40), 0x0, 0x0, 0x0, 0x4000010}], 0x3, 0x4000) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000006c0)={{}, {0x1, 0x1}, [{0x2, 0xb2873204540e1077, r2}, {0x2, 0x4}, {0x2, 0x7, r4}, {0x2, 0x4, r6}, {0x2, 0x1, r8}, {0x2, 0x1, r9}, {0x2, 0x5, r11}, {0x2, 0x4, r12}, {0x2, 0x2, r14}, {0x2, 0x2, 0xffffffffffffffff}], {}, [{0x8, 0x7, r40}], {0x10, 0x8}, {0x20, 0xbf869d4da56544fe}}, 0x7c, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') symlinkat(&(0x7f0000000180)='./file1\x00', r1, &(0x7f0000000040)='./file0\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) r47 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001500)='/selinux/checkreqprot\x00', 0x883, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x4, 0x0, 0x4, 0xf8, 0x0, 0x2, 0x40000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000380), 0x4}, 0x8000, 0x1ff, 0x1952, 0x1d, 0x9, 0x5, 0x400}, r46, 0xf, r47, 0x8) r48 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r48, &(0x7f0000000080)={0xf}, 0x20000357) 21:52:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x22, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2305.881585] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 000000000045a219 [ 2305.888857] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 2305.896121] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2305.903389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eb9ea96d4 [ 2305.910654] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xffffff9e}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2305.965621] validate_nla: 2 callbacks suppressed [ 2305.965629] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:33 executing program 3: ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={@null=' \x00', 0x0, 'team_slave_0\x00'}) mknod(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@sha1={0x1, "d94e6c732e504d95750b72c38de4c6dbd6fb307e"}, 0x15, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20, 0x0, 0x400000000, {0x0, 0x12}}, 0x20) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r5 = dup(r4) sendfile(r1, r4, &(0x7f0000000300)=0x3f, 0xfff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r8 = dup(r7) write$FUSE_OPEN(r8, &(0x7f0000000700)={0x20, 0xfffffffffffffff5, 0x0, {0x0, 0x4}}, 0xfffffffffffffea9) setsockopt$RXRPC_SECURITY_KEY(r8, 0x110, 0x1, &(0x7f0000000100)='/selinux/member\x00', 0x10) r9 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) open(&(0x7f0000001540)='./bus\x00', 0x200, 0x0) r10 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) read$rfkill(r5, &(0x7f0000000340), 0x8) r11 = dup(r10) write$FUSE_OPEN(r11, &(0x7f0000000700)={0x20}, 0x20) getsockopt$CAN_RAW_JOIN_FILTERS(r11, 0x65, 0x6, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 2306.127899] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:33 executing program 1 (fault-call:6 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2306.321544] FAULT_INJECTION: forcing a failure. [ 2306.321544] name failslab, interval 1, probability 0, space 0, times 0 [ 2306.335817] CPU: 0 PID: 14653 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2306.342753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2306.342761] Call Trace: [ 2306.354697] dump_stack+0x172/0x1f0 [ 2306.358336] should_fail.cold+0xa/0x1b [ 2306.362230] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2306.367336] ? percpu_ref_put_many+0x94/0x190 [ 2306.371836] __should_failslab+0x121/0x190 [ 2306.376073] should_failslab+0x9/0x14 [ 2306.379878] kmem_cache_alloc+0x2ae/0x700 [ 2306.384025] ? map_id_range_down+0x1ee/0x370 [ 2306.388454] ? __put_user_ns+0x70/0x70 [ 2306.388472] selinux_inode_alloc_security+0xb6/0x2a0 [ 2306.388486] security_inode_alloc+0x8a/0xd0 [ 2306.401765] inode_init_always+0x56e/0xb40 [ 2306.406002] alloc_inode+0x81/0x190 [ 2306.409634] new_inode_pseudo+0x19/0xf0 [ 2306.413609] new_inode+0x1f/0x40 [ 2306.416976] shmem_get_inode+0x84/0x780 21:52:33 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xfffffff0}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2306.420972] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2306.425819] shmem_file_setup+0x66/0x90 [ 2306.429799] __x64_sys_memfd_create+0x2a2/0x470 [ 2306.434473] ? memfd_fcntl+0x1750/0x1750 [ 2306.438537] ? do_syscall_64+0x26/0x620 [ 2306.442518] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2306.447107] ? trace_hardirqs_on+0x67/0x220 [ 2306.451433] do_syscall_64+0xfd/0x620 [ 2306.451541] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2306.455241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2306.455253] RIP: 0033:0x45a219 [ 2306.455266] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2306.455272] RSP: 002b:00007f8eb9ea8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 21:52:33 executing program 0: r0 = creat(0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_setup(0x0, 0x0) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000140)={r5, 0xffff}, 0x8) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, 0x0, 0x400, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f00000006c0)={0x0, 0xffff}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1000, 0x0, 0x4c8]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) io_setup(0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000380), r8, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x0, @remote}, r8}}, 0x30) 21:52:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x3c, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:33 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r0) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f0000000040)='\x00', 0x1) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f0000000000)) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) fdatasync(0xffffffffffffffff) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000340)=""/188) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="b0000000", @ANYRES16=0x0, @ANYBLOB="0004ff0f0000fbdbdf2506000000080006000700000034000200080006004000000008000800ffff00000800040004000000eeff03000700000008000d000000000008000e004e21000054000300080008001b00000008000800fe00000008000800ff000000140002007465616d5f73530d76655f300000000008000400000e000014000200626f6e6430400000000c0001000800010004000000"], 0xb0}, 0x1, 0x0, 0x0, 0x800}, 0x40) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000800)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f0000000440)={0x8000, "e2822c37e1c34b3b24ce1e1fdfd8ef74fc52f02408bbcdbe3ef278528a4f808d", 0x3, 0x2}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) io_setup(0x4, &(0x7f0000000500)) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r1, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac41f1de628e2a3166", 0xd1, 0x0, 0x0, 0x0) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r3) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000080)='./file0\x00', r4, r5) clone(0x20000, &(0x7f0000000740)="da8864d45368695c1f83dd40dc94f30aaddd33346c4bb00c8cd3a1e61cc3867f045ae5c9c1b70788ff882e06c8930926d5096246a0cdf4018e99fe6f6e39bb8a8e26fbc97bab98239f110162df84aadfcc2008a3e21e38b9a3c1957b80000abc2aca10bcb9025166abde82efc6350c0aba208fab0183439eb84e449eb1eac814b09485c5fcc6453ddf5e948424a2", &(0x7f00000004c0), &(0x7f00000005c0), &(0x7f0000000600)="f64881cb1c25e539a983591197a4a54fc83eba81d13b") read(r1, &(0x7f0000000ac0)=""/245, 0x100000394) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 2306.468930] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 000000000045a219 [ 2306.490978] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 2306.490985] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2306.490992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eb9ea96d4 [ 2306.490999] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:34 executing program 1 (fault-call:6 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2306.594072] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2306.642693] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2306.671108] FAULT_INJECTION: forcing a failure. [ 2306.671108] name failslab, interval 1, probability 0, space 0, times 0 [ 2306.752952] CPU: 0 PID: 14900 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2306.759932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2306.769279] Call Trace: [ 2306.771880] dump_stack+0x172/0x1f0 [ 2306.775516] should_fail.cold+0xa/0x1b [ 2306.779403] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2306.784501] ? lock_downgrade+0x880/0x880 [ 2306.784521] __should_failslab+0x121/0x190 [ 2306.784536] should_failslab+0x9/0x14 [ 2306.796679] kmem_cache_alloc+0x2ae/0x700 [ 2306.800917] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 2306.806030] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2306.810614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2306.816155] ? timespec64_trunc+0xf0/0x180 [ 2306.820399] __d_alloc+0x2e/0x9c0 [ 2306.823847] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 2306.829079] d_alloc_pseudo+0x1e/0x70 [ 2306.829094] alloc_file_pseudo+0xe2/0x280 [ 2306.837001] ? __lockdep_init_map+0x10c/0x5b0 [ 2306.837016] ? alloc_file+0x4d0/0x4d0 [ 2306.837037] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2306.850819] ? kasan_check_write+0x14/0x20 [ 2306.855069] __shmem_file_setup.part.0+0x108/0x2b0 [ 2306.860008] shmem_file_setup+0x66/0x90 [ 2306.863979] __x64_sys_memfd_create+0x2a2/0x470 [ 2306.863993] ? memfd_fcntl+0x1750/0x1750 [ 2306.864026] ? do_syscall_64+0x26/0x620 [ 2306.876681] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2306.881258] ? trace_hardirqs_on+0x67/0x220 [ 2306.885578] do_syscall_64+0xfd/0x620 [ 2306.889375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2306.894568] RIP: 0033:0x45a219 [ 2306.894593] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2306.894600] RSP: 002b:00007f8eb9ea8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2306.916672] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 000000000045a219 [ 2306.931619] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 2306.938981] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2306.938992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eb9ea96d4 21:52:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7ffffffff000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2306.953492] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:34 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x3e000000) 21:52:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:34 executing program 1 (fault-call:6 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:34 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000180)={0x1d, r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$can_raw(r0, &(0x7f0000000300), 0x10) 21:52:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x40030000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2307.374302] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) open(0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r4, 0x800448d3, &(0x7f0000000540)={{0x0, 0x4, 0x7, 0x9, 0x6, 0x1}, 0x3f, 0x2, 0x4, 0x0, 0x6, "d891370e3efdb9f814300a38a53f3b1d8417791e2e28f90d1fcf431d37bb1c2a69b880dd6181375c07e8a050a1ee88d0be07bdddb04829ac3cb7089c54bf121d7c0261c9956dc6b880cbf239414fabc34ba4b4279ea78fef944303d4c2d224ae49682a52fe5fda8171ec59ad2bb4a393e2a0b5d0ff226f07ca76b1cf3b34ba3d"}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xdf}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4b) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) write$P9_RMKDIR(r4, &(0x7f00000000c0)={0x14, 0x49, 0x2, {0x20, 0x1, 0x2}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffc01, 0x3f}, 0x0, 0xfffffffffffffffe, 0xfffffffe, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="030206000000074c002f67378bbe82209ba149d8c480c46968b6bf4fd033714cb6f33fd1a46e81a362ae5f19c076812b82ff0f00000e635f3f"], 0x1, 0x1) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) sendfile(r5, r5, 0x0, 0x24000000) [ 2307.554624] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2307.575593] FAULT_INJECTION: forcing a failure. [ 2307.575593] name failslab, interval 1, probability 0, space 0, times 0 [ 2307.602534] CPU: 0 PID: 15166 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2307.609473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2307.618822] Call Trace: [ 2307.621452] dump_stack+0x172/0x1f0 [ 2307.625109] should_fail.cold+0xa/0x1b [ 2307.629005] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2307.634109] ? lock_downgrade+0x880/0x880 [ 2307.638264] __should_failslab+0x121/0x190 [ 2307.642501] should_failslab+0x9/0x14 [ 2307.646302] kmem_cache_alloc+0x2ae/0x700 [ 2307.650463] __alloc_file+0x27/0x330 [ 2307.654185] alloc_empty_file+0x72/0x170 [ 2307.658248] alloc_file+0x5e/0x4d0 [ 2307.661787] alloc_file_pseudo+0x189/0x280 [ 2307.663593] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2307.666021] ? alloc_file+0x4d0/0x4d0 [ 2307.666040] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2307.682697] ? kasan_check_write+0x14/0x20 [ 2307.682719] __shmem_file_setup.part.0+0x108/0x2b0 [ 2307.682740] shmem_file_setup+0x66/0x90 [ 2307.691877] __x64_sys_memfd_create+0x2a2/0x470 [ 2307.691893] ? memfd_fcntl+0x1750/0x1750 21:52:35 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="13f80f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYRESHEX, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceeccb6068e2a28b23afa648d27799c7d872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640ce747628488498f2c8c6624e7329e5b17f60fe94e963686a647bbcddc1417ad4f79a4d2a5e964644e4f7edcd054a09445138614285d08a070367e9ff5bd0c614c2afbc2497c768734e309012b00c1d25249a0dcae3f9094fe0cc457d85194a87eb2253e92bab404a0fdd17184e305f9e28e132821ffbfcbaf95f66bbd964556cd9f20e9c6f6c5be7e275992c54ed33253ce73b817d3068d54a4f053cca801644d52dcf150bb0251312337b2f5ff86cac04b217548dd3157063d8d941d0149e88576f958d2508ef786a1be7b60630cac6ff7178c376e75039b55fa80", @ANYRES64], 0x0, 0x14f}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2307.691906] ? do_syscall_64+0x26/0x620 [ 2307.691923] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2307.700545] ? trace_hardirqs_on+0x67/0x220 [ 2307.700565] do_syscall_64+0xfd/0x620 [ 2307.700583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2307.700595] RIP: 0033:0x45a219 [ 2307.713243] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2307.713251] RSP: 002b:00007f8eb9ea8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2307.713266] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 000000000045a219 [ 2307.713273] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bf2b7 21:52:35 executing program 1 (fault-call:6 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf0ffffff7f0000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2307.713281] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2307.713289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eb9ea96d4 [ 2307.713296] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:35 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000000), 0x8) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) 21:52:35 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)=ANY=[@ANYBLOB="0400cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d331de23d61ca62ef8d48f42ffd913acf060c10300000082fc399eaab8787f0dd1510490b0f420326bcc4e2b65e7c68bacee7877a6274d908e5a5d512b87ed3eb24d0002", @ANYRES16=0x0, @ANYRESDEC, @ANYRESHEX=0x0, @ANYRESOCT, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872b", @ANYRESDEC], 0x0, 0x129}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2307.896824] FAULT_INJECTION: forcing a failure. [ 2307.896824] name failslab, interval 1, probability 0, space 0, times 0 [ 2307.925127] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4a, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2307.952922] CPU: 1 PID: 15417 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2307.959894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2307.969262] Call Trace: [ 2307.971873] dump_stack+0x172/0x1f0 [ 2307.975514] should_fail.cold+0xa/0x1b [ 2307.979402] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2307.979421] ? lock_downgrade+0x880/0x880 [ 2307.979441] __should_failslab+0x121/0x190 [ 2307.992867] should_failslab+0x9/0x14 [ 2307.996669] kmem_cache_alloc+0x2ae/0x700 [ 2308.000821] ? rcu_read_lock_sched_held+0x110/0x130 [ 2308.005837] selinux_file_alloc_security+0xb4/0x190 [ 2308.005851] security_file_alloc+0x63/0xa0 [ 2308.005865] __alloc_file+0xcf/0x330 [ 2308.018782] alloc_empty_file+0x72/0x170 [ 2308.022849] alloc_file+0x5e/0x4d0 [ 2308.026395] alloc_file_pseudo+0x189/0x280 [ 2308.030659] ? alloc_file+0x4d0/0x4d0 [ 2308.034463] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2308.039996] ? kasan_check_write+0x14/0x20 [ 2308.040017] __shmem_file_setup.part.0+0x108/0x2b0 [ 2308.040033] shmem_file_setup+0x66/0x90 [ 2308.040048] __x64_sys_memfd_create+0x2a2/0x470 [ 2308.049481] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2308.053144] ? memfd_fcntl+0x1750/0x1750 [ 2308.053159] ? do_syscall_64+0x26/0x620 [ 2308.053176] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2308.053203] ? trace_hardirqs_on+0x67/0x220 [ 2308.053220] do_syscall_64+0xfd/0x620 [ 2308.053237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2308.053247] RIP: 0033:0x45a219 [ 2308.053259] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2308.053265] RSP: 002b:00007f8eb9ea8a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2308.053278] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 000000000045a219 [ 2308.053285] RDX: 00000000200000a8 RSI: 0000000000000000 RDI: 00000000004bf2b7 [ 2308.053293] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2308.053299] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eb9ea96d4 [ 2308.053311] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 [ 2308.079661] net_ratelimit: 24 callbacks suppressed [ 2308.079667] protocol 88fb is buggy, dev hsr_slave_0 [ 2308.115469] protocol 88fb is buggy, dev hsr_slave_1 [ 2308.115559] protocol 88fb is buggy, dev hsr_slave_0 [ 2308.115600] protocol 88fb is buggy, dev hsr_slave_1 21:52:35 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x3f000000) 21:52:35 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="2e0000001c008104e00f80ecdb4cb90402c804a003000000010090fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) [ 2308.212417] protocol 88fb is buggy, dev hsr_slave_0 [ 2308.217601] protocol 88fb is buggy, dev hsr_slave_1 [ 2308.222679] protocol 88fb is buggy, dev hsr_slave_0 [ 2308.227772] protocol 88fb is buggy, dev hsr_slave_1 21:52:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf0ffffffffffff}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:35 executing program 1 (fault-call:6 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2308.380277] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2308.408715] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x4b, 0x4000000000dc) 21:52:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002d00810065160b00000040d88000000001ffffff00000000000000001fffffff", 0x227}], 0x1}, 0x20004) [ 2308.540556] FAULT_INJECTION: forcing a failure. [ 2308.540556] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:52:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x100000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2308.654267] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2308.656371] CPU: 1 PID: 15765 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2308.669955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2308.679427] Call Trace: [ 2308.679450] dump_stack+0x172/0x1f0 [ 2308.679470] should_fail.cold+0xa/0x1b [ 2308.679485] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2308.679501] ? __might_sleep+0x95/0x190 [ 2308.679519] __alloc_pages_nodemask+0x1ee/0x750 [ 2308.694653] ? lock_downgrade+0x880/0x880 [ 2308.694672] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2308.694706] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2308.694724] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2308.694737] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2308.694757] alloc_pages_vma+0xdd/0x590 [ 2308.694777] shmem_alloc_page+0xc0/0x180 [ 2308.694791] ? shmem_swapin+0x1a0/0x1a0 [ 2308.694808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2308.745778] ? __sanitizer_cov_trace_cmp8+0x18/0x20 21:52:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x4c, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2308.750807] ? __vm_enough_memory+0x324/0x5a0 [ 2308.755316] shmem_alloc_and_acct_page+0x165/0x970 [ 2308.760247] shmem_getpage_gfp+0x44a/0x3640 [ 2308.764585] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2308.769514] ? iov_iter_fault_in_readable+0x367/0x450 [ 2308.774699] ? iov_iter_fault_in_readable+0x377/0x450 [ 2308.779888] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2308.785425] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2308.790640] shmem_write_begin+0x10b/0x1e0 [ 2308.794945] generic_perform_write+0x22a/0x520 [ 2308.799540] ? page_endio+0x780/0x780 [ 2308.803336] ? current_time+0x140/0x140 [ 2308.807310] ? lock_acquire+0x16f/0x3f0 [ 2308.811282] __generic_file_write_iter+0x25e/0x630 [ 2308.816236] generic_file_write_iter+0x383/0x72f [ 2308.821028] __vfs_write+0x587/0x810 [ 2308.824757] ? kernel_read+0x120/0x120 [ 2308.828658] ? rcu_read_lock_sched_held+0x110/0x130 [ 2308.833675] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2308.838428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2308.843960] ? __sb_start_write+0x1a9/0x360 [ 2308.848296] vfs_write+0x20c/0x560 [ 2308.851840] ksys_pwrite64+0x183/0x1c0 [ 2308.855727] ? __ia32_sys_pread64+0xf0/0xf0 [ 2308.860046] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2308.864802] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2308.869558] ? do_syscall_64+0x26/0x620 [ 2308.873533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2308.878894] ? do_syscall_64+0x26/0x620 [ 2308.883483] __x64_sys_pwrite64+0x97/0xf0 [ 2308.887639] do_syscall_64+0xfd/0x620 [ 2308.891451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2308.895657] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2308.896633] RIP: 0033:0x414017 [ 2308.896646] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2308.896653] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2308.896667] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 21:52:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) [ 2308.896673] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2308.896687] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2308.926082] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2308.926090] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 [ 2309.003040] protocol 88fb is buggy, dev hsr_slave_0 [ 2309.008236] protocol 88fb is buggy, dev hsr_slave_1 [ 2309.016881] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=00000000) 21:52:36 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x190) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000288, 0x0) 21:52:36 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x40000000) 21:52:36 executing program 1 (fault-call:6 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:36 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x200000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2309.315486] FAULT_INJECTION: forcing a failure. [ 2309.315486] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2309.389758] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2309.401341] CPU: 1 PID: 16083 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2309.408278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2309.417623] Call Trace: [ 2309.420232] dump_stack+0x172/0x1f0 [ 2309.423871] should_fail.cold+0xa/0x1b [ 2309.427767] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2309.432873] ? __might_sleep+0x95/0x190 [ 2309.436856] __alloc_pages_nodemask+0x1ee/0x750 [ 2309.441530] ? lock_downgrade+0x880/0x880 [ 2309.445686] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2309.450712] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2309.455390] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2309.460930] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2309.466477] alloc_pages_vma+0xdd/0x590 [ 2309.470474] shmem_alloc_page+0xc0/0x180 [ 2309.474558] ? shmem_swapin+0x1a0/0x1a0 [ 2309.478535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2309.484086] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2309.489131] ? __vm_enough_memory+0x324/0x5a0 [ 2309.493636] shmem_alloc_and_acct_page+0x165/0x970 [ 2309.498574] shmem_getpage_gfp+0x44a/0x3640 [ 2309.502906] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2309.507838] ? iov_iter_fault_in_readable+0x367/0x450 [ 2309.513034] ? iov_iter_fault_in_readable+0x377/0x450 [ 2309.518223] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2309.523763] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2309.528981] shmem_write_begin+0x10b/0x1e0 [ 2309.533238] generic_perform_write+0x22a/0x520 [ 2309.537829] ? page_endio+0x780/0x780 [ 2309.541628] ? current_time+0x140/0x140 [ 2309.545602] ? lock_acquire+0x16f/0x3f0 [ 2309.549579] __generic_file_write_iter+0x25e/0x630 [ 2309.554510] generic_file_write_iter+0x383/0x72f [ 2309.559269] __vfs_write+0x587/0x810 [ 2309.562985] ? kernel_read+0x120/0x120 [ 2309.566905] ? rcu_read_lock_sched_held+0x110/0x130 [ 2309.571924] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2309.576695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2309.582241] ? __sb_start_write+0x1a9/0x360 [ 2309.586566] vfs_write+0x20c/0x560 [ 2309.590112] ksys_pwrite64+0x183/0x1c0 [ 2309.594002] ? __ia32_sys_pread64+0xf0/0xf0 [ 2309.598323] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2309.603080] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2309.607870] ? do_syscall_64+0x26/0x620 [ 2309.611841] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2309.617199] ? do_syscall_64+0x26/0x620 [ 2309.621175] __x64_sys_pwrite64+0x97/0xf0 [ 2309.625344] do_syscall_64+0xfd/0x620 [ 2309.629154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2309.634339] RIP: 0033:0x414017 [ 2309.637527] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2309.656433] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2309.664146] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2309.671433] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2309.678701] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 21:52:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x5e, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2309.686077] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2309.693344] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2309.755091] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2309.836661] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:52:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x60, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:37 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x300000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:37 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) 21:52:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:37 executing program 1 (fault-call:6 fault-nth:8): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:37 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x42000000) [ 2310.149925] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x68, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2310.301140] FAULT_INJECTION: forcing a failure. [ 2310.301140] name failslab, interval 1, probability 0, space 0, times 0 [ 2310.313046] CPU: 0 PID: 16388 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2310.320009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2310.329356] Call Trace: [ 2310.331946] dump_stack+0x172/0x1f0 [ 2310.335582] should_fail.cold+0xa/0x1b [ 2310.339470] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2310.339494] __should_failslab+0x121/0x190 [ 2310.339509] should_failslab+0x9/0x14 [ 2310.352702] kmem_cache_alloc+0x47/0x700 [ 2310.356769] ? __lock_acquire+0x6ee/0x49c0 [ 2310.361013] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 2310.366643] radix_tree_extend+0x1b4/0x4f0 [ 2310.370880] __radix_tree_create+0x459/0x550 [ 2310.375297] __radix_tree_insert+0xce/0x6b0 [ 2310.379623] ? percpu_ref_put_many+0x94/0x190 [ 2310.384114] ? __radix_tree_create+0x550/0x550 [ 2310.388700] ? lock_acquire+0x16f/0x3f0 [ 2310.392683] ? kasan_check_write+0x14/0x20 [ 2310.396924] ? do_raw_spin_lock+0xc8/0x240 21:52:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r2, r3, &(0x7f0000000240)=0x1000, 0x4000000000dc) [ 2310.401167] shmem_add_to_page_cache+0x6c7/0xd30 [ 2310.405930] ? shmem_writepage+0xe70/0xe70 [ 2310.410166] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2310.415193] ? __radix_tree_preload+0x215/0x290 [ 2310.415218] shmem_getpage_gfp+0x1ea7/0x3640 [ 2310.415245] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2310.415263] ? iov_iter_fault_in_readable+0x377/0x450 [ 2310.434388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2310.434403] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2310.434421] shmem_write_begin+0x10b/0x1e0 [ 2310.445142] generic_perform_write+0x22a/0x520 [ 2310.445164] ? page_endio+0x780/0x780 [ 2310.445182] ? current_time+0x140/0x140 [ 2310.453957] ? lock_acquire+0x16f/0x3f0 [ 2310.453975] __generic_file_write_iter+0x25e/0x630 [ 2310.453992] generic_file_write_iter+0x383/0x72f [ 2310.454014] __vfs_write+0x587/0x810 [ 2310.475374] ? kernel_read+0x120/0x120 [ 2310.483042] ? rcu_read_lock_sched_held+0x110/0x130 [ 2310.488053] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2310.488066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2310.488091] ? __sb_start_write+0x1a9/0x360 [ 2310.488105] vfs_write+0x20c/0x560 [ 2310.488119] ksys_pwrite64+0x183/0x1c0 [ 2310.498381] ? __ia32_sys_pread64+0xf0/0xf0 [ 2310.498396] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2310.498411] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2310.498421] ? do_syscall_64+0x26/0x620 [ 2310.498437] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2310.506251] ? do_syscall_64+0x26/0x620 [ 2310.506267] __x64_sys_pwrite64+0x97/0xf0 [ 2310.506283] do_syscall_64+0xfd/0x620 [ 2310.506299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2310.506308] RIP: 0033:0x414017 [ 2310.506322] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2310.514562] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 21:52:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x400000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:38 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2310.514578] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2310.514586] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2310.514595] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2310.514603] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2310.514611] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 [ 2310.660777] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes [ 2310.703967] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:38 executing program 1 (fault-call:6 fault-nth:9): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:38 executing program 3: 21:52:38 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6c, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:38 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x500000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:38 executing program 3: [ 2311.016932] FAULT_INJECTION: forcing a failure. [ 2311.016932] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2311.030169] validate_nla: 5 callbacks suppressed [ 2311.030177] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2311.137188] CPU: 0 PID: 16880 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2311.144257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2311.153608] Call Trace: [ 2311.153633] dump_stack+0x172/0x1f0 [ 2311.153655] should_fail.cold+0xa/0x1b [ 2311.153672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2311.153693] ? __might_sleep+0x95/0x190 [ 2311.168862] __alloc_pages_nodemask+0x1ee/0x750 [ 2311.168879] ? lock_downgrade+0x880/0x880 [ 2311.168896] ? __alloc_pages_slowpath+0x2870/0x2870 21:52:38 executing program 3: [ 2311.177534] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2311.177554] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2311.186670] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2311.186689] alloc_pages_vma+0xdd/0x590 [ 2311.186709] shmem_alloc_page+0xc0/0x180 [ 2311.202390] ? shmem_swapin+0x1a0/0x1a0 [ 2311.202404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2311.202438] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2311.219907] ? __vm_enough_memory+0x324/0x5a0 [ 2311.219931] shmem_alloc_and_acct_page+0x165/0x970 [ 2311.219950] shmem_getpage_gfp+0x44a/0x3640 [ 2311.234368] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2311.234386] ? iov_iter_fault_in_readable+0x367/0x450 [ 2311.234402] ? iov_iter_fault_in_readable+0x377/0x450 [ 2311.243614] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2311.243630] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2311.243655] shmem_write_begin+0x10b/0x1e0 [ 2311.254002] generic_perform_write+0x22a/0x520 [ 2311.254026] ? page_endio+0x780/0x780 [ 2311.254039] ? current_time+0x140/0x140 [ 2311.254056] ? lock_acquire+0x16f/0x3f0 [ 2311.281279] __generic_file_write_iter+0x25e/0x630 [ 2311.281299] generic_file_write_iter+0x383/0x72f [ 2311.281319] __vfs_write+0x587/0x810 [ 2311.298642] ? kernel_read+0x120/0x120 [ 2311.302551] ? rcu_read_lock_sched_held+0x110/0x130 [ 2311.307573] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2311.307587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2311.307602] ? __sb_start_write+0x1a9/0x360 [ 2311.307617] vfs_write+0x20c/0x560 [ 2311.317885] ksys_pwrite64+0x183/0x1c0 [ 2311.325701] ? __ia32_sys_pread64+0xf0/0xf0 [ 2311.325715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2311.325732] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2311.333893] ? do_syscall_64+0x26/0x620 [ 2311.333907] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2311.333920] ? do_syscall_64+0x26/0x620 [ 2311.333936] __x64_sys_pwrite64+0x97/0xf0 [ 2311.333952] do_syscall_64+0xfd/0x620 [ 2311.343431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2311.343443] RIP: 0033:0x414017 [ 2311.343454] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2311.343465] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 [ 2311.352772] ORIG_RAX: 0000000000000012 [ 2311.369826] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2311.369834] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2311.369842] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 21:52:38 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x43000000) 21:52:38 executing program 3: [ 2311.369849] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2311.369856] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 [ 2311.489971] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:52:39 executing program 3: [ 2311.538867] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x600000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6e, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:39 executing program 1 (fault-call:6 fault-nth:10): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2311.757857] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2311.788658] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:39 executing program 3: [ 2311.831479] FAULT_INJECTION: forcing a failure. [ 2311.831479] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2311.865795] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2311.875447] CPU: 0 PID: 17036 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2311.882380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2311.882385] Call Trace: [ 2311.882419] dump_stack+0x172/0x1f0 [ 2311.882439] should_fail.cold+0xa/0x1b [ 2311.901851] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2311.906962] ? __might_sleep+0x95/0x190 [ 2311.910944] __alloc_pages_nodemask+0x1ee/0x750 [ 2311.915628] ? lock_downgrade+0x880/0x880 [ 2311.919778] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2311.924797] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2311.929472] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2311.935015] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2311.940554] alloc_pages_vma+0xdd/0x590 [ 2311.944537] shmem_alloc_page+0xc0/0x180 [ 2311.944552] ? shmem_swapin+0x1a0/0x1a0 [ 2311.944565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2311.944597] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2311.952608] ? __vm_enough_memory+0x324/0x5a0 [ 2311.952632] shmem_alloc_and_acct_page+0x165/0x970 [ 2311.952651] shmem_getpage_gfp+0x44a/0x3640 [ 2311.952675] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2311.963185] ? iov_iter_fault_in_readable+0x367/0x450 [ 2311.963201] ? iov_iter_fault_in_readable+0x377/0x450 [ 2311.963214] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2311.963228] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2311.963246] shmem_write_begin+0x10b/0x1e0 [ 2311.963266] generic_perform_write+0x22a/0x520 [ 2311.972647] ? page_endio+0x780/0x780 [ 2311.972664] ? current_time+0x140/0x140 [ 2311.972679] ? lock_acquire+0x16f/0x3f0 21:52:39 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:39 executing program 3: [ 2311.972695] __generic_file_write_iter+0x25e/0x630 [ 2311.981908] generic_file_write_iter+0x383/0x72f [ 2311.981928] __vfs_write+0x587/0x810 [ 2311.981943] ? kernel_read+0x120/0x120 [ 2311.981971] ? rcu_read_lock_sched_held+0x110/0x130 [ 2311.992301] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2311.992314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2311.992329] ? __sb_start_write+0x1a9/0x360 [ 2311.992345] vfs_write+0x20c/0x560 [ 2311.992362] ksys_pwrite64+0x183/0x1c0 [ 2312.003064] ? __ia32_sys_pread64+0xf0/0xf0 [ 2312.003078] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2312.003090] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2312.003103] ? do_syscall_64+0x26/0x620 [ 2312.003117] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2312.003131] ? do_syscall_64+0x26/0x620 [ 2312.011905] __x64_sys_pwrite64+0x97/0xf0 [ 2312.011922] do_syscall_64+0xfd/0x620 [ 2312.011940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2312.011950] RIP: 0033:0x414017 [ 2312.011964] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2312.019678] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2312.019692] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2312.019699] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2312.019707] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2312.019714] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 21:52:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x700000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2312.019721] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:39 executing program 3: [ 2312.300136] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes [ 2312.319171] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x72, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:39 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x48000000) 21:52:39 executing program 1 (fault-call:6 fault-nth:11): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xa00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:39 executing program 3: [ 2312.527601] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2312.579300] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2312.590238] FAULT_INJECTION: forcing a failure. [ 2312.590238] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2312.590253] CPU: 1 PID: 17295 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2312.590260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.590265] Call Trace: [ 2312.590286] dump_stack+0x172/0x1f0 [ 2312.590308] should_fail.cold+0xa/0x1b [ 2312.590328] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2312.590348] ? __might_sleep+0x95/0x190 [ 2312.590366] __alloc_pages_nodemask+0x1ee/0x750 [ 2312.590383] ? lock_downgrade+0x880/0x880 [ 2312.590403] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2312.590421] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2312.590455] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2312.590469] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2312.590490] alloc_pages_vma+0xdd/0x590 [ 2312.590512] shmem_alloc_page+0xc0/0x180 [ 2312.590527] ? shmem_swapin+0x1a0/0x1a0 [ 2312.590540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2312.590572] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2312.590585] ? __vm_enough_memory+0x324/0x5a0 [ 2312.590610] shmem_alloc_and_acct_page+0x165/0x970 [ 2312.590642] shmem_getpage_gfp+0x44a/0x3640 [ 2312.590677] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2312.590693] ? iov_iter_fault_in_readable+0x367/0x450 [ 2312.590708] ? iov_iter_fault_in_readable+0x377/0x450 [ 2312.590721] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2312.590736] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2312.590756] shmem_write_begin+0x10b/0x1e0 [ 2312.590777] generic_perform_write+0x22a/0x520 [ 2312.590801] ? page_endio+0x780/0x780 [ 2312.590831] ? current_time+0x140/0x140 [ 2312.590851] ? lock_acquire+0x16f/0x3f0 [ 2312.590870] __generic_file_write_iter+0x25e/0x630 [ 2312.590891] generic_file_write_iter+0x383/0x72f [ 2312.590912] __vfs_write+0x587/0x810 [ 2312.590928] ? kernel_read+0x120/0x120 [ 2312.590958] ? rcu_read_lock_sched_held+0x110/0x130 [ 2312.590974] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2312.590987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2312.591000] ? __sb_start_write+0x1a9/0x360 [ 2312.591016] vfs_write+0x20c/0x560 [ 2312.591034] ksys_pwrite64+0x183/0x1c0 [ 2312.591048] ? __ia32_sys_pread64+0xf0/0xf0 [ 2312.591062] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2312.591074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2312.591094] ? do_syscall_64+0x26/0x620 [ 2312.609796] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2312.609810] ? do_syscall_64+0x26/0x620 [ 2312.609829] __x64_sys_pwrite64+0x97/0xf0 [ 2312.647047] do_syscall_64+0xfd/0x620 21:52:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xe00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2312.647066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2312.647077] RIP: 0033:0x414017 [ 2312.647091] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2312.837285] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2312.837932] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 21:52:40 executing program 3: [ 2312.837947] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2312.837956] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2312.837964] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2312.837972] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2312.837980] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:40 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:40 executing program 3: [ 2313.053085] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes [ 2313.082114] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:40 executing program 3: [ 2313.164297] net_ratelimit: 26 callbacks suppressed [ 2313.164304] protocol 88fb is buggy, dev hsr_slave_0 [ 2313.174526] protocol 88fb is buggy, dev hsr_slave_1 [ 2313.180790] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:40 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:40 executing program 1 (fault-call:6 fault-nth:12): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:40 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x49000000) 21:52:40 executing program 3: 21:52:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x7a, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2313.403032] protocol 88fb is buggy, dev hsr_slave_0 [ 2313.408261] protocol 88fb is buggy, dev hsr_slave_1 [ 2313.413440] protocol 88fb is buggy, dev hsr_slave_0 [ 2313.416046] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2313.418490] protocol 88fb is buggy, dev hsr_slave_1 [ 2313.489871] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2313.497527] FAULT_INJECTION: forcing a failure. [ 2313.497527] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2313.541103] CPU: 0 PID: 17588 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2313.548053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2313.557396] Call Trace: [ 2313.557420] dump_stack+0x172/0x1f0 [ 2313.557442] should_fail.cold+0xa/0x1b [ 2313.557461] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2313.557479] ? __might_sleep+0x95/0x190 [ 2313.563676] __alloc_pages_nodemask+0x1ee/0x750 [ 2313.563692] ? lock_downgrade+0x880/0x880 [ 2313.563708] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2313.563725] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2313.572673] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2313.572686] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2313.572704] alloc_pages_vma+0xdd/0x590 [ 2313.572724] shmem_alloc_page+0xc0/0x180 [ 2313.590438] ? shmem_swapin+0x1a0/0x1a0 [ 2313.600600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2313.600631] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2313.600646] ? __vm_enough_memory+0x324/0x5a0 [ 2313.610121] shmem_alloc_and_acct_page+0x165/0x970 [ 2313.610141] shmem_getpage_gfp+0x44a/0x3640 [ 2313.610167] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2313.618148] ? iov_iter_fault_in_readable+0x367/0x450 [ 2313.618163] ? iov_iter_fault_in_readable+0x377/0x450 [ 2313.618176] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2313.618192] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2313.628696] shmem_write_begin+0x10b/0x1e0 [ 2313.628716] generic_perform_write+0x22a/0x520 [ 2313.628736] ? page_endio+0x780/0x780 [ 2313.638103] ? current_time+0x140/0x140 [ 2313.638121] ? lock_acquire+0x16f/0x3f0 [ 2313.638136] __generic_file_write_iter+0x25e/0x630 [ 2313.638154] generic_file_write_iter+0x383/0x72f [ 2313.647366] __vfs_write+0x587/0x810 [ 2313.647384] ? kernel_read+0x120/0x120 [ 2313.647418] ? rcu_read_lock_sched_held+0x110/0x130 [ 2313.657763] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2313.657794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2313.657807] ? __sb_start_write+0x1a9/0x360 [ 2313.657822] vfs_write+0x20c/0x560 [ 2313.668519] ksys_pwrite64+0x183/0x1c0 [ 2313.668534] ? __ia32_sys_pread64+0xf0/0xf0 [ 2313.668547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2313.668562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2313.677361] ? do_syscall_64+0x26/0x620 [ 2313.677377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2313.677396] ? do_syscall_64+0x26/0x620 [ 2313.685131] __x64_sys_pwrite64+0x97/0xf0 [ 2313.685148] do_syscall_64+0xfd/0x620 [ 2313.685163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2313.685175] RIP: 0033:0x414017 21:52:41 executing program 3: 21:52:41 executing program 3: [ 2313.696794] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2313.698769] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2313.698777] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2313.698796] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2313.711349] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2313.711357] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 21:52:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x1400000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2313.711365] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2313.711377] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:41 executing program 3: [ 2313.920432] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:52:41 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:41 executing program 1 (fault-call:6 fault-nth:13): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:41 executing program 3: [ 2314.089287] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x8a, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:41 executing program 3: [ 2314.207751] FAULT_INJECTION: forcing a failure. [ 2314.207751] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:52:41 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x4a000000) 21:52:41 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2314.283041] protocol 88fb is buggy, dev hsr_slave_0 [ 2314.288193] protocol 88fb is buggy, dev hsr_slave_1 [ 2314.293325] protocol 88fb is buggy, dev hsr_slave_0 [ 2314.298389] protocol 88fb is buggy, dev hsr_slave_1 [ 2314.302087] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2314.380138] CPU: 1 PID: 17762 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2314.387088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2314.396439] Call Trace: [ 2314.399035] dump_stack+0x172/0x1f0 [ 2314.402672] should_fail.cold+0xa/0x1b [ 2314.406571] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2314.411698] ? __might_sleep+0x95/0x190 [ 2314.415684] __alloc_pages_nodemask+0x1ee/0x750 [ 2314.420360] ? lock_downgrade+0x880/0x880 [ 2314.424524] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2314.429555] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2314.434231] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2314.439770] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2314.445312] alloc_pages_vma+0xdd/0x590 [ 2314.449295] shmem_alloc_page+0xc0/0x180 [ 2314.453358] ? shmem_swapin+0x1a0/0x1a0 [ 2314.457355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2314.462922] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2314.467938] ? __vm_enough_memory+0x324/0x5a0 [ 2314.472451] shmem_alloc_and_acct_page+0x165/0x970 [ 2314.477395] shmem_getpage_gfp+0x44a/0x3640 [ 2314.481732] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2314.486669] ? iov_iter_fault_in_readable+0x367/0x450 [ 2314.491860] ? iov_iter_fault_in_readable+0x377/0x450 [ 2314.497056] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2314.502605] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2314.507798] shmem_write_begin+0x10b/0x1e0 [ 2314.512028] generic_perform_write+0x22a/0x520 [ 2314.512052] ? page_endio+0x780/0x780 [ 2314.512067] ? current_time+0x140/0x140 [ 2314.512086] ? lock_acquire+0x16f/0x3f0 [ 2314.528339] __generic_file_write_iter+0x25e/0x630 [ 2314.533270] generic_file_write_iter+0x383/0x72f [ 2314.538038] __vfs_write+0x587/0x810 [ 2314.541752] ? kernel_read+0x120/0x120 [ 2314.545663] ? rcu_read_lock_sched_held+0x110/0x130 [ 2314.550678] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2314.555433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2314.560974] ? __sb_start_write+0x1a9/0x360 [ 2314.565317] vfs_write+0x20c/0x560 [ 2314.568854] ksys_pwrite64+0x183/0x1c0 [ 2314.572755] ? __ia32_sys_pread64+0xf0/0xf0 [ 2314.577073] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2314.581830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2314.586597] ? do_syscall_64+0x26/0x620 [ 2314.586614] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2314.586628] ? do_syscall_64+0x26/0x620 [ 2314.586645] __x64_sys_pwrite64+0x97/0xf0 [ 2314.586663] do_syscall_64+0xfd/0x620 [ 2314.586678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2314.586692] RIP: 0033:0x414017 21:52:42 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x2000000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:42 executing program 3: 21:52:42 executing program 3: [ 2314.595988] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2314.604050] RSP: 002b:00007f8eb9e87a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2314.604064] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2314.604072] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000004 [ 2314.604079] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2314.604086] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 2314.604096] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000003 [ 2314.688972] BFS-fs: bfs_fill_super(): Superblock is corrupted 21:52:42 executing program 3: 21:52:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x3f00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:42 executing program 1 (fault-call:6 fault-nth:14): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:42 executing program 3: 21:52:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x91, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2314.974966] FAULT_INJECTION: forcing a failure. [ 2314.974966] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2314.994669] CPU: 1 PID: 18051 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2315.001615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.001620] Call Trace: [ 2315.001641] dump_stack+0x172/0x1f0 [ 2315.001658] should_fail.cold+0xa/0x1b [ 2315.021283] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2315.026392] ? __might_sleep+0x95/0x190 [ 2315.030369] __alloc_pages_nodemask+0x1ee/0x750 [ 2315.035036] ? lock_downgrade+0x880/0x880 [ 2315.039181] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2315.044202] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2315.048872] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2315.054405] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2315.059947] alloc_pages_vma+0xdd/0x590 [ 2315.063938] shmem_alloc_page+0xc0/0x180 [ 2315.067996] ? shmem_swapin+0x1a0/0x1a0 [ 2315.071960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.077508] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2315.082633] ? __vm_enough_memory+0x324/0x5a0 [ 2315.087136] shmem_alloc_and_acct_page+0x165/0x970 [ 2315.092079] shmem_getpage_gfp+0x44a/0x3640 [ 2315.096412] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2315.101341] ? iov_iter_fault_in_readable+0x367/0x450 [ 2315.106533] ? iov_iter_fault_in_readable+0x377/0x450 [ 2315.111715] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2315.111730] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2315.111752] shmem_write_begin+0x10b/0x1e0 [ 2315.122556] generic_perform_write+0x22a/0x520 [ 2315.122576] ? page_endio+0x780/0x780 [ 2315.122592] ? current_time+0x140/0x140 [ 2315.139105] ? lock_acquire+0x16f/0x3f0 [ 2315.143074] __generic_file_write_iter+0x25e/0x630 [ 2315.143092] generic_file_write_iter+0x383/0x72f [ 2315.143112] __vfs_write+0x587/0x810 [ 2315.143126] ? kernel_read+0x120/0x120 [ 2315.143154] ? rcu_read_lock_sched_held+0x110/0x130 [ 2315.143173] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2315.143185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.143197] ? __sb_start_write+0x1a9/0x360 [ 2315.143211] vfs_write+0x20c/0x560 [ 2315.143227] ksys_pwrite64+0x183/0x1c0 [ 2315.143241] ? __ia32_sys_pread64+0xf0/0xf0 [ 2315.143255] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2315.143268] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2315.143280] ? do_syscall_64+0x26/0x620 [ 2315.143294] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2315.143306] ? do_syscall_64+0x26/0x620 [ 2315.143322] __x64_sys_pwrite64+0x97/0xf0 [ 2315.143337] do_syscall_64+0xfd/0x620 21:52:42 executing program 3: [ 2315.143353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2315.143363] RIP: 0033:0x414017 [ 2315.143376] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2315.143383] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2315.143397] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2315.143421] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2315.143430] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2315.143437] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2315.143446] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:42 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x4b020000) 21:52:42 executing program 3: [ 2315.398842] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:52:43 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x4800000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:43 executing program 3: 21:52:43 executing program 1 (fault-call:6 fault-nth:15): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x92, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2315.611754] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:43 executing program 3: [ 2315.777844] FAULT_INJECTION: forcing a failure. [ 2315.777844] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:52:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x4c00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2315.900015] CPU: 1 PID: 18250 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2315.906987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.916334] Call Trace: [ 2315.918942] dump_stack+0x172/0x1f0 [ 2315.922579] should_fail.cold+0xa/0x1b [ 2315.926470] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2315.931578] ? __might_sleep+0x95/0x190 [ 2315.935557] __alloc_pages_nodemask+0x1ee/0x750 [ 2315.940219] ? lock_downgrade+0x880/0x880 [ 2315.940237] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2315.940255] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2315.954036] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2315.959568] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2315.965103] alloc_pages_vma+0xdd/0x590 [ 2315.965123] shmem_alloc_page+0xc0/0x180 [ 2315.965135] ? shmem_swapin+0x1a0/0x1a0 [ 2315.965146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.965172] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2315.965183] ? __vm_enough_memory+0x324/0x5a0 [ 2315.965206] shmem_alloc_and_acct_page+0x165/0x970 21:52:43 executing program 3: [ 2315.997049] shmem_getpage_gfp+0x44a/0x3640 [ 2315.997081] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2315.997097] ? iov_iter_fault_in_readable+0x367/0x450 [ 2315.997112] ? iov_iter_fault_in_readable+0x377/0x450 [ 2315.997126] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2315.997140] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2315.997160] shmem_write_begin+0x10b/0x1e0 [ 2315.997191] generic_perform_write+0x22a/0x520 [ 2315.997213] ? page_endio+0x780/0x780 [ 2315.997227] ? current_time+0x140/0x140 [ 2315.997244] ? lock_acquire+0x16f/0x3f0 [ 2315.997260] __generic_file_write_iter+0x25e/0x630 [ 2315.997277] generic_file_write_iter+0x383/0x72f [ 2315.997296] __vfs_write+0x587/0x810 [ 2315.997311] ? kernel_read+0x120/0x120 [ 2315.997339] ? rcu_read_lock_sched_held+0x110/0x130 [ 2315.997353] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2315.997365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.997378] ? __sb_start_write+0x1a9/0x360 [ 2315.997392] vfs_write+0x20c/0x560 [ 2315.997409] ksys_pwrite64+0x183/0x1c0 [ 2315.997422] ? __ia32_sys_pread64+0xf0/0xf0 [ 2315.997436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2315.997449] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2315.997461] ? do_syscall_64+0x26/0x620 [ 2315.997476] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2315.997488] ? do_syscall_64+0x26/0x620 [ 2315.997503] __x64_sys_pwrite64+0x97/0xf0 [ 2315.997518] do_syscall_64+0xfd/0x620 [ 2315.997535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2315.997544] RIP: 0033:0x414017 [ 2315.997557] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2315.997564] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2315.997578] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 21:52:43 executing program 3: 21:52:43 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x4c000000) [ 2315.997586] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2315.997593] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2315.997601] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2315.997608] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)='/', 0x1}], 0x1}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/packet\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x300) [ 2316.308311] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:52:43 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x6000000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:44 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x94, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:44 executing program 1 (fault-call:6 fault-nth:16): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2316.577859] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:44 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000), 0x4) [ 2316.679429] validate_nla: 5 callbacks suppressed [ 2316.679438] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2316.711942] FAULT_INJECTION: forcing a failure. [ 2316.711942] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:52:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x6800000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2316.764769] CPU: 0 PID: 18633 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2316.771838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2316.781192] Call Trace: [ 2316.783792] dump_stack+0x172/0x1f0 [ 2316.787437] should_fail.cold+0xa/0x1b [ 2316.791351] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2316.796461] ? __might_sleep+0x95/0x190 [ 2316.800441] __alloc_pages_nodemask+0x1ee/0x750 [ 2316.805144] ? lock_downgrade+0x880/0x880 [ 2316.809306] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2316.809327] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2316.809346] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2316.809357] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2316.809375] alloc_pages_vma+0xdd/0x590 [ 2316.824560] shmem_alloc_page+0xc0/0x180 [ 2316.824577] ? shmem_swapin+0x1a0/0x1a0 [ 2316.824597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2316.824628] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2316.824645] ? __vm_enough_memory+0x324/0x5a0 [ 2316.857197] shmem_alloc_and_acct_page+0x165/0x970 [ 2316.862138] shmem_getpage_gfp+0x44a/0x3640 [ 2316.866483] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2316.871421] ? iov_iter_fault_in_readable+0x367/0x450 [ 2316.876620] ? iov_iter_fault_in_readable+0x377/0x450 [ 2316.881816] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2316.887361] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2316.892565] shmem_write_begin+0x10b/0x1e0 [ 2316.896813] generic_perform_write+0x22a/0x520 [ 2316.901411] ? page_endio+0x780/0x780 [ 2316.905215] ? current_time+0x140/0x140 [ 2316.909192] ? lock_acquire+0x16f/0x3f0 [ 2316.913165] __generic_file_write_iter+0x25e/0x630 [ 2316.913185] generic_file_write_iter+0x383/0x72f [ 2316.913206] __vfs_write+0x587/0x810 [ 2316.913220] ? kernel_read+0x120/0x120 [ 2316.913248] ? rcu_read_lock_sched_held+0x110/0x130 [ 2316.926598] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2316.926612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2316.926626] ? __sb_start_write+0x1a9/0x360 [ 2316.926642] vfs_write+0x20c/0x560 [ 2316.926659] ksys_pwrite64+0x183/0x1c0 [ 2316.926677] ? __ia32_sys_pread64+0xf0/0xf0 [ 2316.935541] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2316.935558] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2316.935573] ? do_syscall_64+0x26/0x620 [ 2316.935594] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2316.935611] ? do_syscall_64+0x26/0x620 [ 2316.950176] __x64_sys_pwrite64+0x97/0xf0 [ 2316.950196] do_syscall_64+0xfd/0x620 [ 2316.950217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2316.950228] RIP: 0033:0x414017 [ 2316.950241] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2316.950251] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 [ 2316.971421] ORIG_RAX: 0000000000000012 [ 2316.971430] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2316.971438] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2316.971446] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 21:52:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000001c0)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) tkill(r2, 0x17) wait4(0x0, 0x0, 0x0, 0x0) [ 2316.971454] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2316.971460] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:44 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x6c00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2317.114983] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes [ 2317.126052] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:44 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x4e000000) 21:52:44 executing program 1 (fault-call:6 fault-nth:17): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x9c, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2317.319512] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:44 executing program 3: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) socket(0x10, 0x3, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f, 0x40}, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_LK(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x6, {{0x0, 0x5d4a}}}, 0x28) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f000074fffc), 0x348) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 2317.364873] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2317.393363] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2317.417813] FAULT_INJECTION: forcing a failure. [ 2317.417813] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2317.458718] CPU: 1 PID: 19127 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2317.465676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2317.475032] Call Trace: [ 2317.477632] dump_stack+0x172/0x1f0 [ 2317.481273] should_fail.cold+0xa/0x1b [ 2317.485177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2317.490292] ? __might_sleep+0x95/0x190 [ 2317.494274] __alloc_pages_nodemask+0x1ee/0x750 [ 2317.498946] ? lock_downgrade+0x880/0x880 [ 2317.503104] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2317.508127] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2317.512802] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2317.518339] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2317.523880] alloc_pages_vma+0xdd/0x590 [ 2317.527951] shmem_alloc_page+0xc0/0x180 [ 2317.532016] ? shmem_swapin+0x1a0/0x1a0 [ 2317.535993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2317.541551] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2317.546568] ? __vm_enough_memory+0x324/0x5a0 [ 2317.551072] shmem_alloc_and_acct_page+0x165/0x970 [ 2317.556007] shmem_getpage_gfp+0x44a/0x3640 [ 2317.560341] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2317.565272] ? iov_iter_fault_in_readable+0x367/0x450 [ 2317.570463] ? iov_iter_fault_in_readable+0x377/0x450 [ 2317.575652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2317.581183] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2317.586371] shmem_write_begin+0x10b/0x1e0 [ 2317.586391] generic_perform_write+0x22a/0x520 [ 2317.586413] ? page_endio+0x780/0x780 [ 2317.598988] ? current_time+0x140/0x140 [ 2317.602965] ? lock_acquire+0x16f/0x3f0 [ 2317.606943] __generic_file_write_iter+0x25e/0x630 [ 2317.611877] generic_file_write_iter+0x383/0x72f [ 2317.616650] __vfs_write+0x587/0x810 [ 2317.620367] ? kernel_read+0x120/0x120 [ 2317.624271] ? rcu_read_lock_sched_held+0x110/0x130 [ 2317.629292] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2317.634045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2317.639584] ? __sb_start_write+0x1a9/0x360 [ 2317.643949] vfs_write+0x20c/0x560 [ 2317.647494] ksys_pwrite64+0x183/0x1c0 [ 2317.651385] ? __ia32_sys_pread64+0xf0/0xf0 [ 2317.655708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2317.660470] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2317.665240] ? do_syscall_64+0x26/0x620 [ 2317.669212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2317.674578] ? do_syscall_64+0x26/0x620 [ 2317.678556] __x64_sys_pwrite64+0x97/0xf0 [ 2317.682707] do_syscall_64+0xfd/0x620 [ 2317.686511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2317.691709] RIP: 0033:0x414017 21:52:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7400000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2317.694903] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2317.713814] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2317.721520] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2317.728782] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2317.736045] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2317.743304] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2317.750582] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:45 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xb8, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x7a00000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2317.857877] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xc2, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2317.903821] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2318.051128] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes [ 2318.077605] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2318.161169] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2318.184463] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:45 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x4f000000) 21:52:45 executing program 1 (fault-call:6 fault-nth:18): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:45 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x9effffff00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2318.321001] FAULT_INJECTION: forcing a failure. [ 2318.321001] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:52:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xde, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2318.443039] net_ratelimit: 24 callbacks suppressed [ 2318.443047] protocol 88fb is buggy, dev hsr_slave_0 [ 2318.453095] protocol 88fb is buggy, dev hsr_slave_1 [ 2318.458179] protocol 88fb is buggy, dev hsr_slave_0 [ 2318.463259] protocol 88fb is buggy, dev hsr_slave_1 [ 2318.503450] CPU: 0 PID: 19521 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2318.510408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2318.517601] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2318.519747] Call Trace: [ 2318.519769] dump_stack+0x172/0x1f0 [ 2318.519787] should_fail.cold+0xa/0x1b [ 2318.529715] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2318.529734] ? __might_sleep+0x95/0x190 [ 2318.537220] __alloc_pages_nodemask+0x1ee/0x750 [ 2318.537234] ? lock_downgrade+0x880/0x880 [ 2318.537250] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2318.546289] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2318.546307] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2318.546324] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2318.555124] alloc_pages_vma+0xdd/0x590 [ 2318.555144] shmem_alloc_page+0xc0/0x180 [ 2318.555158] ? shmem_swapin+0x1a0/0x1a0 [ 2318.564895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2318.564943] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2318.564955] ? __vm_enough_memory+0x324/0x5a0 [ 2318.576117] shmem_alloc_and_acct_page+0x165/0x970 [ 2318.576141] shmem_getpage_gfp+0x44a/0x3640 [ 2318.576183] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2318.584173] ? iov_iter_fault_in_readable+0x367/0x450 [ 2318.584187] ? iov_iter_fault_in_readable+0x377/0x450 [ 2318.584199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2318.584209] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2318.584226] shmem_write_begin+0x10b/0x1e0 [ 2318.593699] generic_perform_write+0x22a/0x520 [ 2318.593721] ? page_endio+0x780/0x780 [ 2318.593733] ? current_time+0x140/0x140 [ 2318.593748] ? lock_acquire+0x16f/0x3f0 [ 2318.603212] __generic_file_write_iter+0x25e/0x630 [ 2318.603231] generic_file_write_iter+0x383/0x72f [ 2318.603247] __vfs_write+0x587/0x810 [ 2318.603262] ? kernel_read+0x120/0x120 [ 2318.612480] ? rcu_read_lock_sched_held+0x110/0x130 [ 2318.612494] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2318.612509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2318.622586] ? __sb_start_write+0x1a9/0x360 [ 2318.622601] vfs_write+0x20c/0x560 [ 2318.622618] ksys_pwrite64+0x183/0x1c0 [ 2318.633309] ? __ia32_sys_pread64+0xf0/0xf0 [ 2318.633324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2318.633337] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2318.633354] ? do_syscall_64+0x26/0x620 [ 2318.642737] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2318.642751] ? do_syscall_64+0x26/0x620 [ 2318.642766] __x64_sys_pwrite64+0x97/0xf0 [ 2318.651128] do_syscall_64+0xfd/0x620 [ 2318.651155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2318.651167] RIP: 0033:0x414017 [ 2318.670772] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2318.672532] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2318.672539] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2318.672555] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2318.681425] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2318.681433] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2318.681439] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2318.681446] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 [ 2318.704493] protocol 88fb is buggy, dev hsr_slave_0 [ 2318.704549] protocol 88fb is buggy, dev hsr_slave_1 [ 2318.704633] protocol 88fb is buggy, dev hsr_slave_0 21:52:46 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xc4eeff7f00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2318.704685] protocol 88fb is buggy, dev hsr_slave_1 21:52:46 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2318.917964] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes [ 2319.403052] protocol 88fb is buggy, dev hsr_slave_0 [ 2319.408261] protocol 88fb is buggy, dev hsr_slave_1 21:52:48 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) vmsplice(0xffffffffffffffff, &(0x7f0000e79000), 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='coredump_filter\x00') ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYRES16, @ANYBLOB="020028bd7000ffdbdf2503"], 0x2}}, 0x800) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:52:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xd8eeff7f00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:48 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:48 executing program 1 (fault-call:6 fault-nth:19): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:48 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x50000000) [ 2320.630420] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2320.691984] FAULT_INJECTION: forcing a failure. [ 2320.691984] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2320.705508] CPU: 0 PID: 19929 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2320.712447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2320.712454] Call Trace: [ 2320.712478] dump_stack+0x172/0x1f0 [ 2320.712497] should_fail.cold+0xa/0x1b [ 2320.731879] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2320.736988] ? __might_sleep+0x95/0x190 [ 2320.740963] __alloc_pages_nodemask+0x1ee/0x750 [ 2320.740979] ? lock_downgrade+0x880/0x880 [ 2320.740997] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2320.749778] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2320.749795] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2320.749808] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2320.770492] alloc_pages_vma+0xdd/0x590 [ 2320.770514] shmem_alloc_page+0xc0/0x180 [ 2320.770529] ? shmem_swapin+0x1a0/0x1a0 [ 2320.778517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2320.778548] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2320.778559] ? __vm_enough_memory+0x324/0x5a0 [ 2320.778581] shmem_alloc_and_acct_page+0x165/0x970 [ 2320.788044] shmem_getpage_gfp+0x44a/0x3640 [ 2320.788075] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2320.788091] ? iov_iter_fault_in_readable+0x367/0x450 [ 2320.797553] ? iov_iter_fault_in_readable+0x377/0x450 [ 2320.797585] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2320.797601] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2320.797621] shmem_write_begin+0x10b/0x1e0 [ 2320.797652] generic_perform_write+0x22a/0x520 [ 2320.806859] ? page_endio+0x780/0x780 [ 2320.806874] ? current_time+0x140/0x140 [ 2320.806891] ? lock_acquire+0x16f/0x3f0 [ 2320.806907] __generic_file_write_iter+0x25e/0x630 [ 2320.806923] generic_file_write_iter+0x383/0x72f [ 2320.816993] __vfs_write+0x587/0x810 [ 2320.817008] ? kernel_read+0x120/0x120 [ 2320.817036] ? rcu_read_lock_sched_held+0x110/0x130 [ 2320.817051] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2320.817065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2320.827740] ? __sb_start_write+0x1a9/0x360 [ 2320.827756] vfs_write+0x20c/0x560 [ 2320.827773] ksys_pwrite64+0x183/0x1c0 [ 2320.827787] ? __ia32_sys_pread64+0xf0/0xf0 [ 2320.827802] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2320.827817] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2320.837197] ? do_syscall_64+0x26/0x620 [ 2320.837211] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2320.837223] ? do_syscall_64+0x26/0x620 [ 2320.837237] __x64_sys_pwrite64+0x97/0xf0 [ 2320.837251] do_syscall_64+0xfd/0x620 [ 2320.845591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2320.845602] RIP: 0033:0x414017 [ 2320.845616] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 21:52:48 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf0ffffff00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2320.845623] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2320.845637] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2320.845643] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2320.845654] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2320.853549] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2320.853557] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 [ 2321.070152] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:52:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0xfc, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, 0x0) r0 = inotify_init1(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = syz_open_dev$dri(0x0, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) dup2(r1, r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r5 = dup(r4) write$FUSE_OPEN(r5, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet6_dccp_int(r5, 0x21, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 21:52:48 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xf97b000000000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:48 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() lookup_dcookie(0x8, 0x0, 0x0) write(r0, &(0x7f00000001c0), 0xfffffef3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2321.341425] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:48 executing program 1 (fault-call:6 fault-nth:20): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:48 executing program 3: mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) r0 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x72109c5fef5d34d3) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) listen(r1, 0x0) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f00009fd000)={0xbffffffffffffffd}, 0x0, 0x1) fcntl$setsig(r0, 0xa, 0x20) inotify_add_watch(r0, &(0x7f00007a7000)='./control\x00', 0xa4000960) open(&(0x7f00003f5000)='./control\x00', 0x0, 0x0) 21:52:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x10e, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:48 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x51000000) 21:52:49 executing program 0: pipe(&(0x7f0000000000)) getpid() lookup_dcookie(0x8, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xffffff7f00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2321.816370] FAULT_INJECTION: forcing a failure. [ 2321.816370] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2321.828170] validate_nla: 3 callbacks suppressed [ 2321.828179] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:49 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r0, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000000)={0x8, 0x8}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYPTR], 0x8) r2 = open(&(0x7f0000000100)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2007ffe) fallocate(r0, 0x100000003, 0x0, 0x28120007) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ftruncate(r3, 0x2007ffe) [ 2321.926313] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2321.944594] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2321.958934] CPU: 0 PID: 20576 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2321.965876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2321.975234] Call Trace: [ 2321.975258] dump_stack+0x172/0x1f0 [ 2321.975280] should_fail.cold+0xa/0x1b [ 2321.975303] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2321.990428] ? __might_sleep+0x95/0x190 [ 2321.990449] __alloc_pages_nodemask+0x1ee/0x750 [ 2321.990463] ? lock_downgrade+0x880/0x880 [ 2321.990480] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2322.008218] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2322.012893] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2322.018422] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2322.018442] alloc_pages_vma+0xdd/0x590 [ 2322.018463] shmem_alloc_page+0xc0/0x180 [ 2322.027938] ? shmem_swapin+0x1a0/0x1a0 [ 2322.027952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2322.027981] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2322.035978] ? __vm_enough_memory+0x324/0x5a0 [ 2322.036002] shmem_alloc_and_acct_page+0x165/0x970 [ 2322.036024] shmem_getpage_gfp+0x44a/0x3640 [ 2322.036052] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2322.046553] ? iov_iter_fault_in_readable+0x367/0x450 [ 2322.046568] ? iov_iter_fault_in_readable+0x377/0x450 [ 2322.046580] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2322.046593] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2322.046612] shmem_write_begin+0x10b/0x1e0 [ 2322.056001] generic_perform_write+0x22a/0x520 [ 2322.056023] ? page_endio+0x780/0x780 [ 2322.056037] ? current_time+0x140/0x140 [ 2322.056053] ? lock_acquire+0x16f/0x3f0 [ 2322.056067] __generic_file_write_iter+0x25e/0x630 [ 2322.065286] generic_file_write_iter+0x383/0x72f [ 2322.065311] __vfs_write+0x587/0x810 [ 2322.065326] ? kernel_read+0x120/0x120 [ 2322.065353] ? rcu_read_lock_sched_held+0x110/0x130 [ 2322.075688] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2322.075702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2322.075716] ? __sb_start_write+0x1a9/0x360 [ 2322.075732] vfs_write+0x20c/0x560 [ 2322.075749] ksys_pwrite64+0x183/0x1c0 [ 2322.086438] ? __ia32_sys_pread64+0xf0/0xf0 21:52:49 executing program 0: pipe(&(0x7f0000000000)) getpid() lookup_dcookie(0x8, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x110, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:49 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xffffffff00000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2322.098993] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2322.099008] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2322.099024] ? do_syscall_64+0x26/0x620 [ 2322.106927] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2322.106941] ? do_syscall_64+0x26/0x620 [ 2322.106959] __x64_sys_pwrite64+0x97/0xf0 [ 2322.116609] do_syscall_64+0xfd/0x620 [ 2322.116626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2322.116638] RIP: 0033:0x414017 [ 2322.124193] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2322.124201] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2322.124214] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2322.124221] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2322.124228] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2322.124238] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2322.151195] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 [ 2322.330570] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes [ 2322.347996] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2322.364678] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2322.372145] audit: type=1804 audit(1573077169.790:273): pid=20753 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir085273999/syzkaller.pLe5XR/3199/bus" dev="sda1" ino=17700 res=1 [ 2322.442063] audit: type=1804 audit(1573077169.790:274): pid=20753 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir085273999/syzkaller.pLe5XR/3199/bus" dev="sda1" ino=17700 res=1 21:52:49 executing program 1 (fault-call:6 fault-nth:21): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:50 executing program 0: pipe(&(0x7f0000000000)) getpid() lookup_dcookie(0x8, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0xfffffffffffff000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2322.547769] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:50 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x52000000) [ 2322.587160] audit: type=1804 audit(1573077169.820:275): pid=20753 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir085273999/syzkaller.pLe5XR/3199/bus" dev="sda1" ino=17700 res=1 [ 2322.625317] FAULT_INJECTION: forcing a failure. [ 2322.625317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 21:52:50 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x100000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$usbfs(&(0x7f00008c7000/0x4000)=nil, 0x4000, 0x2000000, 0xc0010, r2, 0xbd0f) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f0000000700)={0x20}, 0x20) write$selinux_user(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a73657d616e6167655f73746f72655f743a733020ffff7361646d5f7500dd8570f10fbadff35b32826988b696b995016e58c508c170c50b8c0857ef3681b781ba4a3eab2c85262aaee082297deae854f4ef274265583c47dcaa854de651d8702347db3236a4f29488665da9fdd014b4277e65b74da32075d9a210a6febbee17fd4cab664827f8e25f975afd1dcb6a77ff694fbc5100d593828945c7034748c4a778b76d"], 0x2f) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r7 = dup(r6) write$FUSE_OPEN(r7, &(0x7f0000000700)={0x20}, 0x20) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f0000000080), 0x4) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) r8 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 21:52:50 executing program 0: pipe(&(0x7f0000000000)) getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2322.724251] CPU: 1 PID: 21007 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2322.731314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2322.740664] Call Trace: [ 2322.743267] dump_stack+0x172/0x1f0 [ 2322.746904] should_fail.cold+0xa/0x1b [ 2322.750792] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2322.755904] ? __might_sleep+0x95/0x190 [ 2322.759887] __alloc_pages_nodemask+0x1ee/0x750 [ 2322.764552] ? lock_downgrade+0x880/0x880 [ 2322.764570] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2322.764588] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2322.764613] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2322.764624] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2322.764657] alloc_pages_vma+0xdd/0x590 [ 2322.764677] shmem_alloc_page+0xc0/0x180 [ 2322.764690] ? shmem_swapin+0x1a0/0x1a0 [ 2322.764702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2322.764730] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2322.764741] ? __vm_enough_memory+0x324/0x5a0 [ 2322.764763] shmem_alloc_and_acct_page+0x165/0x970 [ 2322.764783] shmem_getpage_gfp+0x44a/0x3640 [ 2322.764811] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2322.764826] ? iov_iter_fault_in_readable+0x367/0x450 [ 2322.764839] ? iov_iter_fault_in_readable+0x377/0x450 [ 2322.764851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2322.764863] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2322.764882] shmem_write_begin+0x10b/0x1e0 [ 2322.764902] generic_perform_write+0x22a/0x520 21:52:50 executing program 0: pipe(&(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x11f, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2322.764923] ? page_endio+0x780/0x780 [ 2322.764937] ? current_time+0x140/0x140 [ 2322.764952] ? lock_acquire+0x16f/0x3f0 [ 2322.764968] __generic_file_write_iter+0x25e/0x630 [ 2322.764985] generic_file_write_iter+0x383/0x72f [ 2322.765004] __vfs_write+0x587/0x810 [ 2322.765019] ? kernel_read+0x120/0x120 [ 2322.765046] ? rcu_read_lock_sched_held+0x110/0x130 [ 2322.765060] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2322.765071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2322.765083] ? __sb_start_write+0x1a9/0x360 21:52:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x2}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2322.765098] vfs_write+0x20c/0x560 [ 2322.765114] ksys_pwrite64+0x183/0x1c0 [ 2322.765128] ? __ia32_sys_pread64+0xf0/0xf0 [ 2322.765141] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2322.765155] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2322.765167] ? do_syscall_64+0x26/0x620 [ 2322.765181] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2322.765193] ? do_syscall_64+0x26/0x620 [ 2322.765219] __x64_sys_pwrite64+0x97/0xf0 [ 2322.765239] do_syscall_64+0xfd/0x620 [ 2322.765254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2322.765265] RIP: 0033:0x414017 21:52:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2322.765277] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2322.765284] RSP: 002b:00007f8eb9e87a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2322.765297] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2322.765304] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000004 [ 2322.765311] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2322.765318] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 2322.765325] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000003 21:52:50 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x54000000) 21:52:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2323.120111] BFS-fs: bfs_fill_super(): Superblock is corrupted [ 2323.136282] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2323.188450] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2323.239736] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:50 executing program 1 (fault-call:6 fault-nth:22): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x122, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:50 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2323.594581] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2323.615787] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2323.630853] FAULT_INJECTION: forcing a failure. [ 2323.630853] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2323.686101] CPU: 0 PID: 21431 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2323.690187] net_ratelimit: 26 callbacks suppressed [ 2323.690194] protocol 88fb is buggy, dev hsr_slave_0 [ 2323.693244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2323.693251] Call Trace: [ 2323.693281] dump_stack+0x172/0x1f0 [ 2323.693301] should_fail.cold+0xa/0x1b [ 2323.698249] protocol 88fb is buggy, dev hsr_slave_1 [ 2323.703219] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2323.703236] ? __might_sleep+0x95/0x190 [ 2323.703254] __alloc_pages_nodemask+0x1ee/0x750 [ 2323.741594] ? lock_downgrade+0x880/0x880 [ 2323.745758] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2323.750775] ? avc_has_perm_noaudit+0x3b6/0x570 [ 2323.755466] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2323.761005] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2323.766545] alloc_pages_vma+0xdd/0x590 [ 2323.770532] shmem_alloc_page+0xc0/0x180 [ 2323.774588] ? shmem_swapin+0x1a0/0x1a0 [ 2323.774601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2323.774626] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2323.789187] ? __vm_enough_memory+0x324/0x5a0 [ 2323.793696] shmem_alloc_and_acct_page+0x165/0x970 [ 2323.798637] shmem_getpage_gfp+0x44a/0x3640 [ 2323.802982] ? shmem_add_to_page_cache+0xd30/0xd30 [ 2323.807901] ? iov_iter_fault_in_readable+0x367/0x450 [ 2323.813174] ? iov_iter_fault_in_readable+0x377/0x450 [ 2323.818360] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2323.823897] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2323.829093] shmem_write_begin+0x10b/0x1e0 21:52:51 executing program 3: pipe(&(0x7f00000006c0)) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) getpid() r2 = socket$inet6(0x10, 0x2, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x358, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, @in6={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x101}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e20, @rand_addr=0xd77}, @in6={0xa, 0x4e22, 0x0, @empty, 0x7}], 0x84) sendmsg(r2, &(0x7f0000000080)={0x0, 0x9000000, &(0x7f0000000300)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a290930206040200000001020040003900090035004c0a0100000019000b4023dc0b04000022dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060c3a62645656", 0x55}], 0x1}, 0x0) [ 2323.833329] generic_perform_write+0x22a/0x520 [ 2323.837918] ? page_endio+0x780/0x780 [ 2323.841718] ? current_time+0x140/0x140 [ 2323.845689] ? lock_acquire+0x16f/0x3f0 [ 2323.849668] __generic_file_write_iter+0x25e/0x630 [ 2323.854604] generic_file_write_iter+0x383/0x72f [ 2323.859387] __vfs_write+0x587/0x810 [ 2323.863100] ? kernel_read+0x120/0x120 [ 2323.867012] ? rcu_read_lock_sched_held+0x110/0x130 [ 2323.872022] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 2323.876770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2323.882306] ? __sb_start_write+0x1a9/0x360 [ 2323.886632] vfs_write+0x20c/0x560 [ 2323.890172] ksys_pwrite64+0x183/0x1c0 [ 2323.894048] ? __ia32_sys_pread64+0xf0/0xf0 [ 2323.898346] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2323.903085] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2323.907816] ? do_syscall_64+0x26/0x620 [ 2323.911765] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2323.917121] ? do_syscall_64+0x26/0x620 [ 2323.921070] __x64_sys_pwrite64+0x97/0xf0 [ 2323.925195] do_syscall_64+0xfd/0x620 [ 2323.928975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2323.934148] RIP: 0033:0x414017 [ 2323.937329] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2323.956209] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2323.963896] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000414017 [ 2323.971144] RDX: 000000000000ff0f RSI: 0000000020000180 RDI: 0000000000000006 [ 2323.978401] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2323.985662] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000006 [ 2323.992906] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 [ 2324.000882] protocol 88fb is buggy, dev hsr_slave_0 [ 2324.006017] protocol 88fb is buggy, dev hsr_slave_1 [ 2324.011158] protocol 88fb is buggy, dev hsr_slave_0 [ 2324.016240] protocol 88fb is buggy, dev hsr_slave_1 21:52:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x4}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:51 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x55000000) [ 2324.056151] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2324.105336] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:52:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x126, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:51 executing program 1 (fault-call:6 fault-nth:23): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2324.291148] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2324.330710] cgroup: fork rejected by pids controller in /syz0 [ 2324.350700] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:51 executing program 3: pipe(&(0x7f00000006c0)) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) getpid() r2 = socket$inet6(0x10, 0x2, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x358, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x13}}, @in6={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x101}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e20, @rand_addr=0xd77}, @in6={0xa, 0x4e22, 0x0, @empty, 0x7}], 0x84) sendmsg(r2, &(0x7f0000000080)={0x0, 0x9000000, &(0x7f0000000300)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a290930206040200000001020040003900090035004c0a0100000019000b4023dc0b04000022dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060c3a62645656", 0x55}], 0x1}, 0x0) [ 2324.442284] FAULT_INJECTION: forcing a failure. [ 2324.442284] name failslab, interval 1, probability 0, space 0, times 0 [ 2324.476162] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:51 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x5}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:51 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:52 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2324.582710] CPU: 0 PID: 21743 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2324.589718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2324.599086] Call Trace: [ 2324.601685] dump_stack+0x172/0x1f0 [ 2324.605320] should_fail.cold+0xa/0x1b [ 2324.609232] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2324.614341] ? lock_downgrade+0x880/0x880 [ 2324.618497] __should_failslab+0x121/0x190 [ 2324.622730] should_failslab+0x9/0x14 [ 2324.626618] kmem_cache_alloc+0x2ae/0x700 21:52:52 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:52:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 2324.630764] ? lock_downgrade+0x880/0x880 [ 2324.634917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2324.640454] ? check_preemption_disabled+0x48/0x290 [ 2324.645469] getname_flags+0xd6/0x5b0 [ 2324.649265] getname+0x1a/0x20 [ 2324.652459] do_sys_open+0x2c9/0x550 [ 2324.656193] ? filp_open+0x80/0x80 [ 2324.659822] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2324.664577] ? do_syscall_64+0x26/0x620 [ 2324.668551] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2324.673916] ? do_syscall_64+0x26/0x620 [ 2324.677895] __x64_sys_open+0x7e/0xc0 21:52:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 2324.681699] do_syscall_64+0xfd/0x620 [ 2324.685507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2324.690694] RIP: 0033:0x413fb1 [ 2324.693887] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2324.712792] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2324.720520] RAX: ffffffffffffffda RBX: 00000000200000a8 RCX: 0000000000413fb1 21:52:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 2324.727786] RDX: 00007f8eb9ea8b0a RSI: 0000000000000002 RDI: 00007f8eb9ea8b00 [ 2324.735049] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2324.742401] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 2324.749668] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[], 0x0) [ 2324.786221] protocol 88fb is buggy, dev hsr_slave_0 [ 2324.791397] protocol 88fb is buggy, dev hsr_slave_1 [ 2324.796524] protocol 88fb is buggy, dev hsr_slave_0 [ 2324.801657] protocol 88fb is buggy, dev hsr_slave_1 [ 2324.885475] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:52 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x56000000) 21:52:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[], 0x0) 21:52:52 executing program 1 (fault-call:6 fault-nth:24): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x134, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:52 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x6}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:52 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa687aabff2d5d65c, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r4, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000200)) lsetxattr$security_smack_transmute(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000580)='TRUE', 0x4, 0x3) add_key$user(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000480)=@in6={0xa, 0x4e20, 0x0, @local}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1}, 0x20) r5 = msgget$private(0x0, 0x23cea33ffd51e6f6) r6 = getuid() lstat(&(0x7f0000000280)='./bus\x00', &(0x7f00000009c0)) geteuid() r7 = msgget$private(0x0, 0x23cea33ffd51e6f6) r8 = getuid() r9 = geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) msgctl$IPC_SET(r7, 0x1, &(0x7f0000000440)={{0x0, r8, 0x0, r9, 0x0, 0x20}, 0x0, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r10}) r11 = msgget$private(0x0, 0x23cea33ffd51e6f6) r12 = getuid() r13 = geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) msgctl$IPC_SET(r11, 0x1, &(0x7f0000000440)={{0x0, r12, 0x0, r13, 0x0, 0x20}, 0x0, 0x2, 0x4, 0x6c5, 0x400, 0x5bd2, r14}) setreuid(r8, r13) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000f80)=ANY=[@ANYBLOB="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", @ANYRES32], 0x11d) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c80)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000440)={{0x0, r6, 0xffffffffffffffff, r16, 0x0, 0xa0, 0x739}, 0x100000001, 0x2, 0x6, 0x0, 0x403, 0x5bd2, r15}) dup2(r2, r0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000500)=[&(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='\'\x00', &(0x7f0000000b00)='h\xe0\xd2\x7f\x14\xb3g\xd9\xdd\xa6\x84\xdb,6\x11forS\xc3=A\x10\'\xb3Sp\xcf\xa9\xb9A\x90\x86Gv1\xbf^vb\xab\x80H\x9bV\'\x8b\x8a|Hq\xc4\x1a\xf7\xb6\x06\x18\xb4\xe5\xa2b\xf8\xf4\x80\"a\xd6U', &(0x7f0000000940)='selinux+\xf2r>vt1proctrustedppp0\x00H\"\xda\xda\xa5\x92\xc5\x91.h\x18\xa2\x8b\xf1\xd5\xf0P\xbd\xd3A\xd29;\xd3\xfb\xe7\x1b\x96\x85\x8a\xbf9\xd4\xf6@M\xc7\xa4\xf90\xd7&\x1d\x1b\x01e\x83\xd8', &(0x7f0000000240)='ppp0{\x9e[proc\x00', &(0x7f0000000700)='%userppp1user][selfvboxnet0wlan1usereth1eth1bdevwlan0@selinux\x00'], &(0x7f00000006c0)=[&(0x7f0000000b80)='TR\x8d\xbe;\xd1/\xf7\xfb3\x1d\x87\x88\x8c\x95UEJH\xe8i\xe8\x16\x1aA5/Q\nC\x16()4\x8b\x1b{\xa2@x\xd2\xc4D\xf4\xa2~\xdc\x01n\xb0\\\xa8\xa6\xa9\xcd\x0e\xba)\xf0\xa7\x9a\xe5+\xe1g>\xe0\x83\x86L\xee\xd0U\x98@O\xcb7i\x94Z\xec\xe9\xa5\x8d\xb53\x95\xd5+5{i\xf2\xf1\xee\x1f\xb4\xfa\xaa\xf3\xd6=@?\xd7\x9fk\x99\xa5UrQ1\x02\xb8\x8b\xbdR\xfd\x1c\n1\xea\x9f\xce\xd2a7\f\x97\xf0&\xe5\xd8WrYwaj\xcf\x95\x9e\xd9\xe0\xa7%E\x06Pq2&|)U\xa9\xb9*\x8ab=\x1e{\xe0f\xf2\xa4\xb1r\x19 )\\z@\x16\xb9\xda\x173\x85}-\xc118\x8e\xc2\x8dc\xc2e\x01D\xaf\xec\x80.\xbd\xae\x9f\xd4F\xa6\x85\xb4\xcf\'z\xff\xf7\x11\xe9\x11\xa0Bu0r\xd4\xfb\xe3\xf3\xe2\x80\x84~\xf3\x19\xc4\x9b3\xafM\xbe\x91d\xf2', &(0x7f00000005c0)='-\x00', &(0x7f0000000ac0)='%userppp1user][selfvboxnet0wlan1usereth1eth1bdevwlan0@selinux\x00', &(0x7f0000000680)='\'\x00']) [ 2325.240663] FAULT_INJECTION: forcing a failure. [ 2325.240663] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2325.252610] CPU: 1 PID: 22005 Comm: syz-executor.1 Not tainted 4.19.82 #0 [ 2325.259594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2325.268948] Call Trace: [ 2325.271543] dump_stack+0x172/0x1f0 [ 2325.275181] should_fail.cold+0xa/0x1b [ 2325.279084] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2325.284207] ? mark_held_locks+0x100/0x100 [ 2325.288451] __alloc_pages_nodemask+0x1ee/0x750 [ 2325.293127] ? __alloc_pages_slowpath+0x2870/0x2870 [ 2325.298144] ? find_held_lock+0x35/0x130 [ 2325.302219] cache_grow_begin+0x91/0x8c0 [ 2325.306279] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2325.311819] ? check_preemption_disabled+0x48/0x290 [ 2325.316848] kmem_cache_alloc+0x63b/0x700 [ 2325.321024] ? lock_downgrade+0x880/0x880 [ 2325.325184] getname_flags+0xd6/0x5b0 [ 2325.329013] getname+0x1a/0x20 [ 2325.332209] do_sys_open+0x2c9/0x550 [ 2325.335923] ? filp_open+0x80/0x80 [ 2325.339464] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2325.344218] ? do_syscall_64+0x26/0x620 [ 2325.348187] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2325.353552] ? do_syscall_64+0x26/0x620 [ 2325.357530] __x64_sys_open+0x7e/0xc0 [ 2325.361337] do_syscall_64+0xfd/0x620 [ 2325.365145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2325.370331] RIP: 0033:0x413fb1 [ 2325.371908] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2325.373520] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2325.373529] RSP: 002b:00007f8eb9ea8a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2325.373543] RAX: ffffffffffffffda RBX: 00000000200000a8 RCX: 0000000000413fb1 [ 2325.373554] RDX: 00007f8eb9ea8b0a RSI: 0000000000000002 RDI: 00007f8eb9ea8b00 21:52:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[], 0x0) [ 2325.373562] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2325.373569] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000006 [ 2325.373575] R13: 00000000004c9a0e R14: 00000000004e16f8 R15: 0000000000000005 21:52:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x140, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8800, 0x0) read$FUSE(r2, &(0x7f0000000580), 0x1000) open_by_handle_at(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="0800100002000400"], 0x0) 21:52:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x1) [ 2325.654838] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:52:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x7}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x1) [ 2325.865971] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:53 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x58000000) 21:52:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x142, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x1) 21:52:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x50, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x1c, r4, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7c}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x1) r5 = dup(r2) r6 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xfffffffd, @dev={0xfe, 0x80, [], 0x20}, 0x3d}, {0xa, 0x4e24, 0x9, @rand_addr="d7f3cb1a23e881efc5448313cbe2a61c", 0x400}, r7, 0x6}}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001480)={&(0x7f0000000200)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05000000000000000000010000000000000008410000004c0018000000006962000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000033"], 0x68}}, 0x0) 21:52:53 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0xa}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f"], 0x1) [ 2326.472325] IPVS: Error joining to the multicast group 21:52:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x144, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2326.530123] BFS-fs: bfs_fill_super(): Cannot allocate 8254062 bytes 21:52:54 executing program 3: close(0xffffffffffffffff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='io.max\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/61, 0x3d}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f00000002c0), 0x186) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40c00, 0x0) r1 = socket(0xa, 0x3, 0x8) r2 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r4 = gettid() waitid(0x83b895581628fca4, r4, &(0x7f0000000040), 0x2, &(0x7f0000000480)) r5 = socket$inet(0x2, 0x3, 0x800000800000001) getsockopt$inet_mreqsrc(r5, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) sendmsg$key(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32=r5, @ANYRESHEX=r3, @ANYRESDEC=r4]], 0x8}}, 0x20004850) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) getsockopt$netrom_NETROM_N2(r6, 0x103, 0x3, &(0x7f0000000200)=0x8, &(0x7f0000000240)=0x4) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r3, 0x1}}, 0x10) 21:52:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f"], 0x1) 21:52:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='\nfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:54 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0xe}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2326.862931] validate_nla: 6 callbacks suppressed [ 2326.862943] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:54 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x59000000) 21:52:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f"], 0x1) 21:52:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x14a, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:54 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0xf}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @my=0x1}, 0x10, 0x80000) setsockopt$sock_void(r1, 0x1, 0x9, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, 0x6}, @IFLA_LINKINFO={0x20, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x10, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x48}}, 0x0) 21:52:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='%fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2327.332095] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2327.412866] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 2327.437409] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074f"], 0x1) [ 2327.470030] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074f"], 0x1) 21:52:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x154, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:55 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = dup(r0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7}}, 0x0, 0xffffffffffffffff, r3, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r5 = dup(r4) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(0xffffffffffffffff, 0xc008551b, &(0x7f00000001c0)={0x1, 0x8, [0x80000001, 0xffffffa0]}) write$FUSE_OPEN(r5, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f0000000040)={@rand_addr, @loopback}, &(0x7f0000000140)=0xc) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) [ 2327.797843] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074f"], 0x1) 21:52:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='b\ns\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2327.893694] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:55 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x5a000000) 21:52:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x14}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x15c, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c"], 0x1) 21:52:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000004c0)="f21d8385fff33477", 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000940)}], 0x1}, 0x0) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) bind$netlink(r3, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfd, 0x82000}, 0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) sendmmsg(0xffffffffffffffff, &(0x7f0000002f00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000940)="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", 0x7f0}], 0x1}}], 0x1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 21:52:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c"], 0x1) [ 2328.359976] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2328.437948] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2328.492146] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x168, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c"], 0x1) 21:52:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x48}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='b%s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:56 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001500)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000014c0)=0xb86) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:52:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c0000000000"], 0x1) [ 2328.831738] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2328.923197] net_ratelimit: 24 callbacks suppressed [ 2328.923204] protocol 88fb is buggy, dev hsr_slave_0 [ 2328.928346] protocol 88fb is buggy, dev hsr_slave_1 [ 2328.938440] protocol 88fb is buggy, dev hsr_slave_0 [ 2328.943526] protocol 88fb is buggy, dev hsr_slave_1 [ 2329.029645] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:56 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x5c000000) 21:52:56 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x4c}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c0000000000"], 0x1) 21:52:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x182, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='b.s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2329.243063] protocol 88fb is buggy, dev hsr_slave_0 [ 2329.248271] protocol 88fb is buggy, dev hsr_slave_1 [ 2329.253474] protocol 88fb is buggy, dev hsr_slave_0 [ 2329.258560] protocol 88fb is buggy, dev hsr_slave_1 21:52:56 executing program 3: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x271ea3ad, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x141c2) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x2, 0x1) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000180)={0x101, 0x31, 0x27e5, 0x10000000}) r1 = memfd_create(&(0x7f00000001c0)='nodev\x00', 0x3) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r5 = dup(r4) write$FUSE_OPEN(r5, &(0x7f0000000700)={0x20}, 0x20) pipe(&(0x7f00000003c0)) socket$inet_tcp(0x2, 0x1, 0x0) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r7 = dup(r6) write$FUSE_OPEN(r7, &(0x7f0000000700)={0x20}, 0x20) getsockopt$ARPT_SO_GET_REVISION_TARGET(r7, 0x0, 0x63, 0x0, 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x81805) creat(0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, 0x0) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r8, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000000)) sendto$inet(r8, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000002c0)={0x9}, 0x4) pipe(&(0x7f0000000300)) r9 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r9) r10 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r10) flock(r10, 0xf) r11 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r12 = dup(r11) write$FUSE_OPEN(r12, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet_sctp_SCTP_NODELAY(r12, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000240)=0x35f) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r8, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 2329.358926] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c0000000000"], 0x1) 21:52:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x196, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x60}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c0000000000000040"], 0x1) [ 2329.734861] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a2, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c0000000000000040"], 0x1) [ 2329.946885] protocol 88fb is buggy, dev hsr_slave_0 [ 2329.952039] protocol 88fb is buggy, dev hsr_slave_1 21:52:57 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x5e000000) 21:52:57 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x68}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='b/s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c0000000000000040"], 0x1) 21:52:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1a7, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:57 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000640)={0xc8, {{0x2, 0x4e21, @local}}, 0x0, 0x4, [{{0x2, 0x4e21, @empty}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e20, @multicast1}}]}, 0x290) writev(r0, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe0064e200000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e0000000000", 0x46}], 0x1) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000440)=""/84, 0x54, 0x0, 0x0, 0x0) r2 = add_key$keyring(0x0, &(0x7f0000000080)={'s=\xc6', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x02', 0x0, &(0x7f0000000340)="04", 0xfffff, r2) keyctl$instantiate(0xc, 0x0, &(0x7f0000000800)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'ppp0:cpuset,em1wlan1^-wlan0^]', 0x20, 0x4000000009}, 0x47, r2) r3 = add_key$keyring(0x0, &(0x7f0000000080)={'s=\xc6', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x02', 0x0, &(0x7f0000000340)="04", 0xfffff, r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000800)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'ppp0:cpuset,em1wlan1^-wlan0^]', 0x20, 0x4000000009}, 0x47, r3) r4 = add_key$keyring(0x0, &(0x7f0000000080)={'s=\xc6', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x02', 0x0, &(0x7f0000000340)="04", 0xfffff, r4) keyctl$instantiate(0xc, 0x0, &(0x7f0000000800)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'ppp0:cpuset,em1wlan1^-wlan0^]', 0x20, 0x4000000009}, 0x47, r4) request_key(&(0x7f00000002c0)='syzkaller\x00', &(0x7f0000000300)={'\x00\x1d\x00', 0x3}, &(0x7f0000000380)=']].\x00', r4) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001600)='/dev/rfkill\x00', 0x20000, 0x0) ppoll(&(0x7f0000001640)=[{r5}], 0x1, &(0x7f0000001680), 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r5, 0xc0046686, &(0x7f00000004c0)={0x3, 0xfe, "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"}) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r6 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) mount(&(0x7f0000000940)=ANY=[], &(0x7f00000000c0)='./bus\x00', &(0x7f0000000240)='\xa8!\xa7l0\x8fE\x1c\xb3\xac\xce\xe5\xb7\xac\x17\x0ef+x\xff0\x18\fbvX\x99 \x10\a\xc2\x8c\xb1\xe5\xd8OK=\x04\xbf\x9dDT\x91\xb8LA\x87;\xd4\xc3\x1d\xed_\x13\x859K\xf7\x94P\xb6\xc4\x98\xe1\xa9\\\xf0\xfc', 0x20, &(0x7f0000000900)) write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0xfffffff4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/keycreate\x00', 0x2, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) link(&(0x7f0000000040)='./bus\x00', &(0x7f0000000100)='./bus\x00') syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x88000) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x440100, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TIOCSLCKTRMIOS(r8, 0x5457, &(0x7f00000001c0)) 21:52:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000"], 0x1) [ 2330.592845] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000"], 0x1) 21:52:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bf\n\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1b6, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:58 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x6c}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1c0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2331.096816] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:52:58 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x60000000) 21:52:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x4, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000180)) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r3) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @adiantum, 0x2, [], "893fa597f4fb4b49e1d71f11534df230"}) socket(0x0, 0x6, 0x1) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000040)=0xe9b, 0x4) dup2(r0, r1) 21:52:58 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x74}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1c2, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:58 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bf#\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:52:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000"], 0x1) 21:52:59 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2331.662819] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2331.756057] FAULT_INJECTION: forcing a failure. [ 2331.756057] name failslab, interval 1, probability 0, space 0, times 0 [ 2331.788955] CPU: 1 PID: 25166 Comm: syz-executor.0 Not tainted 4.19.82 #0 [ 2331.795906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2331.805251] Call Trace: [ 2331.807829] dump_stack+0x172/0x1f0 [ 2331.811453] should_fail.cold+0xa/0x1b [ 2331.815326] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2331.820422] ? lock_downgrade+0x880/0x880 [ 2331.824557] __should_failslab+0x121/0x190 [ 2331.828791] should_failslab+0x9/0x14 [ 2331.832577] kmem_cache_alloc_node_trace+0x274/0x720 [ 2331.837671] ? lock_downgrade+0x880/0x880 [ 2331.841819] __kmalloc_node+0x3d/0x80 [ 2331.845656] kvmalloc_node+0xbd/0x100 [ 2331.849532] xt_alloc_table_info+0x41/0xa0 [ 2331.853795] do_ip6t_set_ctl+0x25a/0x498 [ 2331.857846] ? compat_do_ip6t_set_ctl+0x160/0x160 [ 2331.862693] ? mutex_unlock+0xd/0x10 [ 2331.866386] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 2331.871642] nf_setsockopt+0x77/0xd0 [ 2331.875350] ipv6_setsockopt+0x13e/0x170 [ 2331.879413] tcp_setsockopt+0x8f/0xe0 [ 2331.883203] sock_common_setsockopt+0x94/0xd0 [ 2331.887693] __sys_setsockopt+0x17a/0x280 [ 2331.891820] ? kernel_accept+0x310/0x310 [ 2331.895864] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2331.900600] ? do_syscall_64+0x26/0x620 [ 2331.904555] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2331.909892] ? do_syscall_64+0x26/0x620 [ 2331.913848] __x64_sys_setsockopt+0xbe/0x150 [ 2331.918236] do_syscall_64+0xfd/0x620 [ 2331.922016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2331.927183] RIP: 0033:0x45a219 [ 2331.930372] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2331.949254] RSP: 002b:00007fc3513b7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2331.956941] RAX: ffffffffffffffda RBX: 00007fc3513b7c90 RCX: 000000000045a219 [ 2331.964190] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 2331.971439] RBP: 000000000075bf20 R08: 0000000000000001 R09: 0000000000000000 [ 2331.978689] R10: 0000000020000240 R11: 0000000000000246 R12: 00007fc3513b86d4 [ 2331.985955] R13: 00000000004d0230 R14: 00000000004df268 R15: 0000000000000004 21:52:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1d0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:52:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x7a}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:52:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x4, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000180)) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r3) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @adiantum, 0x2, [], "893fa597f4fb4b49e1d71f11534df230"}) socket(0x0, 0x6, 0x1) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, &(0x7f0000000040)=0xe9b, 0x4) dup2(r0, r1) 21:52:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2332.191082] validate_nla: 14 callbacks suppressed [ 2332.191090] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:59 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bf%\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2332.313563] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:52:59 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x64000000) 21:52:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x6, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1da, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bf*\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0xf0}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2332.760925] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:00 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x143042, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1800007, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r3, 0xc004ae02, &(0x7f0000000080)) write$P9_RMKNOD(r2, &(0x7f0000000080)={0x14}, 0x14) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x6e00) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r5 = dup(r4) write$FUSE_OPEN(r5, &(0x7f0000000700)={0x20}, 0x20) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r7 = dup(r6) write$FUSE_OPEN(r7, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x0, 0x2, [0x0, 0x2]}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000100)={r8, 0x6, 0x6, 0x100}, 0x10) [ 2332.911008] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:00 executing program 3: madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@initr0, @ldst={0x3, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffec}]}, 0x0, 0x0, 0xe1, &(0x7f0000000200)=""/225, 0x0, 0x6, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x4, 0x0, 0xffffffff, 0x78}, 0x10}, 0x70) signalfd4(r1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) 21:53:00 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bf+\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1e0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x300}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2333.284583] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2333.505152] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:01 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x65000000) 21:53:01 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x88, 0x67, &(0x7f0000000040)=r1, 0x4) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) sendmsg$kcm(r3, &(0x7f0000000480)={&(0x7f0000000080)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x4, 0x2}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="aa6b2e92c19d4148671e25ce3f2f4e548c15b808db459432cea9e8877fa93cf73fa4dd3fdf75051032ca5c0d21937b6b721ee795426bb6dd0fa6e9e90e26f2f1c89441c0f6e4b60a7b7636c9a02f4658", 0x50}, {&(0x7f0000000180)="d0dc452fbec9049bc113e1e9fcad5c3b1376088815ad7460a0d25cca626cde7f424bdfbf38264a1490115d6f8a064181e526079fd6512890cf354987b6a16f12c28987bcd7f411e6e3395472d6d431a29c62393389888bba17a838ecc7206039e98c3ac0e92b2ee6030d9526d0c27aa49c48602c6d120a7ee1c2d81e3eae24a1673a7cf82c381b802f1b", 0x8a}, {}, {&(0x7f0000000540)="37c374cc230ddae1ea1d44497b496e9c1ed68934fea426bc9ad115c53a024176d28c7ff9ec6676f29fc1ade331bc34a468826bdd987175691ed982f1375541c551596ae6fd0b46faf9a2ae52a35a433eb5fcbfa4fd0840d605264f7e86fcd3aba801b9d014a79307b063b415e7c6782f53cb53ca9dc23f075e6161c9849ad429af9186cb84fbe60aa118c9557467391e606b9168743046ab4d4ed9b0845030aa56f7aa363f92939518cd6ba5086fbe66ea4a160e86c669e86dce1a8853445344c1f3ef7d61813eff8f980809a018f4e81eb731753e7a6fee561e9e299d4ad535913805395fc3fea88eddbe70aa2b2fdbd5d4fab0", 0xf4}, {&(0x7f0000000340)="3feb16f6d4da55564d906c44bf4b3ce4d453583e8a0cdc5598fcef36c0a8fc0a7a79b1eadfc036267774923123b63ad41756da8ff6f88ab443074a1adf17f79e556707a27a63a83fc96e0619d3d936a7b0c58054449ef45af60075711edcdc65bac0739f7e4433740d9d486ce406b7ddd2679cd1d2adbcaeb6fee4686e088cc4059b9efc04bf53f50b", 0x89}, {&(0x7f0000000400)="9b32bce80e468eb0b5569a53", 0xc}], 0x6, &(0x7f0000000640)}, 0x0) 21:53:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x1f0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bf-\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x500}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r2) write$binfmt_elf64(r1, &(0x7f0000000600)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES16=r2, @ANYPTR64, @ANYRES16, @ANYPTR, @ANYRES16]], 0x8) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) [ 2333.910152] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2333.962364] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2334.043040] net_ratelimit: 26 callbacks suppressed [ 2334.043047] protocol 88fb is buggy, dev hsr_slave_0 [ 2334.053174] protocol 88fb is buggy, dev hsr_slave_1 [ 2334.110823] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x6, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x210, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x600}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2334.363048] protocol 88fb is buggy, dev hsr_slave_0 [ 2334.368152] protocol 88fb is buggy, dev hsr_slave_1 [ 2334.373300] protocol 88fb is buggy, dev hsr_slave_0 [ 2334.378343] protocol 88fb is buggy, dev hsr_slave_1 21:53:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bf.\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2334.403197] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:02 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x65580000) [ 2334.583075] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2334.604363] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r1) write$selinux_access(r1, &(0x7f0000000100)={'system_u:object_r:klogd_exec_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x800}, 0x47) getdents64(r0, &(0x7f0000000080)=""/102, 0x66) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 21:53:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x220, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:02 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x700}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2335.015719] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bf0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:02 executing program 3: r0 = socket(0x10, 0x803, 0x2) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000013000101000000000000ddff07000011a2e25cd29bd16945e36af12fdf33e977c033d8c49239b71369cf6c9b222cc2506c913b52d2fcca7462a44e", @ANYRES32=0x0, @ANYBLOB="5e3f00000000000837b5b512f5af5599e0a250427fc3f793b71f9e3d5692e683b5ba555c99ae9760a7bc79fe7d3f1e12a48ee4d10d854246d9b9b972304ad56b0e4c532daa3fece7da5500"/90], 0x3}, 0x1, 0x0, 0x0, 0x85}, 0x0) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="278814f9bbd52485cedc0d4ccdc09c00ee8643ef8d3cd6ec7b49fdd674661de2fe2f1aafd227864f43de85cba69a2cdfce8a3866bdccd643d4309e16a97a7cd1790c8ccd696c6de464303cf4d87cb01427d50922c0e6a301fe1ad88ac867e74558298b7f68ad7597a7a27bdf775cf62d86af4468c257afe662c97b3f031257c5fa227cd92f1f163112e50a75a3b5108a02a41695124346c2a0877a6b9b7c6f2749ba5635328d7c261662195d948b425aedd2c1672590ab9b2a06ac5dfe331f1dca00c08ce564e745b44736d2c226605eccf738", 0xd3, 0x0) [ 2335.221957] protocol 88fb is buggy, dev hsr_slave_0 [ 2335.227088] protocol 88fb is buggy, dev hsr_slave_1 [ 2335.232163] protocol 88fb is buggy, dev hsr_slave_0 [ 2335.237248] protocol 88fb is buggy, dev hsr_slave_1 21:53:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x22d, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:02 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0xa00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2335.487946] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:02 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x66000000) 21:53:03 executing program 3: symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x5fa1fe290dac506) symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000008c0)='./file1\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r2, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 21:53:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfX\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x11, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x230, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0xe00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:03 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = syz_open_dev$dmmidi(0x0, 0x800, 0x193000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x800, 0x70bd2d, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_ALGID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x40016) syz_read_part_table(0x6c00000000000000, 0x3e, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000f00000a07000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000300000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000001c0)=""/240) 21:53:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x12, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x234, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0xf00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x240, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:03 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x68000000) 21:53:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x1400}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfc\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2336.609722] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x250, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:04 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = syz_open_dev$dmmidi(0x0, 0x800, 0x193000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x800, 0x70bd2d, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_ALGID={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x40016) syz_read_part_table(0x6c00000000000000, 0x3e, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000f00000a07000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000300000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000001c0)=""/240) 21:53:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfd\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x2000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x252, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2337.264911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2337.270268] validate_nla: 11 callbacks suppressed [ 2337.270277] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2337.400222] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:04 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x3f00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:05 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x6b6b6b00) 21:53:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfi\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x270, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2337.638682] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x17, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2337.813628] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:05 executing program 3: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x220000, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000280)={0x6, 0xa8000000, {0x52, 0xe3, 0x5, {0x3, 0xf392}, {0x3, 0x3}, @ramp={0x9, 0xa5, {0x7ff, 0x5, 0x4, 0x3}}}, {0x55, 0x2, 0x9, {0x1f, 0x1}, {0x5, 0x82d}, @const={0x8, {0x4, 0x9, 0x3eb6, 0xff}}}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda06", 0x10}], 0x1) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x1) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='ramfs\x00\xa1B\x83\xde\x94\x8b0\xc6\x1e\x92r\xbbQ\xa1\xcd\x01^\x96Ut\xca\xab\xd2{)G\x9d<\xd6H\xba\x0e}d\x87\xcaU3\x06n\xc5\xb7\xffC\x92\xbb\x95T\x13m\x17\xb2`\xb4dL\rS\"^pK\xc9\xa0\x806v\xb5QZ0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x4800}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x18, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfl\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x272, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2338.129713] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x4c00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2338.270880] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:05 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0x5420, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0x5420, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, 0x11, 0xffffffffffffffff, 0x0) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) finit_module(r1, &(0x7f0000000000)='bdev\x00', 0x2) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x4000000) pipe(&(0x7f0000000140)) r2 = socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000300)=0xa23eb1885f34d60b, 0x4) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc00800}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, 0x0, 0x0, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000050) ftruncate(r4, 0x80006) sendfile(r3, r4, 0x0, 0x8000fffffffe) r5 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x7fffffff, 0x80884) setsockopt$inet_MCAST_MSFILTER(r5, 0x0, 0x30, 0x0, 0x0) 21:53:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2338.458443] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:06 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x6c000000) 21:53:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfo\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x278, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x6000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2338.960901] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2338.982417] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:06 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfp\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) dup(r3) r4 = fcntl$dupfd(r3, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 21:53:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2339.111755] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:06 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x6800}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x282, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2339.323058] net_ratelimit: 24 callbacks suppressed [ 2339.323065] protocol 88fb is buggy, dev hsr_slave_0 [ 2339.333271] protocol 88fb is buggy, dev hsr_slave_1 [ 2339.338376] protocol 88fb is buggy, dev hsr_slave_0 [ 2339.343478] protocol 88fb is buggy, dev hsr_slave_1 [ 2339.380419] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@ipv6_getaddr={0x2c, 0x16, 0x9d9c9eb493a0b8e3, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @mcast1}]}, 0x2c}}, 0x0) [ 2339.521269] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2339.643068] protocol 88fb is buggy, dev hsr_slave_0 [ 2339.648182] protocol 88fb is buggy, dev hsr_slave_1 [ 2339.653350] protocol 88fb is buggy, dev hsr_slave_0 [ 2339.658435] protocol 88fb is buggy, dev hsr_slave_1 21:53:07 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x6d020000) 21:53:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x6c00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfu\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x286, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2339.840333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x8000}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r3 = dup(r2) write$FUSE_OPEN(r3, &(0x7f0000000700)={0x20}, 0x20) r4 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x81, 0x2002) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xe8) sendmsg$nl_route_sched(r4, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xe4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@gettclass={0x28, 0x2a, 0x100, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r5, {0xf, 0x3}, {0x4, 0xb}, {0x7, 0xfff1}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r6, 0x9, 0x8}, 0xc) recvmmsg(r1, &(0x7f0000000000)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x2000, &(0x7f0000008000)={0x0, 0x989680}) 21:53:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:07 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfx\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:07 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x7400}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2340.283020] protocol 88fb is buggy, dev hsr_slave_0 [ 2340.288281] protocol 88fb is buggy, dev hsr_slave_1 21:53:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x294, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:07 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) setpgid(r0, 0x0) [ 2340.433637] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x23, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:08 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x74000000) 21:53:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x7a00}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2a0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2a, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2340.898180] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:08 executing program 3: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r1 = dup(r0) write$FUSE_OPEN(r1, &(0x7f0000000700)={0x20}, 0x20) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000080)={{0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x3, 'lc\x00', 0x6166db6f99bf0e65, 0xffffffff, 0x40003a}, {@multicast2, 0x4e20, 0x2000, 0x7ff, 0x80000001, 0x5}}, 0x44) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000000)="240000005a001f000307f4f9002304000a04f51108000200020100020800038005000000", 0x24) 21:53:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x7bf9}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2a5, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:08 executing program 3: unshare(0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000400), 0x1}, 0x0, 0x0, 0x6, 0x0, 0x10000008}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') chroot(&(0x7f00000002c0)='./file0\x00') ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0xd466) r1 = socket$inet6(0xa, 0x803, 0x3) syz_mount_image$btrfs(&(0x7f0000000080)='bt`fs\x00', 0x0, 0x0, 0x0, 0x0, 0x14, &(0x7f0000001780)=ANY=[@ANYRESOCT=r0]) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8938, &(0x7f0000000200)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_settings={0x3, 0x401, @fr_pvc=&(0x7f0000000280)={0x200}}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000340)="dd4041833681286bade7440066d9eecc", 0x10) ioctl$sock_ifreq(r3, 0x0, &(0x7f0000000240)={'\x00', @ifru_addrs=@vsock={0x28, 0x0, 0x2710, @hyper}}) r4 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0xd8, 0x8000) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000003c0)='lp\x00', 0x3) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x18, &(0x7f0000000300)=0x5, 0x4) [ 2341.424504] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2341.635932] bridge0: port 3(gretap0) entered disabled state [ 2341.641958] bridge0: port 2(bridge_slave_1) entered disabled state [ 2341.648461] bridge0: port 1(bridge_slave_0) entered disabled state 21:53:09 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x7a000000) 21:53:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2b4, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0xf000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x04', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x05', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="50506a23b6d8114bb5", @ANYRES16=r4, @ANYBLOB="01000000000000010000140000904c00070008000200000000007c9a47356e54adf8f03324a83132c15f39c2c51c4f85888f5c1a9381bdbafb393f0645a4a13e0129b9090f02651bd869d7d0a33fd29ce74e8244ad55a9f3c54db7f5ea9c273a4ac720ed80ce17883b36d23e1ee199d60dafb5050fdf09a111fda8531900c4b1061e03cc14904eda3a1519b17531b552c0dcf380c41de89f93b330f34600a146507d3cd59b71ed9e0bb8521f"], 0x20}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)={0x240, r4, 0x20, 0x0, 0x40000000, {0x6}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe0000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8d}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6eea}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x10000, @local, 0x8}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffe00000}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}]}, @TIPC_NLA_LINK={0x128, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x63}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfe57}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x92af}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8676}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x217}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}]}, 0x240}}, 0x0) [ 2342.317493] validate_nla: 8 callbacks suppressed [ 2342.317502] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:09 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0xf97b}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x06', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2d, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2342.421599] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2c2, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2342.691080] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:10 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x81000000) [ 2342.831945] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\a', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2e, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x34000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2342.976859] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2d2, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2343.221219] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\b', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2343.320849] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2f, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2343.520687] netlink: 'syz-executor.5': attribute type 7 has an invalid length. 21:53:11 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) ppoll(&(0x7f0000000000)=[{r0, 0x8}, {r0, 0x20}, {r0, 0x124}, {r0, 0x140}, {r0}, {r0, 0x4000}, {r0}], 0x7, &(0x7f0000000040), 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) pipe(&(0x7f0000000140)) bind$isdn_base(0xffffffffffffffff, &(0x7f0000000080)={0x22, 0x7, 0x7, 0x4, 0xf3}, 0x6) 21:53:11 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x400300}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2f2, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:11 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x88a8ffff) 21:53:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\t', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) [ 2344.320529] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2344.320572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2344.399954] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2344.443051] net_ratelimit: 26 callbacks suppressed [ 2344.443057] protocol 88fb is buggy, dev hsr_slave_0 [ 2344.453084] protocol 88fb is buggy, dev hsr_slave_1 21:53:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\n', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2f6, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0xf0ffff}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) [ 2344.695352] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2344.763062] protocol 88fb is buggy, dev hsr_slave_0 [ 2344.768305] protocol 88fb is buggy, dev hsr_slave_1 [ 2344.773477] protocol 88fb is buggy, dev hsr_slave_0 [ 2344.778561] protocol 88fb is buggy, dev hsr_slave_1 21:53:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x32, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_OPEN(r2, &(0x7f0000000700)={0x20}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @empty}}, [0x1, 0x80000000, 0x1, 0x100, 0x101, 0x1, 0x200, 0x8, 0x5, 0x2, 0x8, 0xfffffffffffffc01, 0x2, 0xffffffff, 0x1]}, &(0x7f00000001c0)=0x100) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e21, 0x1ff, @mcast1, 0x8}}}, 0x84) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) r5 = dup(r4) write$FUSE_OPEN(r5, &(0x7f0000000700)={0x20}, 0x20) getsockopt$IP_VS_SO_GET_VERSION(r5, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) [ 2344.865874] netlink: 'syz-executor.5': attribute type 7 has an invalid length. [ 2344.873542] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2f8, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x1000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) 21:53:12 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x9effffff) 21:53:12 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x0e', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x2fe, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) [ 2345.342566] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2345.563061] protocol 88fb is buggy, dev hsr_slave_0 [ 2345.568216] protocol 88fb is buggy, dev hsr_slave_1 [ 2345.573348] protocol 88fb is buggy, dev hsr_slave_0 [ 2345.578428] protocol 88fb is buggy, dev hsr_slave_1 21:53:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_FILTERING={0x8, 0x7, 0x1}]}}}]}, 0x3c}}, 0x0) 21:53:13 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000220001041100"/20], 0x14}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@acquire={0x128, 0x17, 0x7, 0x0, 0x0, {{@in=@remote}, @in6=@mcast2, {@in=@dev, @in=@local, 0x2}, {{@in6=@ipv4={[], [], @local}, @in=@dev, 0x0, 0x0, 0xfffc}, {0x0, 0x0, 0x0, 0x2000000}, {}, 0x0, 0x0, 0x0, 0x1}}}, 0x128}, 0x8}, 0x0) 21:53:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x35, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2345.778119] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 21:53:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="8be571ccc6deb1796405faffe1ff0fa7", 0x10}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x10', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1b40dce4fb40dc", 0xff0f}], 0x3, 0x0) 21:53:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="6d616e676c650000000000000000000000181b526bb5957004b38e0000000000000000000000000000001f00000006000000a005000058024f9f80a3306e074fd9ab0d7bd0d93c7d71c54c000000000000004000b0"], 0x1) [ 2348.999499] IPVS: ftp: loaded support on port[0] = 21 [ 2349.723043] net_ratelimit: 24 callbacks suppressed [ 2349.723051] protocol 88fb is buggy, dev hsr_slave_0 [ 2349.733108] protocol 88fb is buggy, dev hsr_slave_1 [ 2349.738192] protocol 88fb is buggy, dev hsr_slave_0 [ 2349.743273] protocol 88fb is buggy, dev hsr_slave_1 [ 2349.986676] chnl_net:caif_netlink_parms(): no params data found [ 2350.043078] protocol 88fb is buggy, dev hsr_slave_0 [ 2350.048181] protocol 88fb is buggy, dev hsr_slave_1 [ 2350.053303] protocol 88fb is buggy, dev hsr_slave_0 [ 2350.058377] protocol 88fb is buggy, dev hsr_slave_1 [ 2350.282828] bridge0: port 1(bridge_slave_0) entered blocking state [ 2350.299652] bridge0: port 1(bridge_slave_0) entered disabled state [ 2350.310543] device bridge_slave_0 entered promiscuous mode [ 2350.543173] device gretap0 left promiscuous mode [ 2350.548101] bridge0: port 3(gretap0) entered disabled state [ 2350.599581] bridge0: port 2(bridge_slave_1) entered blocking state [ 2350.630071] bridge0: port 2(bridge_slave_1) entered disabled state [ 2350.641971] device bridge_slave_1 entered promiscuous mode [ 2350.763064] protocol 88fb is buggy, dev hsr_slave_0 [ 2350.768240] protocol 88fb is buggy, dev hsr_slave_1 [ 2350.884946] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2350.896049] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2351.123289] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2351.132159] team0: Port device team_slave_0 added [ 2351.138724] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2351.150210] team0: Port device team_slave_1 added [ 2351.168833] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2351.194371] device bridge_slave_1 left promiscuous mode [ 2351.199885] bridge0: port 2(bridge_slave_1) entered disabled state [ 2351.265190] device bridge_slave_0 left promiscuous mode [ 2351.270712] bridge0: port 1(bridge_slave_0) entered disabled state [ 2354.923046] net_ratelimit: 24 callbacks suppressed [ 2354.923055] protocol 88fb is buggy, dev hsr_slave_0 [ 2354.933192] protocol 88fb is buggy, dev hsr_slave_1 [ 2355.163093] protocol 88fb is buggy, dev hsr_slave_0 [ 2355.168286] protocol 88fb is buggy, dev hsr_slave_1 [ 2355.963031] protocol 88fb is buggy, dev hsr_slave_0 [ 2355.968211] protocol 88fb is buggy, dev hsr_slave_1 [ 2355.973327] protocol 88fb is buggy, dev hsr_slave_0 [ 2355.978358] protocol 88fb is buggy, dev hsr_slave_1 [ 2356.293039] protocol 88fb is buggy, dev hsr_slave_0 [ 2356.298229] protocol 88fb is buggy, dev hsr_slave_1 [ 2360.123048] net_ratelimit: 18 callbacks suppressed [ 2360.123074] protocol 88fb is buggy, dev hsr_slave_0 [ 2360.133114] protocol 88fb is buggy, dev hsr_slave_1 [ 2360.138180] protocol 88fb is buggy, dev hsr_slave_0 [ 2360.143242] protocol 88fb is buggy, dev hsr_slave_1 [ 2360.443046] protocol 88fb is buggy, dev hsr_slave_0 [ 2360.448252] protocol 88fb is buggy, dev hsr_slave_1 [ 2360.453402] protocol 88fb is buggy, dev hsr_slave_0 [ 2360.458451] protocol 88fb is buggy, dev hsr_slave_1 [ 2361.163045] protocol 88fb is buggy, dev hsr_slave_0 [ 2361.168226] protocol 88fb is buggy, dev hsr_slave_1 [ 2365.323030] net_ratelimit: 22 callbacks suppressed [ 2365.323038] protocol 88fb is buggy, dev hsr_slave_0 [ 2365.333072] protocol 88fb is buggy, dev hsr_slave_1 [ 2365.563057] protocol 88fb is buggy, dev hsr_slave_0 [ 2365.568254] protocol 88fb is buggy, dev hsr_slave_1 [ 2366.363042] protocol 88fb is buggy, dev hsr_slave_0 [ 2366.368233] protocol 88fb is buggy, dev hsr_slave_1 [ 2366.373360] protocol 88fb is buggy, dev hsr_slave_0 [ 2366.378406] protocol 88fb is buggy, dev hsr_slave_1 [ 2366.693059] protocol 88fb is buggy, dev hsr_slave_0 [ 2366.698169] protocol 88fb is buggy, dev hsr_slave_1 [ 2370.523054] net_ratelimit: 18 callbacks suppressed [ 2370.523061] protocol 88fb is buggy, dev hsr_slave_0 [ 2370.533157] protocol 88fb is buggy, dev hsr_slave_1 [ 2370.538353] protocol 88fb is buggy, dev hsr_slave_0 [ 2370.543445] protocol 88fb is buggy, dev hsr_slave_1 [ 2370.843030] protocol 88fb is buggy, dev hsr_slave_0 [ 2370.848242] protocol 88fb is buggy, dev hsr_slave_1 [ 2370.853373] protocol 88fb is buggy, dev hsr_slave_0 [ 2370.858437] protocol 88fb is buggy, dev hsr_slave_1 [ 2371.563056] protocol 88fb is buggy, dev hsr_slave_0 [ 2371.568243] protocol 88fb is buggy, dev hsr_slave_1 [ 2375.723059] net_ratelimit: 22 callbacks suppressed [ 2375.723067] protocol 88fb is buggy, dev hsr_slave_0 [ 2375.733214] protocol 88fb is buggy, dev hsr_slave_1 [ 2375.973072] protocol 88fb is buggy, dev hsr_slave_0 [ 2375.978184] protocol 88fb is buggy, dev hsr_slave_1 [ 2376.763031] protocol 88fb is buggy, dev hsr_slave_0 [ 2376.768220] protocol 88fb is buggy, dev hsr_slave_1 [ 2376.773343] protocol 88fb is buggy, dev hsr_slave_0 [ 2376.778438] protocol 88fb is buggy, dev hsr_slave_1 [ 2377.083057] protocol 88fb is buggy, dev hsr_slave_0 [ 2377.088194] protocol 88fb is buggy, dev hsr_slave_1 [ 2380.923033] net_ratelimit: 18 callbacks suppressed [ 2380.923041] protocol 88fb is buggy, dev hsr_slave_0 [ 2380.933174] protocol 88fb is buggy, dev hsr_slave_1 [ 2380.938351] protocol 88fb is buggy, dev hsr_slave_0 [ 2380.943452] protocol 88fb is buggy, dev hsr_slave_1 [ 2381.243035] protocol 88fb is buggy, dev hsr_slave_0 [ 2381.248217] protocol 88fb is buggy, dev hsr_slave_1 [ 2381.253345] protocol 88fb is buggy, dev hsr_slave_0 [ 2381.258370] protocol 88fb is buggy, dev hsr_slave_1 [ 2381.963042] protocol 88fb is buggy, dev hsr_slave_0 [ 2381.968219] protocol 88fb is buggy, dev hsr_slave_1 [ 2386.123029] net_ratelimit: 22 callbacks suppressed [ 2386.123037] protocol 88fb is buggy, dev hsr_slave_0 [ 2386.133069] protocol 88fb is buggy, dev hsr_slave_1 [ 2386.363052] protocol 88fb is buggy, dev hsr_slave_0 [ 2386.368223] protocol 88fb is buggy, dev hsr_slave_1 [ 2387.163059] protocol 88fb is buggy, dev hsr_slave_0 [ 2387.168280] protocol 88fb is buggy, dev hsr_slave_1 [ 2387.173397] protocol 88fb is buggy, dev hsr_slave_0 [ 2387.178429] protocol 88fb is buggy, dev hsr_slave_1 [ 2387.483093] protocol 88fb is buggy, dev hsr_slave_0 [ 2387.488206] protocol 88fb is buggy, dev hsr_slave_1 [ 2391.323077] net_ratelimit: 18 callbacks suppressed [ 2391.323086] protocol 88fb is buggy, dev hsr_slave_0 [ 2391.333397] protocol 88fb is buggy, dev hsr_slave_1 [ 2391.338682] protocol 88fb is buggy, dev hsr_slave_0 [ 2391.343770] protocol 88fb is buggy, dev hsr_slave_1 [ 2391.643079] protocol 88fb is buggy, dev hsr_slave_0 [ 2391.648246] protocol 88fb is buggy, dev hsr_slave_1 [ 2391.653608] protocol 88fb is buggy, dev hsr_slave_0 [ 2391.658699] protocol 88fb is buggy, dev hsr_slave_1 [ 2392.363065] protocol 88fb is buggy, dev hsr_slave_0 [ 2392.368231] protocol 88fb is buggy, dev hsr_slave_1 [ 2396.533081] net_ratelimit: 22 callbacks suppressed [ 2396.533090] protocol 88fb is buggy, dev hsr_slave_0 [ 2396.543208] protocol 88fb is buggy, dev hsr_slave_1 [ 2396.763128] protocol 88fb is buggy, dev hsr_slave_0 [ 2396.768286] protocol 88fb is buggy, dev hsr_slave_1 [ 2397.563076] protocol 88fb is buggy, dev hsr_slave_0 [ 2397.568222] protocol 88fb is buggy, dev hsr_slave_1 [ 2397.573376] protocol 88fb is buggy, dev hsr_slave_0 [ 2397.578551] protocol 88fb is buggy, dev hsr_slave_1 [ 2397.883119] protocol 88fb is buggy, dev hsr_slave_0 [ 2397.888264] protocol 88fb is buggy, dev hsr_slave_1 [ 2401.733086] net_ratelimit: 18 callbacks suppressed [ 2401.733095] protocol 88fb is buggy, dev hsr_slave_0 [ 2401.743249] protocol 88fb is buggy, dev hsr_slave_1 [ 2401.748408] protocol 88fb is buggy, dev hsr_slave_0 [ 2401.753710] protocol 88fb is buggy, dev hsr_slave_1 [ 2402.043075] protocol 88fb is buggy, dev hsr_slave_0 [ 2402.048228] protocol 88fb is buggy, dev hsr_slave_1 [ 2402.053402] protocol 88fb is buggy, dev hsr_slave_0 [ 2402.058549] protocol 88fb is buggy, dev hsr_slave_1 [ 2402.763079] protocol 88fb is buggy, dev hsr_slave_0 [ 2402.768222] protocol 88fb is buggy, dev hsr_slave_1 [ 2406.923097] net_ratelimit: 22 callbacks suppressed [ 2406.923106] protocol 88fb is buggy, dev hsr_slave_0 [ 2406.933296] protocol 88fb is buggy, dev hsr_slave_1 [ 2407.163122] protocol 88fb is buggy, dev hsr_slave_0 [ 2407.168402] protocol 88fb is buggy, dev hsr_slave_1 [ 2407.963082] protocol 88fb is buggy, dev hsr_slave_0 [ 2407.968265] protocol 88fb is buggy, dev hsr_slave_1 [ 2407.973646] protocol 88fb is buggy, dev hsr_slave_0 [ 2407.978724] protocol 88fb is buggy, dev hsr_slave_1 [ 2408.283124] protocol 88fb is buggy, dev hsr_slave_0 [ 2408.288257] protocol 88fb is buggy, dev hsr_slave_1 [ 2412.123051] net_ratelimit: 18 callbacks suppressed [ 2412.123058] protocol 88fb is buggy, dev hsr_slave_0 [ 2412.133196] protocol 88fb is buggy, dev hsr_slave_1 [ 2412.138288] protocol 88fb is buggy, dev hsr_slave_0 [ 2412.143376] protocol 88fb is buggy, dev hsr_slave_1 [ 2412.453046] protocol 88fb is buggy, dev hsr_slave_0 [ 2412.458277] protocol 88fb is buggy, dev hsr_slave_1 [ 2412.463399] protocol 88fb is buggy, dev hsr_slave_0 [ 2412.468434] protocol 88fb is buggy, dev hsr_slave_1 [ 2413.163049] protocol 88fb is buggy, dev hsr_slave_0 [ 2413.168241] protocol 88fb is buggy, dev hsr_slave_1 [ 2417.323035] net_ratelimit: 22 callbacks suppressed [ 2417.323042] protocol 88fb is buggy, dev hsr_slave_0 [ 2417.333173] protocol 88fb is buggy, dev hsr_slave_1 [ 2417.563076] protocol 88fb is buggy, dev hsr_slave_0 [ 2417.568268] protocol 88fb is buggy, dev hsr_slave_1 [ 2418.363034] protocol 88fb is buggy, dev hsr_slave_0 [ 2418.368217] protocol 88fb is buggy, dev hsr_slave_1 [ 2418.373332] protocol 88fb is buggy, dev hsr_slave_0 [ 2418.378360] protocol 88fb is buggy, dev hsr_slave_1 [ 2418.683180] protocol 88fb is buggy, dev hsr_slave_0 [ 2418.688314] protocol 88fb is buggy, dev hsr_slave_1 [ 2422.523045] net_ratelimit: 18 callbacks suppressed [ 2422.523052] protocol 88fb is buggy, dev hsr_slave_0 [ 2422.533365] protocol 88fb is buggy, dev hsr_slave_1 [ 2422.538444] protocol 88fb is buggy, dev hsr_slave_0 [ 2422.543507] protocol 88fb is buggy, dev hsr_slave_1 [ 2422.843068] protocol 88fb is buggy, dev hsr_slave_0 [ 2422.848270] protocol 88fb is buggy, dev hsr_slave_1 [ 2422.853396] protocol 88fb is buggy, dev hsr_slave_0 [ 2422.858458] protocol 88fb is buggy, dev hsr_slave_1 [ 2423.563035] protocol 88fb is buggy, dev hsr_slave_0 [ 2423.568124] protocol 88fb is buggy, dev hsr_slave_1 [ 2427.723052] net_ratelimit: 22 callbacks suppressed [ 2427.723061] protocol 88fb is buggy, dev hsr_slave_0 [ 2427.733095] protocol 88fb is buggy, dev hsr_slave_1 [ 2427.963071] protocol 88fb is buggy, dev hsr_slave_0 [ 2427.968284] protocol 88fb is buggy, dev hsr_slave_1 [ 2428.763084] protocol 88fb is buggy, dev hsr_slave_0 [ 2428.768205] protocol 88fb is buggy, dev hsr_slave_1 [ 2428.773310] protocol 88fb is buggy, dev hsr_slave_0 [ 2428.778359] protocol 88fb is buggy, dev hsr_slave_1 [ 2429.083050] protocol 88fb is buggy, dev hsr_slave_0 [ 2429.088247] protocol 88fb is buggy, dev hsr_slave_1 [ 2432.926896] net_ratelimit: 18 callbacks suppressed [ 2432.926903] protocol 88fb is buggy, dev hsr_slave_0 [ 2432.937019] protocol 88fb is buggy, dev hsr_slave_1 [ 2432.942095] protocol 88fb is buggy, dev hsr_slave_0 [ 2432.947154] protocol 88fb is buggy, dev hsr_slave_1 [ 2433.243058] protocol 88fb is buggy, dev hsr_slave_0 [ 2433.248274] protocol 88fb is buggy, dev hsr_slave_1 [ 2433.253371] protocol 88fb is buggy, dev hsr_slave_0 [ 2433.258397] protocol 88fb is buggy, dev hsr_slave_1 [ 2433.963042] protocol 88fb is buggy, dev hsr_slave_0 [ 2433.968256] protocol 88fb is buggy, dev hsr_slave_1 [ 2438.123040] net_ratelimit: 22 callbacks suppressed [ 2438.123048] protocol 88fb is buggy, dev hsr_slave_0 [ 2438.133196] protocol 88fb is buggy, dev hsr_slave_1 [ 2438.363107] protocol 88fb is buggy, dev hsr_slave_0 [ 2438.368301] protocol 88fb is buggy, dev hsr_slave_1 [ 2439.163036] protocol 88fb is buggy, dev hsr_slave_0 [ 2439.168232] protocol 88fb is buggy, dev hsr_slave_1 [ 2439.173328] protocol 88fb is buggy, dev hsr_slave_0 [ 2439.178362] protocol 88fb is buggy, dev hsr_slave_1 [ 2439.483092] protocol 88fb is buggy, dev hsr_slave_0 [ 2439.488333] protocol 88fb is buggy, dev hsr_slave_1 [ 2443.323085] net_ratelimit: 18 callbacks suppressed [ 2443.323094] protocol 88fb is buggy, dev hsr_slave_0 [ 2443.333192] protocol 88fb is buggy, dev hsr_slave_1 [ 2443.338294] protocol 88fb is buggy, dev hsr_slave_0 [ 2443.343372] protocol 88fb is buggy, dev hsr_slave_1 [ 2443.643051] protocol 88fb is buggy, dev hsr_slave_0 [ 2443.648161] protocol 88fb is buggy, dev hsr_slave_1 [ 2443.653314] protocol 88fb is buggy, dev hsr_slave_0 [ 2443.658350] protocol 88fb is buggy, dev hsr_slave_1 [ 2444.363051] protocol 88fb is buggy, dev hsr_slave_0 [ 2444.368158] protocol 88fb is buggy, dev hsr_slave_1 [ 2448.523052] net_ratelimit: 22 callbacks suppressed [ 2448.523060] protocol 88fb is buggy, dev hsr_slave_0 [ 2448.533130] protocol 88fb is buggy, dev hsr_slave_1 [ 2448.773053] protocol 88fb is buggy, dev hsr_slave_0 [ 2448.778173] protocol 88fb is buggy, dev hsr_slave_1 [ 2449.563052] protocol 88fb is buggy, dev hsr_slave_0 [ 2449.568153] protocol 88fb is buggy, dev hsr_slave_1 [ 2449.573268] protocol 88fb is buggy, dev hsr_slave_0 [ 2449.578324] protocol 88fb is buggy, dev hsr_slave_1 [ 2449.893046] protocol 88fb is buggy, dev hsr_slave_0 [ 2449.898242] protocol 88fb is buggy, dev hsr_slave_1 [ 2453.723029] net_ratelimit: 18 callbacks suppressed [ 2453.723036] protocol 88fb is buggy, dev hsr_slave_0 [ 2453.733176] protocol 88fb is buggy, dev hsr_slave_1 [ 2453.738243] protocol 88fb is buggy, dev hsr_slave_0 [ 2453.743304] protocol 88fb is buggy, dev hsr_slave_1 [ 2454.053037] protocol 88fb is buggy, dev hsr_slave_0 [ 2454.058240] protocol 88fb is buggy, dev hsr_slave_1 [ 2454.063360] protocol 88fb is buggy, dev hsr_slave_0 [ 2454.068388] protocol 88fb is buggy, dev hsr_slave_1 [ 2454.763035] protocol 88fb is buggy, dev hsr_slave_0 [ 2454.768130] protocol 88fb is buggy, dev hsr_slave_1 [ 2458.923048] net_ratelimit: 22 callbacks suppressed [ 2458.923056] protocol 88fb is buggy, dev hsr_slave_0 [ 2458.933108] protocol 88fb is buggy, dev hsr_slave_1 [ 2459.163075] protocol 88fb is buggy, dev hsr_slave_0 [ 2459.168184] protocol 88fb is buggy, dev hsr_slave_1 [ 2459.963041] protocol 88fb is buggy, dev hsr_slave_0 [ 2459.968247] protocol 88fb is buggy, dev hsr_slave_1 [ 2459.973360] protocol 88fb is buggy, dev hsr_slave_0 [ 2459.978404] protocol 88fb is buggy, dev hsr_slave_1 [ 2460.283059] protocol 88fb is buggy, dev hsr_slave_0 [ 2460.288168] protocol 88fb is buggy, dev hsr_slave_1 [ 2464.123034] net_ratelimit: 18 callbacks suppressed [ 2464.123041] protocol 88fb is buggy, dev hsr_slave_0 [ 2464.133168] protocol 88fb is buggy, dev hsr_slave_1 [ 2464.138269] protocol 88fb is buggy, dev hsr_slave_0 [ 2464.143327] protocol 88fb is buggy, dev hsr_slave_1 [ 2464.453049] protocol 88fb is buggy, dev hsr_slave_0 [ 2464.458259] protocol 88fb is buggy, dev hsr_slave_1 [ 2464.463495] protocol 88fb is buggy, dev hsr_slave_0 [ 2464.468548] protocol 88fb is buggy, dev hsr_slave_1 [ 2465.163037] protocol 88fb is buggy, dev hsr_slave_0 [ 2465.168245] protocol 88fb is buggy, dev hsr_slave_1 [ 2469.323036] net_ratelimit: 22 callbacks suppressed [ 2469.323044] protocol 88fb is buggy, dev hsr_slave_0 [ 2469.333159] protocol 88fb is buggy, dev hsr_slave_1 [ 2469.563068] protocol 88fb is buggy, dev hsr_slave_0 [ 2469.568198] protocol 88fb is buggy, dev hsr_slave_1 [ 2470.363038] protocol 88fb is buggy, dev hsr_slave_0 [ 2470.368157] protocol 88fb is buggy, dev hsr_slave_1 [ 2470.373294] protocol 88fb is buggy, dev hsr_slave_0 [ 2470.378326] protocol 88fb is buggy, dev hsr_slave_1 [ 2470.683056] protocol 88fb is buggy, dev hsr_slave_0 [ 2470.688250] protocol 88fb is buggy, dev hsr_slave_1 [ 2474.523058] net_ratelimit: 18 callbacks suppressed [ 2474.523065] protocol 88fb is buggy, dev hsr_slave_0 [ 2474.533139] protocol 88fb is buggy, dev hsr_slave_1 [ 2474.538213] protocol 88fb is buggy, dev hsr_slave_0 [ 2474.543288] protocol 88fb is buggy, dev hsr_slave_1 [ 2474.843086] protocol 88fb is buggy, dev hsr_slave_0 [ 2474.848301] protocol 88fb is buggy, dev hsr_slave_1 [ 2474.853440] protocol 88fb is buggy, dev hsr_slave_0 [ 2474.858501] protocol 88fb is buggy, dev hsr_slave_1 [ 2475.563042] protocol 88fb is buggy, dev hsr_slave_0 [ 2475.568161] protocol 88fb is buggy, dev hsr_slave_1 [ 2479.723054] net_ratelimit: 22 callbacks suppressed [ 2479.723061] protocol 88fb is buggy, dev hsr_slave_0 [ 2479.733130] protocol 88fb is buggy, dev hsr_slave_1 [ 2479.963099] protocol 88fb is buggy, dev hsr_slave_0 [ 2479.968204] protocol 88fb is buggy, dev hsr_slave_1 [ 2480.763038] protocol 88fb is buggy, dev hsr_slave_0 [ 2480.768249] protocol 88fb is buggy, dev hsr_slave_1 [ 2480.773377] protocol 88fb is buggy, dev hsr_slave_0 [ 2480.778413] protocol 88fb is buggy, dev hsr_slave_1 [ 2481.083037] protocol 88fb is buggy, dev hsr_slave_0 [ 2481.088121] protocol 88fb is buggy, dev hsr_slave_1 [ 2484.933049] net_ratelimit: 18 callbacks suppressed [ 2484.933058] protocol 88fb is buggy, dev hsr_slave_0 [ 2484.943191] protocol 88fb is buggy, dev hsr_slave_1 [ 2484.948246] protocol 88fb is buggy, dev hsr_slave_0 [ 2484.953322] protocol 88fb is buggy, dev hsr_slave_1 [ 2485.243034] protocol 88fb is buggy, dev hsr_slave_0 [ 2485.248216] protocol 88fb is buggy, dev hsr_slave_1 [ 2485.253433] protocol 88fb is buggy, dev hsr_slave_0 [ 2485.258476] protocol 88fb is buggy, dev hsr_slave_1 [ 2485.963046] protocol 88fb is buggy, dev hsr_slave_0 [ 2485.968154] protocol 88fb is buggy, dev hsr_slave_1 [ 2490.123054] net_ratelimit: 22 callbacks suppressed [ 2490.123062] protocol 88fb is buggy, dev hsr_slave_0 [ 2490.133310] protocol 88fb is buggy, dev hsr_slave_1 [ 2490.363082] protocol 88fb is buggy, dev hsr_slave_0 [ 2490.368275] protocol 88fb is buggy, dev hsr_slave_1 [ 2491.163062] protocol 88fb is buggy, dev hsr_slave_0 [ 2491.168276] protocol 88fb is buggy, dev hsr_slave_1 [ 2491.173388] protocol 88fb is buggy, dev hsr_slave_0 [ 2491.178409] protocol 88fb is buggy, dev hsr_slave_1 [ 2491.483113] protocol 88fb is buggy, dev hsr_slave_0 [ 2491.488213] protocol 88fb is buggy, dev hsr_slave_1 [ 2495.323052] net_ratelimit: 18 callbacks suppressed [ 2495.323060] protocol 88fb is buggy, dev hsr_slave_0 [ 2495.333298] protocol 88fb is buggy, dev hsr_slave_1 [ 2495.338345] protocol 88fb is buggy, dev hsr_slave_0 [ 2495.343518] protocol 88fb is buggy, dev hsr_slave_1 [ 2495.643045] protocol 88fb is buggy, dev hsr_slave_0 [ 2495.648205] protocol 88fb is buggy, dev hsr_slave_1 [ 2495.653294] protocol 88fb is buggy, dev hsr_slave_0 [ 2495.658327] protocol 88fb is buggy, dev hsr_slave_1 [ 2496.363044] protocol 88fb is buggy, dev hsr_slave_0 [ 2496.368248] protocol 88fb is buggy, dev hsr_slave_1 [ 2500.523032] net_ratelimit: 22 callbacks suppressed [ 2500.523039] protocol 88fb is buggy, dev hsr_slave_0 [ 2500.533212] protocol 88fb is buggy, dev hsr_slave_1 [ 2500.763088] protocol 88fb is buggy, dev hsr_slave_0 [ 2500.768289] protocol 88fb is buggy, dev hsr_slave_1 [ 2501.563049] protocol 88fb is buggy, dev hsr_slave_0 [ 2501.568158] protocol 88fb is buggy, dev hsr_slave_1 [ 2501.573300] protocol 88fb is buggy, dev hsr_slave_0 [ 2501.578324] protocol 88fb is buggy, dev hsr_slave_1 [ 2501.883066] protocol 88fb is buggy, dev hsr_slave_0 [ 2501.888294] protocol 88fb is buggy, dev hsr_slave_1 [ 2505.723030] net_ratelimit: 18 callbacks suppressed [ 2505.723038] protocol 88fb is buggy, dev hsr_slave_0 [ 2505.733180] protocol 88fb is buggy, dev hsr_slave_1 [ 2505.738257] protocol 88fb is buggy, dev hsr_slave_0 [ 2505.743349] protocol 88fb is buggy, dev hsr_slave_1 [ 2506.043053] protocol 88fb is buggy, dev hsr_slave_0 [ 2506.048251] protocol 88fb is buggy, dev hsr_slave_1 [ 2506.053385] protocol 88fb is buggy, dev hsr_slave_0 [ 2506.058428] protocol 88fb is buggy, dev hsr_slave_1 [ 2506.763072] protocol 88fb is buggy, dev hsr_slave_0 [ 2506.768180] protocol 88fb is buggy, dev hsr_slave_1 [ 2510.923095] net_ratelimit: 22 callbacks suppressed [ 2510.923104] protocol 88fb is buggy, dev hsr_slave_0 [ 2510.933240] protocol 88fb is buggy, dev hsr_slave_1 [ 2511.163053] protocol 88fb is buggy, dev hsr_slave_0 [ 2511.168160] protocol 88fb is buggy, dev hsr_slave_1 [ 2511.963091] protocol 88fb is buggy, dev hsr_slave_0 [ 2511.966319] INFO: task kworker/1:4:29095 blocked for more than 140 seconds. [ 2511.968280] protocol 88fb is buggy, dev hsr_slave_1 [ 2511.980463] protocol 88fb is buggy, dev hsr_slave_0 [ 2511.985531] protocol 88fb is buggy, dev hsr_slave_1 [ 2511.985549] Not tainted 4.19.82 #0 [ 2512.008526] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2512.020731] kworker/1:4 D26528 29095 2 0x80000000 [ 2512.047257] Workqueue: events switchdev_deferred_process_work [ 2512.059773] Call Trace: [ 2512.062377] __schedule+0x866/0x1dc0 [ 2512.086593] ? __mutex_lock+0x721/0x1300 [ 2512.090686] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2512.095972] ? kasan_check_read+0x11/0x20 [ 2512.100126] schedule+0x92/0x1c0 [ 2512.103748] schedule_preempt_disabled+0x13/0x20 [ 2512.108506] __mutex_lock+0x726/0x1300 [ 2512.112392] ? rtnl_lock+0x17/0x20 [ 2512.116193] ? mutex_trylock+0x1e0/0x1e0 [ 2512.120267] ? process_one_work+0x890/0x1750 [ 2512.124943] ? find_held_lock+0x35/0x130 [ 2512.129006] ? process_one_work+0x890/0x1750 [ 2512.133642] ? __lock_is_held+0xb6/0x140 [ 2512.137714] mutex_lock_nested+0x16/0x20 [ 2512.141771] ? mutex_lock_nested+0x16/0x20 [ 2512.146245] rtnl_lock+0x17/0x20 [ 2512.149613] switchdev_deferred_process_work+0xe/0x20 [ 2512.155086] process_one_work+0x989/0x1750 [ 2512.159330] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2512.164278] ? lock_acquire+0x16f/0x3f0 [ 2512.168269] ? kasan_check_write+0x14/0x20 [ 2512.172493] ? do_raw_spin_lock+0xc8/0x240 [ 2512.177034] worker_thread+0x98/0xe40 [ 2512.180852] kthread+0x354/0x420 [ 2512.184457] ? process_one_work+0x1750/0x1750 [ 2512.188953] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2512.198485] ret_from_fork+0x24/0x30 [ 2512.203657] INFO: task kworker/0:1:2408 blocked for more than 140 seconds. [ 2512.210669] Not tainted 4.19.82 #0 [ 2512.214939] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2512.222897] kworker/0:1 D27928 2408 2 0x80000000 [ 2512.230922] Workqueue: events linkwatch_event [ 2512.239959] Call Trace: [ 2512.242630] __schedule+0x866/0x1dc0 [ 2512.248103] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2512.253365] ? kasan_check_read+0x11/0x20 [ 2512.257522] schedule+0x92/0x1c0 [ 2512.260894] schedule_preempt_disabled+0x13/0x20 [ 2512.265935] __mutex_lock+0x726/0x1300 [ 2512.269839] ? rtnl_lock+0x17/0x20 [ 2512.273674] ? mutex_trylock+0x1e0/0x1e0 [ 2512.277739] ? process_one_work+0x890/0x1750 [ 2512.282147] ? find_held_lock+0x35/0x130 [ 2512.283030] protocol 88fb is buggy, dev hsr_slave_0 [ 2512.286477] ? process_one_work+0x890/0x1750 [ 2512.291235] protocol 88fb is buggy, dev hsr_slave_1 [ 2512.295836] ? __lock_is_held+0xb6/0x140 [ 2512.304913] mutex_lock_nested+0x16/0x20 [ 2512.309190] ? mutex_lock_nested+0x16/0x20 [ 2512.313673] rtnl_lock+0x17/0x20 [ 2512.317042] linkwatch_event+0xf/0x70 [ 2512.320840] process_one_work+0x989/0x1750 [ 2512.325418] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2512.330090] ? lock_acquire+0x16f/0x3f0 [ 2512.334325] ? kasan_check_write+0x14/0x20 [ 2512.338559] ? do_raw_spin_lock+0xc8/0x240 [ 2512.342788] worker_thread+0x98/0xe40 [ 2512.346832] ? trace_hardirqs_on+0x67/0x220 [ 2512.351176] kthread+0x354/0x420 [ 2512.356099] ? process_one_work+0x1750/0x1750 [ 2512.360602] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2512.373144] ret_from_fork+0x24/0x30 [ 2512.376972] INFO: task syz-executor.3:3040 blocked for more than 140 seconds. [ 2512.392982] Not tainted 4.19.82 #0 [ 2512.397041] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2512.405292] syz-executor.3 D24152 3040 1 0x00000004 [ 2512.410923] Call Trace: [ 2512.413748] __schedule+0x866/0x1dc0 [ 2512.417468] ? __mutex_lock+0x721/0x1300 [ 2512.422944] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2512.444354] ? kasan_check_read+0x11/0x20 [ 2512.448513] schedule+0x92/0x1c0 [ 2512.451876] schedule_preempt_disabled+0x13/0x20 [ 2512.456973] __mutex_lock+0x726/0x1300 [ 2512.460913] ? rtnetlink_rcv_msg+0x40a/0xb00 [ 2512.465593] ? __lock_acquire+0x6ee/0x49c0 [ 2512.469835] ? mutex_trylock+0x1e0/0x1e0 [ 2512.478839] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 2512.483629] ? lock_downgrade+0x880/0x880 [ 2512.487783] mutex_lock_nested+0x16/0x20 [ 2512.491853] ? mutex_lock_nested+0x16/0x20 [ 2512.497605] rtnetlink_rcv_msg+0x40a/0xb00 [ 2512.501859] ? rtnetlink_put_metrics+0x560/0x560 [ 2512.506998] ? netlink_deliver_tap+0x22d/0xc20 [ 2512.511595] ? find_held_lock+0x35/0x130 [ 2512.515949] netlink_rcv_skb+0x17d/0x460 [ 2512.520063] ? rtnetlink_put_metrics+0x560/0x560 [ 2512.526342] ? netlink_ack+0xb30/0xb30 [ 2512.531405] ? kasan_check_read+0x11/0x20 [ 2512.561743] ? netlink_deliver_tap+0x254/0xc20 [ 2512.566700] rtnetlink_rcv+0x1d/0x30 [ 2512.570413] netlink_unicast+0x537/0x720 [ 2512.591879] ? netlink_attachskb+0x770/0x770 [ 2512.599522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2512.612527] netlink_sendmsg+0x8ae/0xd70 [ 2512.619741] ? netlink_unicast+0x720/0x720 [ 2512.628490] ? selinux_socket_sendmsg+0x36/0x40 [ 2512.644729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2512.650276] ? security_socket_sendmsg+0x8d/0xc0 [ 2512.669683] ? netlink_unicast+0x720/0x720 [ 2512.678028] sock_sendmsg+0xd7/0x130 [ 2512.681769] __sys_sendto+0x262/0x380 [ 2512.698985] ? __ia32_sys_getpeername+0xb0/0xb0 [ 2512.703985] ? task_work_run+0x118/0x1c0 [ 2512.708047] ? find_held_lock+0x35/0x130 [ 2512.712119] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2512.720113] ? blkg_prfill_rwstat_field_recursive+0x100/0x100 [ 2512.727089] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2512.731840] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2512.751750] ? do_syscall_64+0x26/0x620 [ 2512.756319] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2512.761690] __x64_sys_sendto+0xe1/0x1a0 [ 2512.786016] do_syscall_64+0xfd/0x620 [ 2512.789824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2512.817009] RIP: 0033:0x413f13 [ 2512.820209] Code: 8d 6c 24 18 48 8d 05 1c 05 04 00 48 89 44 24 08 48 8b 44 24 28 48 89 44 24 10 48 8d 44 24 08 48 89 04 24 e8 df 32 04 00 48 8b <6c> 24 18 48 83 c4 20 c3 e8 20 34 04 00 eb ae cc cc cc cc cc cc cc [ 2512.841026] RSP: 002b:00007ffe9b229a88 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 2512.848809] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000413f13 [ 2512.860896] RDX: 0000000000000034 RSI: 0000000000a71df0 RDI: 0000000000000003 [ 2512.868498] RBP: 0000000000000000 R08: 00007ffe9b229a90 R09: 000000000000000c [ 2512.877735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2512.886619] R13: 0000000000000003 R14: 0000000000000000 R15: 00000000004bf1a0 [ 2512.894190] [ 2512.894190] Showing all locks held in the system: [ 2512.900515] 1 lock held by khungtaskd/1037: [ 2512.908991] #0: 0000000052f6bd1b (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 2512.931762] 1 lock held by rsyslogd/7341: [ 2512.935954] #0: 00000000e20cb35e (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 2512.950958] 2 locks held by getty/7464: [ 2512.956590] #0: 00000000c06e96f8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2512.978125] #1: 00000000323be428 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2513.001330] 2 locks held by getty/7465: [ 2513.005715] #0: 000000002cbc3e95 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2513.018999] #1: 00000000a58f8530 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2513.028119] 2 locks held by getty/7466: [ 2513.032078] #0: 00000000a4a107dd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2513.048507] #1: 00000000456a1bc8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2513.057695] 2 locks held by getty/7467: [ 2513.061660] #0: 000000001d57f73b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2513.071489] #1: 000000004b7dfc7d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2513.093009] 2 locks held by getty/7468: [ 2513.096983] #0: 000000008e9db13e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2513.118446] #1: 00000000e629b017 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2513.130286] 2 locks held by getty/7469: [ 2513.134614] #0: 0000000015f4c847 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2513.142862] #1: 0000000021dd1fc0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2513.152513] 2 locks held by getty/7470: [ 2513.162561] #0: 00000000eefd7f37 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2513.171197] #1: 0000000000b58364 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 2513.182538] 3 locks held by kworker/1:4/29095: [ 2513.188924] #0: 00000000460af7a7 ((wq_completion)"events"){+.+.}, at: process_one_work+0x87e/0x1750 [ 2513.206792] #1: 00000000347e224b (deferred_process_work){+.+.}, at: process_one_work+0x8b4/0x1750 [ 2513.221618] #2: 0000000069297f86 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2513.230737] 3 locks held by kworker/1:5/4851: [ 2513.239739] #0: 00000000e9dcc5a1 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x87e/0x1750 [ 2513.251454] #1: 000000006342b630 ((addr_chk_work).work){+.+.}, at: process_one_work+0x8b4/0x1750 [ 2513.261080] #2: 0000000069297f86 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2513.275195] 4 locks held by kworker/u4:20/10530: [ 2513.279958] 3 locks held by kworker/0:1/2408: [ 2513.284627] #0: 00000000460af7a7 ((wq_completion)"events"){+.+.}, at: process_one_work+0x87e/0x1750 [ 2513.294705] #1: 000000002121ce75 ((linkwatch_work).work){+.+.}, at: process_one_work+0x8b4/0x1750 [ 2513.304131] #2: 0000000069297f86 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 2513.311458] 1 lock held by syz-executor.3/3040: [ 2513.318697] #0: 0000000069297f86 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x40a/0xb00 [ 2513.327177] [ 2513.328795] ============================================= [ 2513.328795] [ 2513.337072] NMI backtrace for cpu 1 [ 2513.340711] CPU: 1 PID: 1037 Comm: khungtaskd Not tainted 4.19.82 #0 [ 2513.347290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2513.356635] Call Trace: [ 2513.359220] dump_stack+0x172/0x1f0 [ 2513.362846] nmi_cpu_backtrace.cold+0x63/0xa4 [ 2513.367415] ? lapic_can_unplug_cpu.cold+0x47/0x47 [ 2513.372337] nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 [ 2513.377612] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2513.382793] watchdog+0x9df/0xee0 [ 2513.386251] kthread+0x354/0x420 [ 2513.389616] ? reset_hung_task_detector+0x30/0x30 [ 2513.394459] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2513.399996] ret_from_fork+0x24/0x30 [ 2513.410604] Sending NMI from CPU 1 to CPUs 0: [ 2513.415421] NMI backtrace for cpu 0 [ 2513.415426] CPU: 0 PID: 31830 Comm: kworker/u4:15 Not tainted 4.19.82 #0 [ 2513.415432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2513.415435] Workqueue: bat_events batadv_nc_worker [ 2513.415441] RIP: 0010:preempt_count_sub+0x67/0x160 [ 2513.415451] Code: 75 18 65 8b 05 ba 63 b9 7e 25 ff ff ff 7f 39 c3 7f 1b 81 fb fe 00 00 00 76 6b 65 8b 05 a2 63 b9 7e f7 db 65 01 1d 99 63 b9 7e <5b> 5d c3 e8 51 9d d7 01 85 c0 74 f4 48 c7 c0 00 3c 46 8a 48 ba 00 [ 2513.415454] RSP: 0018:ffff8882019c7c08 EFLAGS: 00000097 [ 2513.415461] RAX: 0000000080000001 RBX: 00000000ffffffff RCX: 0000000000000000 [ 2513.415465] RDX: 0000000000000004 RSI: ffffffff83241168 RDI: 0000000000000001 [ 2513.415470] RBP: ffff8882019c7c10 R08: ffff88805ea7a400 R09: ffffed100b4eb591 [ 2513.415474] R10: ffffed100b4eb590 R11: ffff88805a75ac83 R12: ffffffff86d65165 [ 2513.415478] R13: ffff88805ea7a400 R14: ffffffff86d65a90 R15: 0000000000000070 [ 2513.415483] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2513.415487] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2513.415492] CR2: ffffffffff600400 CR3: 000000009f057000 CR4: 00000000001406f0 [ 2513.415496] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2513.415501] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2513.415503] Call Trace: [ 2513.415506] __local_bh_enable_ip+0x155/0x270 [ 2513.415510] _raw_spin_unlock_bh+0x31/0x40 [ 2513.415513] batadv_nc_purge_paths+0x265/0x370 [ 2513.415516] batadv_nc_worker+0x2cf/0x760 [ 2513.415520] process_one_work+0x989/0x1750 [ 2513.415523] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2513.415526] ? lock_acquire+0x16f/0x3f0 [ 2513.415529] ? kasan_check_write+0x14/0x20 [ 2513.415533] ? do_raw_spin_lock+0xc8/0x240 [ 2513.415536] worker_thread+0x98/0xe40 [ 2513.415539] ? trace_hardirqs_on+0x67/0x220 [ 2513.415542] kthread+0x354/0x420 [ 2513.415545] ? process_one_work+0x1750/0x1750 [ 2513.415549] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2513.415552] ret_from_fork+0x24/0x30 [ 2513.492977] Kernel panic - not syncing: hung_task: blocked tasks [ 2513.614102] CPU: 1 PID: 1037 Comm: khungtaskd Not tainted 4.19.82 #0 [ 2513.620578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2513.629931] Call Trace: [ 2513.632545] dump_stack+0x172/0x1f0 [ 2513.636177] panic+0x26a/0x50e [ 2513.639369] ? __warn_printk+0xf3/0xf3 [ 2513.643257] ? lapic_can_unplug_cpu.cold+0x47/0x47 [ 2513.648185] ? ___preempt_schedule+0x16/0x18 [ 2513.652602] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 2513.658064] ? nmi_trigger_cpumask_backtrace+0x1c1/0x1f8 [ 2513.663516] ? nmi_trigger_cpumask_backtrace+0x1cb/0x1f8 [ 2513.668983] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 2513.674455] watchdog+0x9f0/0xee0 [ 2513.677921] kthread+0x354/0x420 [ 2513.681280] ? reset_hung_task_detector+0x30/0x30 [ 2513.686147] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2513.691764] ret_from_fork+0x24/0x30 [ 2513.696879] Kernel Offset: disabled [ 2513.700509] Rebooting in 86400 seconds..