6, &(0x7f0000000240)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0x8, 0x0, 0x2, 0x7}) ioctl$DRM_IOCTL_SG_ALLOC(r5, 0xc0106438, &(0x7f0000000200)={0xffffffffffffff00, r6}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r5, 0x80845663, &(0x7f00000002c0)) r7 = inotify_init() inotify_add_watch(r7, &(0x7f00000001c0)='./file0\x00', 0x10) r8 = syz_open_procfs(r2, &(0x7f0000000040)='fd/.\x00') ioctl$VIDIOC_S_EDID(r8, 0xc0285629, &(0x7f0000000080)={0x0, 0xfff, 0x6, [], &(0x7f0000000000)=0xffffffffffffffff}) 20:59:37 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:37 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) accept4$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000000100)=0x10, 0x80800) syz_extract_tcp_res(&(0x7f0000000000), 0x1, 0x612) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') getsockopt$llc_int(r0, 0x10c, 0x7, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000240), &(0x7f0000000280)=0x8) 20:59:37 executing program 0: r0 = socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000002a00815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0xfffffffffffffdc3}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x400) r2 = syz_genetlink_get_family_id$team(&(0x7f00000008c0)='team\x00') getsockname$packet(r1, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000940)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000ac0)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000fc0)={'dummy0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001140)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x40040000}, 0xc, &(0x7f0000001100)={&(0x7f0000001000)={0xd8, r2, 0x700, 0x70bd26, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0xbc, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}]}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) getpeername$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000180)={0x5, 0xfffffffffffffffd, 0x6, 0x0, 0x7, 0x0, 0x100, 0x430000, 0xd786, 0xfffffffffffffffe, 0x600000000000, 0x2, 0x0, 0x1, 0x0, 0x2, 0x2, 0x6}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000500)=0xc) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = geteuid() mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuseblk\x00', 0x200000, &(0x7f0000000680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read', 0x3d, 0x100000000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@subj_user={'subj_user', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@uid_lt={'uid<', r8}}, {@euid_lt={'euid<', r9}}, {@fowner_lt={'fowner<', r10}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@euid_gt={'euid>', r11}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) 20:59:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:37 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000002a00815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000100)=@ethernet={0x306, @random="06ee0033afd9"}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000040)="c11c3c57efd646f49d239688e00ceed8b95395ee1c3757791cba9bb6a78ef1263428920e711547e3b4598218e61a4e49ac86691e548ce902ceb19f", 0x3b}, {&(0x7f0000000180)="4dc1cc139251da3a5da8b5cbd701ff1dcb2a4cede9eaaf928a9ac583d58b2106acad3040994ed2ba72d94106bcef4cb22cf8afb53ef05c2377e4301715a9ee1bc086cf63ab0d7011da1d0ef107550cacd9e6b9ecbcee0fa9954bcf1676091caf3b1b842dfb50457ac1f36c91654caeed627b94c7d5b40e2d97bf56f80e12d5b1213f779cf79027f1ad75f1649410caa75a69eb1e7132f5c68ee5be71d95e47d6e85637b670a3b2f361de5a84e645b5ace54b67f97446933258adc414ecea3f183ceed9ddeaeddd8ca63a8c69b457ade0664fb3492a16e8b0716b4021c534f4ce", 0xe0}, {&(0x7f0000000380)="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", 0x1000}], 0x3, &(0x7f0000001380)=[{0x20, 0x117, 0x80000001, "09710d215a5f0af085ff"}, {0xf0, 0x10f, 0x5, "e7829be987f1341ec1e5ebaf872e1cb74508a44c5e7777d049f1fbd95ef31282dd2cc089cd596862d8fb445fd6be2bc856c15e6cd3f2387576930336f7f53ce7e987585d84c0f9d9863c9169689a4de91c186362f46332cccab163268e7d70eb1558437ed44cc6d1fad1c8c661c94b776f342bf619b0f950673b578425128f5f1e5e5ba99b50b74b69c4794ca8a5d4d6b06339ee8b47be9580a3ac3d4d8c33ab749bbacf49765d46ecdb4c323013267e6f2ab4510ddfc8a9b41cf8a9a2e8846c34de0a2a721e00f0d4348ebff28bee12b518353fa0f65bc39e0d19a6fe9f"}, {0xc8, 0x104, 0x1c00000, "e79f149ec373055dde3cb011637bcea660568b7050ff6767314b73412d3ce24959bb131b3a957ab9dc9140eeebc745545ff4021ff8c64422b906453c448dcb25279d32696134be7ab40dc795f89315cdb94500d2402d8c0c1e398acaebe97fe5dad39877938d8ec52b8f2115e538bae6d5854dd1f06be0c843b1a925b2c7207119f102494cd790973cc63b937c46b4f40159fbdd17abdf4290519c33d7ff2eaf6fc9f11067aceadd6da0809cca7a6a2a71f5d39fbb2567"}], 0x1d8}, 0x80) 20:59:37 executing program 3: socket(0x10, 0x2, 0x0) setuid(0x0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xfffffdad) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:37 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000a40)=0x81) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000006c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r3, 0x100, 0x70bd2a, 0x25dfdbfb}, 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x5, 0x4) sched_setattr(r1, &(0x7f0000000700)={0x30, 0x7, 0x1, 0x3, 0x2, 0x8, 0x5, 0xfffffffff67ad323}, 0x0) execve(&(0x7f0000000740)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000780)='\x00', &(0x7f00000007c0)='fd/4\x00', &(0x7f0000000800)='SET\x00'], &(0x7f00000009c0)=[&(0x7f0000000880)='TIPC\x00', &(0x7f00000008c0)='/md5sumem1eth1-GPLvboxnet0systemem0eth0cpuset\x00', &(0x7f0000000900)='\x00', &(0x7f0000000940)='fd/4\x00', &(0x7f0000000980)='/ppp0\x00']) setuid(r2) r4 = syz_open_procfs(r1, &(0x7f0000000040)='fd/4\x00') socketpair(0xa, 0x3, 0x2, &(0x7f0000000000)) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x4, 0x3f0, 0x298, 0xc0, 0x298, 0x298, 0xc0, 0x358, 0x358, 0x358, 0x358, 0x358, 0x4, &(0x7f0000000080), {[{{@ip={@initdev={0xac, 0x1e, 0x8001, 0x0}, @remote, 0xff, 0xffffffff, 'rose0\x00', 'ip6gretap0\x00', {0xc4d083e3f56f4666}, {}, 0x5f, 0x3, 0x11}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0x178, 0x1d8, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv6=@remote, [0xff, 0x0, 0xffffffff, 0xffffffff], @ipv6=@local, [0xffffffff, 0xffffff00, 0x0, 0xff], @ipv4=@multicast2, [0xffffffff, 0x0, 0xffffffff, 0xffffff00], @ipv6=@rand_addr="c3595be07be7c88a5e9e6e55f5377a48", [0x0, 0xffffffff, 0xffffff00, 0xd51f17651fce09b0], 0x1, 0x3, 0xff, 0x4e20, 0x4e23, 0x4e21, 0x4e24, 0x123, 0x2}, 0x101}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x7e80000, [0x8, 0x20, 0x3, 0x4970, 0x7f, 0x8], 0x401, 0x35d}, {0x1, [0x3, 0x20, 0x0, 0x1, 0x9f, 0x8000], 0x8, 0xba}}}}, {{@ip={@broadcast, @empty, 0xff000000, 0xff0000ff, '\x00', 'veth1_to_bridge\x00', {}, {0xff}, 0x2d, 0x2, 0x21}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x450) 20:59:37 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="ce3e40970591eba1f678b15b09d4d22447ed14b5dc1ef6935626a5f41b605bf04cccb25c00199cc46777819302ce1c137c72f10237c9a64de8e4d1ebba254e795f1fab066399585f0c6e12f2eddb2c330f224fa644ba379a4d4ae11a11e1a233ca818f4830c7ad35cdf4c89aea66fe71b767eb8004a75e9667e75e34f8c45132562f8d2f08df5308c7b1a7fb9e759c0dccbc47da89ec2ab423aab4491b4672c53372195a8527fa173af25058fabc0861a1954d62de2535", 0xb7, 0x7ff}, {&(0x7f0000000140)="de6eb3c2f090287f1f17c811be725022f0b6316526be375e92ae98dd2cf7c62f8c348c5f13da0f5e1fb0627f2f97610dd31b1f8d24493c7f8e9918fb6cbe7d47db85ee46ba592c3d4da9d4d97c27ad5a5331c9653832dfe934bb6c67e52bda2eb72ad394eb1d98fedcbdb2481dbf3400b3c6116fecf87d6888d50ab748c0890e783be74da8d96d857629d7", 0x8b, 0x5}, {&(0x7f0000000200)="31124b1525a625ae8f0016416ed4dc458a4c3c1c033339b35778ef06b38578b843f45cee25b72bd12f0a01e56d49eacb5a890e92a95e47a63f779c560cf4191f7170c0f64a4d694e8ad56ef1415742a8ff254c5d5a284bc365d377410e60bf96f7b5036fee21136a64e447ca04358926f1b288271c08fa98744acd28c566ef88042f9bfd67dd2022715193bc6fe4546e40c02c0b4c00a19554bdd47e93866194ccac07f6e62a34d180b72b094dacff80e65ca4af90bea6432f48bdea", 0xbc, 0xc5e9}], 0x10, &(0x7f0000000340)={[{@type={'type', 0x3d, "39781a2f"}}], [{@subj_role={'subj_role'}}, {@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type'}}, {@subj_type={'subj_type'}}]}) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:37 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) 20:59:37 executing program 3: socket(0x10, 0x2, 0x0) setuid(0x0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000080)={0x0, 0xca4f, 0xffff, 0x7, 0x100000001, 0x52a6, 0x5, 0x100000000, {0x0, @in6={{0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}, 0x8, 0x3ff, 0xa6, 0x80000001, 0x923}}, &(0x7f0000000000)=0xb0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000180)=r2, 0xfffffffffffffea1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x5, @rand_addr="22a9d98305f7bbe8a879bd58251d065e", 0x401}, {0xa, 0x4e23, 0x2, @ipv4={[], [], @remote}, 0x7fff}, r5, 0x1000}}, 0xfce4) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000001c0)) setuid(r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r0) 20:59:37 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000000)) 20:59:37 executing program 0: r0 = socket$kcm(0x10, 0x5, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000002a00815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) sendmsg$xdp(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x2c, 0x2, r2, 0xb}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000280)}], 0x1, 0x0, 0x0, 0x80}, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 20:59:38 executing program 5: r0 = socket(0x10, 0x2, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) sendto$inet6(r0, &(0x7f00000000c0)="b6c1f0fa666a33b0595adea772d94bf6ff512b14440ef8b38d2fac6532d91df8e9bcdbce9153b4e092431992f99deacf6c14c526d40a195557bc7c4078b19a255079924f43df84f7a8722dde77b51a74d9e24edf287db0a5bb16db054e4b463cbb9d75a7f5", 0x65, 0x4, &(0x7f0000000140)={0xa, 0x4e24, 0x7fff, @local, 0xfff}, 0x1c) keyctl$chown(0x16, 0x0, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0x4) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x20e00) getsockopt$inet_tcp_buf(r4, 0x6, 0x21, &(0x7f00000001c0)=""/231, &(0x7f00000002c0)=0xe7) 20:59:38 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) 20:59:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000002a00815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80000, 0x0) futimesat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}}) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 20:59:38 executing program 3: socket(0x10, 0x2, 0x0) setuid(0x0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1, 0x0) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000280)=0x6) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000000c0)=0x8, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = semget(0x0, 0x4, 0x212) semctl$SETVAL(r4, 0x0, 0x10, &(0x7f0000000080)=0x1) r5 = semget$private(0x0, 0x8000, 0x400) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f00000002c0)={0x0, 0x73b2, 0x3}) semctl$GETPID(r5, 0x1, 0xb, &(0x7f0000000180)=""/225) setuid(r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') fanotify_mark(r6, 0x10, 0x48001020, r2, &(0x7f0000000300)='./file0\x00') 20:59:38 executing program 1: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0xd, &(0x7f0000000040)=0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) syz_open_procfs(r1, &(0x7f0000000100)='fdinfo\x00') ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000001c0)) exit(0x80006) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x41, 0x0) 20:59:38 executing program 5: r0 = socket(0x17, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$int_out(r0, 0x2, &(0x7f0000000240)) setuid(r1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000300)) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000080)='selfppp1mime_typewlan0\x00', &(0x7f00000000c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x8000, 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000000340)=""/109) keyctl$chown(0x16, 0x0, 0x0, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x2000) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f00000001c0)={0x2, 0x81, {0x53, 0x9, 0x100000001, {0x9}, {0xfb6e, 0x7a}, @rumble={0x0, 0x2}}, {0x57, 0x81, 0xfffffffffffffff7, {0x6, 0x8000}, {0xffffffff, 0xa9}, @period={0x5d, 0x7f80000000000, 0x626e, 0x2, 0xee3, {0x401, 0x200, 0x77, 0x8001}, 0xa, &(0x7f0000000180)=[0xffffffffffffffa8, 0x96b, 0x1, 0x5, 0x80000000, 0x101, 0x4, 0x1, 0x10001, 0x8]}}}) 20:59:38 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) 20:59:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000002a00815fe45ac187185095cf0600b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 20:59:38 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) inotify_init() r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000080)={0x6, 0xffff, r2, 0x0, r3, 0x0, 0x5, 0x6}) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:38 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:38 executing program 5: r0 = socket(0x10, 0x2, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x800, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, &(0x7f0000000240)={0x4002, 0x106001, 0x0, 0x8f6a, 0x7}) fanotify_mark(r3, 0x1, 0x18, r3, &(0x7f0000000080)='./file0\x00') r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000280)="e617dca0d8f82edceae156f95dc4fa933e877c2a08b25fe27db2bf6b4892344ae013bb8a21698b150677b501801f5799f0210440648f0bc9d374c505f9b192a9ef1a50c594bc844df515c75ef9b93e1774a48a2c6d8babe3e5b67385fdf071dc366c6ae88265be8663954bccc5914b55eb0d083a51403178b36e964a90959cc8b01005209b1a07dc02785bae47c48a4354280c9283b32fe9907c68743025c827bc556b44c41b8070c87e53c0e6600efa5ef77aaf042a231ce9adfa7fa5b4fef6a5", 0xc1, r4) r6 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x6, 0x200) fanotify_mark(r6, 0x8, 0x10, r0, &(0x7f00000001c0)='./file0\x00') keyctl$chown(0x4, r5, r1, r2) 20:59:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1, 0x0) ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000280)=0x6) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000000c0)=0x8, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = semget(0x0, 0x4, 0x212) semctl$SETVAL(r4, 0x0, 0x10, &(0x7f0000000080)=0x1) r5 = semget$private(0x0, 0x8000, 0x400) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f00000002c0)={0x0, 0x73b2, 0x3}) semctl$GETPID(r5, 0x1, 0xb, &(0x7f0000000180)=""/225) setuid(r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') fanotify_mark(r6, 0x10, 0x48001020, r2, &(0x7f0000000300)='./file0\x00') 20:59:38 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40000, 0x0) ioctl$KDGKBENT(r3, 0x4b46, &(0x7f0000000080)={0x4, 0x9, 0xa8}) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) setuid(r2) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') ioctl$EVIOCGABS20(r4, 0x80184560, &(0x7f0000000180)=""/4096) 20:59:38 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000000)={0x4, 0x3, 0xfffffffffffffff7, 0x6}, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:39 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0x11) ioctl$NBD_CLEAR_QUE(r2, 0xab05) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f00000001c0)={0x38000, 0x9}) setuid(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') name_to_handle_at(r3, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x61, 0x0, "af2bd6ba2a6180027019d0d2dc0de4dc56ca81e6ec675871c4c2ba1acab710efaf17dc3061e29de6272b83bf7831e302449b5790606c1304865c94eb5a33d0d935ca3a7aa1b70c27faf5d5d51e763504d7b584914a8aaec2f6"}, &(0x7f0000000100), 0x400) 20:59:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:39 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x78, 0x4, 0x8, "8e59609d9b960b1dc6ff5c4f21b8b042", "25ab25f52e3c4d494de3b65e77c669590f202ff5d6292c4595a20791d58554ffaa3bb93ee4eec8f200e2cad76b36d885c14c5a9d0f6e37ea2ed02e123306aafd6d76fb82353bd6a4b9d991e5bfc963cd4380d44a3017ebf220ba0a79077e6496dc277b"}, 0x78, 0x1) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', r3}) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@mpls_getnetconf={0x3c, 0x52, 0x6, 0x70bd2b, 0x25dfdbfc, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r4}, @NETCONFA_IFINDEX={0x8, 0x1, r5}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x10001}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc0}, 0x40) setuid(r2) setpriority(0x2, r1, 0x8000) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:39 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:39 executing program 2: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000180)=""/248, &(0x7f00000000c0)=0xf8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:39 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x8200) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000040)) 20:59:39 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:39 executing program 3: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:39 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x78, 0x4, 0x8, "8e59609d9b960b1dc6ff5c4f21b8b042", "25ab25f52e3c4d494de3b65e77c669590f202ff5d6292c4595a20791d58554ffaa3bb93ee4eec8f200e2cad76b36d885c14c5a9d0f6e37ea2ed02e123306aafd6d76fb82353bd6a4b9d991e5bfc963cd4380d44a3017ebf220ba0a79077e6496dc277b"}, 0x78, 0x1) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', r3}) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@mpls_getnetconf={0x3c, 0x52, 0x6, 0x70bd2b, 0x25dfdbfc, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r4}, @NETCONFA_IFINDEX={0x8, 0x1, r5}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x10001}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc0}, 0x40) setuid(r2) setpriority(0x2, r1, 0x8000) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:39 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x5, 0x4, 0x7fffffff, 0x4d8, 0xffffffffffffffff}) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:39 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) 20:59:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) 20:59:39 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) fcntl$getflags(r2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0xfffffffffffffffe) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000040)={0x0, 0x0, 0x2080}) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:39 executing program 3: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:39 executing program 0: lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x78, 0x4, 0x8, "8e59609d9b960b1dc6ff5c4f21b8b042", "25ab25f52e3c4d494de3b65e77c669590f202ff5d6292c4595a20791d58554ffaa3bb93ee4eec8f200e2cad76b36d885c14c5a9d0f6e37ea2ed02e123306aafd6d76fb82353bd6a4b9d991e5bfc963cd4380d44a3017ebf220ba0a79077e6496dc277b"}, 0x78, 0x1) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', r3}) close(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@mpls_getnetconf={0x3c, 0x52, 0x6, 0x70bd2b, 0x25dfdbfc, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x8}, @NETCONFA_IFINDEX={0x8, 0x1, r4}, @NETCONFA_IFINDEX={0x8, 0x1, r5}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x10001}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc0}, 0x40) setuid(r2) setpriority(0x2, r1, 0x8000) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:39 executing program 1: r0 = socket(0xc, 0xfffffffffffffffa, 0x800000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000000)=@fragment={0x0, 0x0, 0x200, 0x7, 0x0, 0x4f, 0x66}, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) socket$caif_stream(0x25, 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') [ 341.458886][ T26] audit: type=1400 audit(1554843579.534:151): avc: denied { getopt } for pid=18565 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 20:59:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) 20:59:39 executing program 3: r0 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:39 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0xa71, 0x40) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f00000002c0)=0x7, &(0x7f0000000300)=0x2) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f00000005c0)={@empty, 0x0}, &(0x7f0000000600)=0x14) getpeername$packet(r0, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) accept$packet(r2, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000900)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000940)={0x0, @loopback, @initdev}, &(0x7f0000000980)=0xc) accept4$packet(r2, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a40)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c00)={'nlmon0\x00', 0x0}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000c40)={0x0, @rand_addr, @initdev}, &(0x7f0000000c80)=0xc) getsockname$packet(r2, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000d40)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000e40)=0xe8) accept4(r1, &(0x7f0000000f80)=@can={0x1d, 0x0}, &(0x7f0000001000)=0x80, 0x80800) accept$packet(r2, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001080)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000001240)={'team0\x00', 0x0}) accept4$packet(r2, &(0x7f0000001280)={0x11, 0x0, 0x0}, &(0x7f00000012c0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000001340)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000001540)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001600)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000001700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000001740)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000001980)={'team0\x00', 0x0}) getsockname(r2, &(0x7f0000002180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002200)=0x80) accept$packet(r2, &(0x7f0000002240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002280)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000002980)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000002940)={&(0x7f00000022c0)={0x674, r3, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0x1b4, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x268, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x241}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0x4}}, {{0x8}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r21}, {0x188, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x29f1}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x674}, 0x1, 0x0, 0x0, 0x840}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r26 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0xfffffffffffffff8, 0x8000) ioctl$TCGETA(r26, 0x5405, &(0x7f0000000240)) r27 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r27, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(r27, 0x0, 0x83, &(0x7f0000000180)={'filter\x00', 0x0, 0x4, 0x23, [], 0x8, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000000)=""/35}, &(0x7f0000000100)=0x78) setuid(r28) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:39 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000080)={0x2c8, r2, 0x328, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_BEARER={0xcc, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x4, @mcast1, 0xef8}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcb0c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xfc86, @loopback, 0x1c58}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}]}, @TIPC_NLA_BEARER={0x190, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x2}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x9c, @local, 0x2}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x13}, 0xcd01}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3, @rand_addr="b1902c1374c111e8b3a04ba83e4c9ec0", 0x8}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x98a}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc000000000000000}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000000}]}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x4000}, 0x800) 20:59:39 executing program 1: r0 = socket(0x10, 0x4, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, r2, 0x0) setuid(r2) syz_open_procfs(r1, &(0x7f0000000040)='\x95\x8d\xc4\x12\x87\t8\xddV\x1d\xb1\x88\xffD\xdaQb\x97\xa5\xf9\xaf\x9b\x8a\xe59\xc2<\xdai@eO\r\x03\xc9\xaf\x83;\x1co:\xa9\xba\xaet\xe2!)\xe9_\xa8\x9e\xb5,@\x11\n') sched_setparam(r1, &(0x7f0000000000)=0x7d) 20:59:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) 20:59:39 executing program 3: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:39 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000001c0), &(0x7f0000000180)=0x511) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'vlan0\x00', 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30005080}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=@polexpire={0x1c4, 0x1b, 0x0, 0x70bd2b, 0x25dfdbfb, {{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e23, 0xffff, 0x4e24, 0xdc78, 0xa, 0x80, 0x80, 0xbf, r3, r1}, {0x40, 0x5, 0x3, 0xf9f, 0x6, 0x4000000000000, 0x7, 0x8}, {0x6, 0x8, 0x8, 0x2d}, 0x3, 0x6e6bb4, 0x3, 0x1, 0x2}}, [@replay_thresh={0x8, 0xb, 0x5}, @algo_aead={0xcc, 0x12, {{'morus640-generic\x00'}, 0x3e8, 0xc0, "5e017856076e3dad94ed55c842a537601a5fd824444c5f1842d758a7a70d42ad8a4c2a84274f3b7f7f37691ca2d1e9d357ae793b8f5b9b2a2bc8701dee33f51708f85f01322bf92c08d86485e00a9a441df946b94916e2868e5a10a7dd06346381a30b28104c27f7e20fb879737daedf452b940afa703b00e15770e4d7"}}, @address_filter={0x28, 0x1a, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0xa, 0x1, 0x1f}}, @ipv6_hthresh={0x8, 0x4, {0x18, 0x14}}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x4}, 0x40000) setuid(r1) r4 = add_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@ipv4={[], [], @local}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) keyctl$chown(0x16, r4, r5, r2) bind$isdn_base(r0, &(0x7f0000000100)={0x22, 0x0, 0xaf, 0x9, 0x5c}, 0x6) 20:59:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400202) r1 = socket(0x10, 0x2, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f0000000000)={0x52, 0x8, 0xc, 0x4, 0x6}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:40 executing program 0 (fault-call:1 fault-nth:0): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:40 executing program 3: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:40 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup2(r3, r0) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f00000002c0)=""/193) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2401800}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00022cbd7000fcdbdf250300000014000100fe800000000000000000000008000001080002002000000008000600ffffffff170004003f000000ff0f0000fd7f000006000000fdffffff10000400030002000900000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) setuid(r2) r6 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x800, 0x101000) ioctl$KVM_SET_CLOCK(r6, 0x4030ae7b, &(0x7f0000000080)={0x5, 0x101}) syz_open_procfs(r1, &(0x7f0000000000)='fd/4\x00') 20:59:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) [ 341.982708][T18618] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pig=18618 comm=syz-executor.5 20:59:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x5) prctl$PR_SVE_GET_VL(0x33, 0x5407) r2 = socket(0xe, 0x2, 0x5) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000000)={0xa, 0x4, 0x5}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x1) [ 342.061314][T18618] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pig=18618 comm=syz-executor.5 [ 342.086708][T18622] FAULT_INJECTION: forcing a failure. [ 342.086708][T18622] name failslab, interval 1, probability 0, space 0, times 0 [ 342.151406][T18622] CPU: 1 PID: 18622 Comm: syz-executor.0 Not tainted 5.1.0-rc4+ #60 [ 342.159439][T18622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.169703][T18622] Call Trace: [ 342.173006][T18622] dump_stack+0x172/0x1f0 [ 342.177356][T18622] should_fail.cold+0xa/0x15 [ 342.181962][T18622] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 342.187797][T18622] ? ___might_sleep+0x163/0x280 [ 342.192926][T18622] __should_failslab+0x121/0x190 [ 342.197901][T18622] should_failslab+0x9/0x14 [ 342.202507][T18622] kmem_cache_alloc_node+0x264/0x710 [ 342.207817][T18622] __alloc_skb+0xd5/0x5e0 [ 342.212170][T18622] ? skb_trim+0x190/0x190 [ 342.216519][T18622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.222767][T18622] ? netlink_autobind.isra.0+0x228/0x310 [ 342.228419][T18622] netlink_sendmsg+0x97b/0xd70 [ 342.233211][T18622] ? netlink_unicast+0x720/0x720 [ 342.238203][T18622] ? tomoyo_socket_sendmsg+0x26/0x30 [ 342.243511][T18622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.243528][T18622] ? security_socket_sendmsg+0x93/0xc0 [ 342.243543][T18622] ? netlink_unicast+0x720/0x720 [ 342.243560][T18622] sock_sendmsg+0xdd/0x130 [ 342.243580][T18622] sock_write_iter+0x27c/0x3e0 [ 342.264622][T18622] ? sock_sendmsg+0x130/0x130 [ 342.264654][T18622] ? inode_has_perm+0x1b0/0x230 [ 342.264671][T18622] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 342.264695][T18622] ? iov_iter_init+0xee/0x220 [ 342.289980][T18622] new_sync_write+0x4c7/0x760 [ 342.294844][T18622] ? default_llseek+0x2e0/0x2e0 [ 342.300086][T18622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.306338][T18622] ? security_file_permission+0x94/0x380 [ 342.311993][T18622] __vfs_write+0xe4/0x110 [ 342.316338][T18622] vfs_write+0x20c/0x580 [ 342.320602][T18622] ksys_write+0x14f/0x2d0 [ 342.325100][T18622] ? __ia32_sys_read+0xb0/0xb0 [ 342.329880][T18622] ? do_syscall_64+0x26/0x610 [ 342.334588][T18622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.340664][T18622] ? do_syscall_64+0x26/0x610 [ 342.345352][T18622] __x64_sys_write+0x73/0xb0 20:59:40 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:40 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c010000", @ANYRES16=r2, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x40}, 0x80) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x5) 20:59:40 executing program 3: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:40 executing program 3: socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:40 executing program 5: r0 = socket(0x8000000004, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) mount$9p_tcp(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x200000, &(0x7f0000000180)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@aname={'aname', 0x3d, 'wlan0}\\eth0\'self*'}}, {@version_u='version=9p2000.u'}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@aname={'aname', 0x3d, 'vmnet0md5sum'}}, {@version_L='version=9p2000.L'}, {@afid={'afid', 0x3d, 0x3f}}, {@loose='loose'}], [{@permit_directio='permit_directio'}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_gt={'fowner>', r1}}, {@measure='measure'}]}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x80000001, 0xfff, 0x8204, 0x8, 0x800, 0x0, 0x1, 0xccb, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r3, 0xff}, 0x8) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) [ 342.349964][T18622] do_syscall_64+0x103/0x610 [ 342.354669][T18622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.360680][T18622] RIP: 0033:0x4582b9 [ 342.364580][T18622] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.364589][T18622] RSP: 002b:00007ffb8c88cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 342.364604][T18622] RAX: ffffffffffffffda RBX: 00007ffb8c88cc90 RCX: 00000000004582b9 20:59:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) 20:59:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) [ 342.364613][T18622] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 342.364622][T18622] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 342.364631][T18622] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb8c88d6d4 [ 342.364639][T18622] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 20:59:40 executing program 0 (fault-call:1 fault-nth:1): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:40 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x3d) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xd12) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:40 executing program 3: socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) 20:59:40 executing program 5: socket(0x10, 0x2, 0x0) setuid(0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101040, 0x0) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000040)={0x6000, 0x5000, 0x9, 0x1f, 0x4}) r1 = request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='/dev/null\x00', 0xfffffffffffffffb) keyctl$describe(0x6, r1, &(0x7f0000000140)=""/87, 0x57) ioctl$KIOCSOUND(r0, 0x4b2f, 0x0) keyctl$chown(0x16, 0x0, 0x0, 0x0) [ 342.699762][T18672] FAULT_INJECTION: forcing a failure. [ 342.699762][T18672] name failslab, interval 1, probability 0, space 0, times 0 20:59:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) [ 342.757192][T18672] CPU: 0 PID: 18672 Comm: syz-executor.0 Not tainted 5.1.0-rc4+ #60 [ 342.765255][T18672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.775330][T18672] Call Trace: [ 342.778635][T18672] dump_stack+0x172/0x1f0 [ 342.782979][T18672] should_fail.cold+0xa/0x15 [ 342.787592][T18672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 342.793410][T18672] ? ___might_sleep+0x163/0x280 [ 342.798274][T18672] __should_failslab+0x121/0x190 [ 342.803226][T18672] should_failslab+0x9/0x14 [ 342.807739][T18672] kmem_cache_alloc_node_trace+0x270/0x720 [ 342.813993][T18672] __kmalloc_node_track_caller+0x3d/0x70 [ 342.814012][T18672] __kmalloc_reserve.isra.0+0x40/0xf0 [ 342.814029][T18672] __alloc_skb+0x10b/0x5e0 [ 342.814045][T18672] ? skb_trim+0x190/0x190 [ 342.814070][T18672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.840302][T18672] ? netlink_autobind.isra.0+0x228/0x310 [ 342.846213][T18672] netlink_sendmsg+0x97b/0xd70 [ 342.851081][T18672] ? netlink_unicast+0x720/0x720 20:59:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) [ 342.856026][T18672] ? tomoyo_socket_sendmsg+0x26/0x30 [ 342.861324][T18672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.868191][T18672] ? security_socket_sendmsg+0x93/0xc0 [ 342.873658][T18672] ? netlink_unicast+0x720/0x720 [ 342.878601][T18672] sock_sendmsg+0xdd/0x130 [ 342.883032][T18672] sock_write_iter+0x27c/0x3e0 [ 342.887906][T18672] ? sock_sendmsg+0x130/0x130 [ 342.892605][T18672] ? inode_has_perm+0x1b0/0x230 [ 342.897468][T18672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 20:59:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r1) [ 342.903719][T18672] ? iov_iter_init+0xee/0x220 [ 342.908409][T18672] new_sync_write+0x4c7/0x760 [ 342.913095][T18672] ? default_llseek+0x2e0/0x2e0 [ 342.917966][T18672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.924230][T18672] ? security_file_permission+0x94/0x380 [ 342.929874][T18672] __vfs_write+0xe4/0x110 [ 342.934216][T18672] vfs_write+0x20c/0x580 [ 342.938477][T18672] ksys_write+0x14f/0x2d0 [ 342.942820][T18672] ? __ia32_sys_read+0xb0/0xb0 [ 342.947685][T18672] ? do_syscall_64+0x26/0x610 20:59:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r1) [ 342.952365][T18672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.958691][T18672] ? do_syscall_64+0x26/0x610 [ 342.963560][T18672] __x64_sys_write+0x73/0xb0 [ 342.968339][T18672] do_syscall_64+0x103/0x610 [ 342.972942][T18672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.978838][T18672] RIP: 0033:0x4582b9 [ 342.982736][T18672] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:59:41 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000180)=0x400) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = accept$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', r3}) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f00000014c0)={&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001400)=[{&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/215, 0xd7}, {&(0x7f0000000380)=""/114, 0x72}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x4, &(0x7f0000001440)=""/126, 0x7e}, 0x40000001) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x210000, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x6dc156b11491d5b6, &(0x7f0000001500)="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", 0x1000) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000100)={0x4, 0x0, [{0x8000000f, 0x5, 0x7, 0xbd, 0x3}, {0x80000007, 0x3f, 0x0, 0x0, 0x100000001}, {0x80000001, 0xffff, 0x80, 0x0, 0x6c91}, {0x80000007, 0x7f, 0x62, 0x2, 0xd4}]}) 20:59:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r1) [ 343.002343][T18672] RSP: 002b:00007ffb8c88cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 343.010762][T18672] RAX: ffffffffffffffda RBX: 00007ffb8c88cc90 RCX: 00000000004582b9 [ 343.018752][T18672] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 343.026727][T18672] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 343.034700][T18672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb8c88d6d4 [ 343.042674][T18672] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 20:59:41 executing program 0 (fault-call:1 fault-nth:2): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0xfffffffffffffffd) setuid(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) connect$tipc(r5, &(0x7f0000000240)=@id, 0x10) getsockname$netlink(r2, &(0x7f0000000000), &(0x7f0000000080)=0xc) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') keyctl$session_to_parent(0x12) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000100)=0x2, 0x4) ioctl$KDGKBTYPE(r6, 0x4b33, &(0x7f00000000c0)) 20:59:41 executing program 3: socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:41 executing program 1: r0 = socket(0x10, 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:41 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x80) write$P9_RATTACH(r2, &(0x7f00000000c0)={0xc, 0x69, 0x200000002, {0x83, 0x4}}, 0x14) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) 20:59:41 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) [ 343.260671][T18712] FAULT_INJECTION: forcing a failure. [ 343.260671][T18712] name failslab, interval 1, probability 0, space 0, times 0 [ 343.298215][T18712] CPU: 0 PID: 18712 Comm: syz-executor.0 Not tainted 5.1.0-rc4+ #60 [ 343.306258][T18712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.316418][T18712] Call Trace: [ 343.320080][T18712] dump_stack+0x172/0x1f0 [ 343.324435][T18712] should_fail.cold+0xa/0x15 [ 343.329061][T18712] ? __netlink_lookup+0x3c8/0x7a0 [ 343.334101][T18712] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 343.340470][T18712] __should_failslab+0x121/0x190 [ 343.345627][T18712] should_failslab+0x9/0x14 [ 343.350180][T18712] kmem_cache_alloc+0x47/0x6f0 [ 343.354963][T18712] ? lock_acquire+0x16f/0x3f0 20:59:41 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000080)=@l2={0x1f, 0x10001, {0x100000001, 0x9, 0x8, 0x4, 0x6, 0xa1}, 0x8, 0x5}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/member\x00', 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x5, 0x200) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) fcntl$lock(r0, 0x25, &(0x7f0000000140)={0x2, 0x7, 0x8, 0x8, r3}) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') [ 343.359652][T18712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.365923][T18712] skb_clone+0x150/0x3b0 [ 343.370658][T18712] netlink_deliver_tap+0x95c/0xc00 [ 343.375813][T18712] netlink_unicast+0x5a7/0x720 [ 343.380590][T18712] ? netlink_attachskb+0x770/0x770 [ 343.385709][T18712] ? _copy_from_iter_full+0x25d/0x900 [ 343.391098][T18712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.397355][T18712] netlink_sendmsg+0x8ae/0xd70 [ 343.402233][T18712] ? netlink_unicast+0x720/0x720 20:59:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) [ 343.407203][T18712] ? tomoyo_socket_sendmsg+0x26/0x30 [ 343.412520][T18712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.418777][T18712] ? security_socket_sendmsg+0x93/0xc0 [ 343.424243][T18712] ? netlink_unicast+0x720/0x720 [ 343.429196][T18712] sock_sendmsg+0xdd/0x130 [ 343.433623][T18712] sock_write_iter+0x27c/0x3e0 [ 343.438410][T18712] ? sock_sendmsg+0x130/0x130 [ 343.443103][T18712] ? inode_has_perm+0x1b0/0x230 [ 343.447970][T18712] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.454247][T18712] ? iov_iter_init+0xee/0x220 20:59:41 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x48002, 0x0) ioctl$VIDIOC_G_PARM(r3, 0xc0cc5615, &(0x7f0000000140)={0xb, @raw_data="2e18c71d75122197568361932eea4e2b686942b953bd8ebd25cab0253dd7e3062af1f939d4749d299a176a651788e2f9e5432221c06b129a02ad675caa549bb24fbd91b955c5dab86a6a3fe10127442d8d819edd4aa06a611e1854b9205958fcaa95a03c222a95c686ab7fd1abc207d9411c8152d096965aab9c407e1bdcc23e365cb607b74a3ba1239156c33a1296bdfe164085bbd8c7c83cf798b9dadf8628de339b1ef31bdec5c0af2c6e8336548daf49095b55b8abad0e240d02ddd9264fac27ecb4678ce955"}) setuid(r2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f00000000c0)=0x4, 0x8) keyctl$chown(0x16, 0x0, 0x0, 0x0) [ 343.459031][T18712] new_sync_write+0x4c7/0x760 [ 343.463829][T18712] ? default_llseek+0x2e0/0x2e0 [ 343.468709][T18712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.474963][T18712] ? security_file_permission+0x94/0x380 [ 343.480612][T18712] __vfs_write+0xe4/0x110 [ 343.484951][T18712] vfs_write+0x20c/0x580 [ 343.489260][T18712] ksys_write+0x14f/0x2d0 [ 343.493696][T18712] ? __ia32_sys_read+0xb0/0xb0 [ 343.498584][T18712] ? do_syscall_64+0x26/0x610 [ 343.503272][T18712] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.509355][T18712] ? do_syscall_64+0x26/0x610 [ 343.514142][T18712] __x64_sys_write+0x73/0xb0 [ 343.519028][T18712] do_syscall_64+0x103/0x610 [ 343.523718][T18712] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.529612][T18712] RIP: 0033:0x4582b9 [ 343.534734][T18712] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:59:41 executing program 5: r0 = getpid() r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000180)={0x6, 0x9f}) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f00000001c0)={0x7, 0x0, [{0x80000001, 0x81, 0x1, 0x534, 0xc373}, {0xc0000007, 0x7fffffff, 0x5, 0xfffffffffffffff7, 0x7d1}, {0x80000008, 0x6, 0x100000001, 0x5, 0x1}, {0x6, 0x5, 0x2, 0x400, 0x8}, {0x80000019, 0x2, 0x9, 0x2, 0xf20}, {0xc000001d, 0x7, 0x6, 0x776, 0x3ff}, {0xc0000007, 0xb918, 0x400, 0x32, 0x6}]}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x6, 0x6, 0x8, 0x7, 0x0, 0x0, 0x40, 0x4, 0x9, 0x4, 0x3f, 0x9, 0x7, 0x8, 0x6, 0x0, 0x0, 0x3, 0xc1, 0x1ed3cbc0, 0xc000000000000000, 0x80, 0x7f, 0x1, 0x8, 0x33, 0x0, 0x9, 0x1, 0xdba, 0x9, 0x51, 0x7fffffff, 0xdf8, 0x200, 0x9, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000040), 0xe}, 0x2100, 0x7, 0xffffffffffffff80, 0x5, 0x2b, 0x7, 0x5}, r0, 0x3, r1, 0x8) ioctl$KDENABIO(r1, 0x4b36) connect$bt_rfcomm(r1, &(0x7f0000000140)={0x1f, {0x20, 0x4, 0x6, 0x7, 0x0, 0x4}, 0x3}, 0xa) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) keyctl$chown(0x16, 0x0, 0x0, 0x0) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000000)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, r3}) 20:59:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) [ 343.554436][T18712] RSP: 002b:00007ffb8c88cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 343.562879][T18712] RAX: ffffffffffffffda RBX: 00007ffb8c88cc90 RCX: 00000000004582b9 [ 343.570886][T18712] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 343.578887][T18712] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 343.586869][T18712] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb8c88d6d4 [ 343.595676][T18712] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 20:59:41 executing program 0 (fault-call:1 fault-nth:3): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:41 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x100, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:41 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r2, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r2, 0x8) r3 = accept(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @broadcast}}}}, 0x0) r4 = dup3(r2, r0, 0x80000) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x20000) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:41 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:41 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r0, 0x0, &(0x7f0000000040)) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:41 executing program 4 (fault-call:2 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) [ 343.824737][T18748] FAULT_INJECTION: forcing a failure. [ 343.824737][T18748] name failslab, interval 1, probability 0, space 0, times 0 20:59:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20800004}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x28, r3, 0x28, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x4) accept4$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0xffffffff}, 0x10, 0x80800) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000000)='children\x00') [ 343.901822][T18748] CPU: 1 PID: 18748 Comm: syz-executor.0 Not tainted 5.1.0-rc4+ #60 [ 343.909855][T18748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.920032][T18748] Call Trace: [ 343.923344][T18748] dump_stack+0x172/0x1f0 [ 343.927696][T18748] should_fail.cold+0xa/0x15 [ 343.932309][T18748] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 343.938133][T18748] ? ___might_sleep+0x163/0x280 [ 343.943025][T18748] __should_failslab+0x121/0x190 [ 343.947987][T18748] should_failslab+0x9/0x14 [ 343.952503][T18748] kmem_cache_alloc_node+0x264/0x710 [ 343.957802][T18748] ? nla_memcpy+0xb0/0xb0 [ 343.962155][T18748] __alloc_skb+0xd5/0x5e0 [ 343.966509][T18748] ? skb_trim+0x190/0x190 [ 343.970379][T18760] FAULT_INJECTION: forcing a failure. [ 343.970379][T18760] name failslab, interval 1, probability 0, space 0, times 0 [ 343.970853][T18748] ? nla_parse+0x45/0x60 [ 343.970883][T18748] inet6_netconf_get_devconf+0x2b4/0xb90 [ 343.993512][T18748] ? find_held_lock+0x35/0x130 [ 343.998282][T18748] ? addrconf_sysctl_stable_secret+0x760/0x760 [ 344.004454][T18748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.010704][T18748] ? addrconf_sysctl_stable_secret+0x760/0x760 [ 344.016991][T18748] ? kasan_check_read+0x11/0x20 [ 344.021859][T18748] ? addrconf_sysctl_stable_secret+0x760/0x760 [ 344.028024][T18748] rtnetlink_rcv_msg+0x83c/0xb00 [ 344.033005][T18748] ? rtnetlink_put_metrics+0x560/0x560 [ 344.038476][T18748] ? netdev_pick_tx+0x300/0x300 [ 344.043337][T18748] ? netlink_deliver_tap+0x22d/0xc00 [ 344.048634][T18748] ? find_held_lock+0x35/0x130 [ 344.053415][T18748] netlink_rcv_skb+0x17a/0x460 [ 344.058193][T18748] ? rtnetlink_put_metrics+0x560/0x560 [ 344.063687][T18748] ? netlink_ack+0xb50/0xb50 [ 344.068381][T18748] ? kasan_check_read+0x11/0x20 [ 344.073270][T18748] ? netlink_deliver_tap+0x254/0xc00 [ 344.078684][T18748] rtnetlink_rcv+0x1d/0x30 [ 344.083202][T18748] netlink_unicast+0x536/0x720 [ 344.088500][T18748] ? netlink_attachskb+0x770/0x770 [ 344.093620][T18748] ? _copy_from_iter_full+0x25d/0x900 [ 344.099006][T18748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.105302][T18748] netlink_sendmsg+0x8ae/0xd70 [ 344.110431][T18748] ? netlink_unicast+0x720/0x720 [ 344.115379][T18748] ? tomoyo_socket_sendmsg+0x26/0x30 [ 344.120669][T18748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.126925][T18748] ? security_socket_sendmsg+0x93/0xc0 [ 344.132495][T18748] ? netlink_unicast+0x720/0x720 [ 344.137442][T18748] sock_sendmsg+0xdd/0x130 [ 344.141868][T18748] sock_write_iter+0x27c/0x3e0 [ 344.146643][T18748] ? sock_sendmsg+0x130/0x130 [ 344.151334][T18748] ? inode_has_perm+0x1b0/0x230 [ 344.156200][T18748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 344.162446][T18748] ? iov_iter_init+0xee/0x220 [ 344.167133][T18748] new_sync_write+0x4c7/0x760 [ 344.171832][T18748] ? default_llseek+0x2e0/0x2e0 [ 344.176718][T18748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.182976][T18748] ? security_file_permission+0x94/0x380 [ 344.188622][T18748] __vfs_write+0xe4/0x110 [ 344.192957][T18748] vfs_write+0x20c/0x580 [ 344.197217][T18748] ksys_write+0x14f/0x2d0 [ 344.201596][T18748] ? __ia32_sys_read+0xb0/0xb0 [ 344.206462][T18748] ? do_syscall_64+0x26/0x610 [ 344.211149][T18748] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.217256][T18748] ? do_syscall_64+0x26/0x610 [ 344.221994][T18748] __x64_sys_write+0x73/0xb0 [ 344.226598][T18748] do_syscall_64+0x103/0x610 [ 344.231214][T18748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.237105][T18748] RIP: 0033:0x4582b9 [ 344.241001][T18748] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.260698][T18748] RSP: 002b:00007ffb8c88cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 344.269116][T18748] RAX: ffffffffffffffda RBX: 00007ffb8c88cc90 RCX: 00000000004582b9 [ 344.277454][T18748] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 344.285527][T18748] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 344.293500][T18748] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb8c88d6d4 [ 344.301551][T18748] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 [ 344.309638][T18760] CPU: 0 PID: 18760 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #60 [ 344.317814][T18760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.327880][T18760] Call Trace: [ 344.331201][T18760] dump_stack+0x172/0x1f0 [ 344.335765][T18760] should_fail.cold+0xa/0x15 [ 344.340384][T18760] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 344.346222][T18760] ? ___might_sleep+0x163/0x280 [ 344.351106][T18760] __should_failslab+0x121/0x190 [ 344.353108][T18762] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=18762 comm=syz-executor.2 [ 344.356185][T18760] should_failslab+0x9/0x14 [ 344.356203][T18760] kmem_cache_alloc+0x2b2/0x6f0 [ 344.356229][T18760] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.384772][T18760] ? __validate_process_creds+0x22d/0x380 [ 344.390531][T18760] prepare_creds+0x3e/0x3f0 [ 344.395091][T18760] __sys_setuid+0xa2/0x450 [ 344.399513][T18760] __x64_sys_setuid+0x31/0x40 [ 344.404319][T18760] do_syscall_64+0x103/0x610 [ 344.408899][T18760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.414795][T18760] RIP: 0033:0x4582b9 [ 344.418866][T18760] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.438747][T18760] RSP: 002b:00007f65612aac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000069 20:59:42 executing program 0 (fault-call:1 fault-nth:4): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00042bbd7000fda0184d3d792c238800000002410000001000000000000000007a3000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') [ 344.447149][T18760] RAX: ffffffffffffffda RBX: 00007f65612aac90 RCX: 00000000004582b9 [ 344.455116][T18760] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000c00 [ 344.463074][T18760] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 344.474110][T18760] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f65612ab6d4 [ 344.482091][T18760] R13: 00000000004c64b9 R14: 00000000004db900 R15: 0000000000000005 20:59:42 executing program 4 (fault-call:2 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:42 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x6406}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x9455, 0x1, 0x0, 0x7ff, r2}, 0x10) 20:59:42 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r1) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) [ 344.551907][T18768] FAULT_INJECTION: forcing a failure. [ 344.551907][T18768] name failslab, interval 1, probability 0, space 0, times 0 [ 344.641482][T18768] CPU: 0 PID: 18768 Comm: syz-executor.0 Not tainted 5.1.0-rc4+ #60 [ 344.649512][T18768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.659572][T18768] Call Trace: [ 344.662878][T18768] dump_stack+0x172/0x1f0 [ 344.667228][T18768] should_fail.cold+0xa/0x15 [ 344.671848][T18768] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 344.677675][T18768] ? ___might_sleep+0x163/0x280 [ 344.682540][T18768] __should_failslab+0x121/0x190 [ 344.687483][T18768] should_failslab+0x9/0x14 [ 344.691995][T18768] kmem_cache_alloc_node_trace+0x270/0x720 [ 344.697823][T18768] __kmalloc_node_track_caller+0x3d/0x70 [ 344.703468][T18768] __kmalloc_reserve.isra.0+0x40/0xf0 [ 344.703898][T18779] FAULT_INJECTION: forcing a failure. [ 344.703898][T18779] name failslab, interval 1, probability 0, space 0, times 0 [ 344.708855][T18768] __alloc_skb+0x10b/0x5e0 [ 344.708873][T18768] ? skb_trim+0x190/0x190 [ 344.708891][T18768] ? nla_parse+0x45/0x60 [ 344.708919][T18768] inet6_netconf_get_devconf+0x2b4/0xb90 [ 344.740338][T18768] ? find_held_lock+0x35/0x130 [ 344.745130][T18768] ? addrconf_sysctl_stable_secret+0x760/0x760 [ 344.751312][T18768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.757563][T18768] ? addrconf_sysctl_stable_secret+0x760/0x760 [ 344.763727][T18768] ? kasan_check_read+0x11/0x20 [ 344.768588][T18768] ? addrconf_sysctl_stable_secret+0x760/0x760 [ 344.774754][T18768] rtnetlink_rcv_msg+0x83c/0xb00 [ 344.779706][T18768] ? rtnetlink_put_metrics+0x560/0x560 [ 344.785182][T18768] ? __lockdep_free_key_range+0x120/0x120 [ 344.790936][T18768] ? netdev_pick_tx+0x300/0x300 [ 344.795790][T18768] ? netlink_deliver_tap+0x22d/0xc00 [ 344.801081][T18768] ? find_held_lock+0x35/0x130 [ 344.805852][T18768] netlink_rcv_skb+0x17a/0x460 [ 344.810642][T18768] ? rtnetlink_put_metrics+0x560/0x560 [ 344.816108][T18768] ? netlink_ack+0xb50/0xb50 [ 344.820716][T18768] ? kasan_check_read+0x11/0x20 [ 344.825575][T18768] ? netlink_deliver_tap+0x254/0xc00 [ 344.830869][T18768] rtnetlink_rcv+0x1d/0x30 [ 344.835296][T18768] netlink_unicast+0x536/0x720 20:59:42 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r1) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) [ 344.840068][T18768] ? netlink_attachskb+0x770/0x770 [ 344.845188][T18768] ? _copy_from_iter_full+0x25d/0x900 [ 344.850569][T18768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.856910][T18768] netlink_sendmsg+0x8ae/0xd70 [ 344.861772][T18768] ? netlink_unicast+0x720/0x720 [ 344.866746][T18768] ? tomoyo_socket_sendmsg+0x26/0x30 [ 344.872070][T18768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.878320][T18768] ? security_socket_sendmsg+0x93/0xc0 [ 344.883811][T18768] ? netlink_unicast+0x720/0x720 [ 344.888772][T18768] sock_sendmsg+0xdd/0x130 [ 344.893207][T18768] sock_write_iter+0x27c/0x3e0 [ 344.898008][T18768] ? sock_sendmsg+0x130/0x130 [ 344.902702][T18768] ? inode_has_perm+0x1b0/0x230 [ 344.907740][T18768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 344.913986][T18768] ? iov_iter_init+0xee/0x220 [ 344.918673][T18768] new_sync_write+0x4c7/0x760 [ 344.923360][T18768] ? default_llseek+0x2e0/0x2e0 [ 344.928241][T18768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.934488][T18768] ? security_file_permission+0x94/0x380 20:59:43 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r1) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) [ 344.940129][T18768] __vfs_write+0xe4/0x110 [ 344.944473][T18768] vfs_write+0x20c/0x580 [ 344.948726][T18768] ksys_write+0x14f/0x2d0 [ 344.953068][T18768] ? __ia32_sys_read+0xb0/0xb0 [ 344.957839][T18768] ? do_syscall_64+0x26/0x610 [ 344.962521][T18768] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.968590][T18768] ? do_syscall_64+0x26/0x610 [ 344.973280][T18768] __x64_sys_write+0x73/0xb0 [ 344.977896][T18768] do_syscall_64+0x103/0x610 [ 344.982504][T18768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.988543][T18768] RIP: 0033:0x4582b9 [ 344.992444][T18768] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.012487][T18768] RSP: 002b:00007ffb8c88cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 345.020901][T18768] RAX: ffffffffffffffda RBX: 00007ffb8c88cc90 RCX: 00000000004582b9 [ 345.028874][T18768] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 345.036850][T18768] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 345.044828][T18768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb8c88d6d4 [ 345.052893][T18768] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 [ 345.068763][T18779] CPU: 1 PID: 18779 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #60 [ 345.076773][T18779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.086837][T18779] Call Trace: [ 345.090244][T18779] dump_stack+0x172/0x1f0 [ 345.094598][T18779] should_fail.cold+0xa/0x15 [ 345.099204][T18779] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 345.105023][T18779] ? ___might_sleep+0x163/0x280 [ 345.109882][T18779] __should_failslab+0x121/0x190 [ 345.114971][T18779] should_failslab+0x9/0x14 [ 345.119478][T18779] __kmalloc+0x2dc/0x740 [ 345.123728][T18779] ? refcount_inc_not_zero_checked+0x144/0x200 [ 345.129988][T18779] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 345.130007][T18779] ? security_prepare_creds+0x123/0x190 [ 345.130026][T18779] security_prepare_creds+0x123/0x190 [ 345.130048][T18779] prepare_creds+0x2f5/0x3f0 [ 345.142398][T18779] __sys_setuid+0xa2/0x450 [ 345.142419][T18779] __x64_sys_setuid+0x31/0x40 [ 345.142435][T18779] do_syscall_64+0x103/0x610 [ 345.142454][T18779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.142465][T18779] RIP: 0033:0x4582b9 [ 345.142479][T18779] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.142487][T18779] RSP: 002b:00007f65612aac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000069 [ 345.142508][T18779] RAX: ffffffffffffffda RBX: 00007f65612aac90 RCX: 00000000004582b9 [ 345.214539][T18779] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000c00 [ 345.222813][T18779] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 345.230841][T18779] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f65612ab6d4 20:59:43 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x9, 0x6800) setuid(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') connect$unix(r2, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 20:59:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:43 executing program 0 (fault-call:1 fault-nth:5): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 345.238997][T18779] R13: 00000000004c64b9 R14: 00000000004db900 R15: 0000000000000005 20:59:43 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@rand_addr=0x9, @in=@remote, 0x4e21, 0x1ff, 0x4e20, 0x2, 0xa, 0x0, 0xa0, 0x67, 0x0, r1}, {0xfffffffffffffff7, 0x1, 0x1, 0x200, 0xcac, 0xdc2c, 0x1c6, 0xd2}, {0x1, 0x7, 0x1000, 0x8}, 0x10001, 0x0, 0x1, 0x0, 0x3, 0x2}, {{@in=@loopback, 0x4d6, 0xff}, 0x0, @in6=@remote, 0x0, 0x3, 0x1, 0x100, 0x9, 0x6, 0x5}}, 0xe8) 20:59:43 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:43 executing program 4 (fault-call:2 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x7, 0x7, 0x9, 0x13, 0x0, 0x70bd2d, 0x25dfdbff, [@sadb_x_policy={0x8, 0x12, 0x4, 0x6, 0x0, 0x6e6bb6, 0x6, {0x6, 0x3c, 0x9, 0x5, 0x0, 0x2, 0x0, @in6=@loopback, @in6=@loopback}}, @sadb_x_nat_t_type={0x1, 0x14, 0x400}, @sadb_lifetime={0x4, 0x2, 0x9, 0xffffffffffffffff, 0x8001, 0x6a}, @sadb_sa={0x2, 0x1, 0x4d5, 0xd98, 0x5, 0x78, 0x4, 0xe0000000}, @sadb_sa={0x2, 0x1, 0x4d3, 0x5e, 0x7, 0x4b, 0x3, 0x20000000}]}, 0x98}}, 0x4000850) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000240)=""/16) socket$key(0xf, 0x3, 0x2) setuid(r2) syz_mount_image$nfs4(&(0x7f00000001c0)='nfs4\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x1, &(0x7f0000000280)=[{&(0x7f0000000240), 0x0, 0x4}], 0x1000000, &(0x7f00000002c0)='fd/.\x00') syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') [ 345.362950][T18803] FAULT_INJECTION: forcing a failure. [ 345.362950][T18803] name failslab, interval 1, probability 0, space 0, times 0 20:59:43 executing program 5: r0 = socket(0x10, 0x4, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0f"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r5) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') [ 345.423953][T18808] FAULT_INJECTION: forcing a failure. [ 345.423953][T18808] name failslab, interval 1, probability 0, space 0, times 0 20:59:43 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) [ 345.493656][T18808] CPU: 1 PID: 18808 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #60 [ 345.501692][T18808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.511777][T18808] Call Trace: [ 345.515101][T18808] dump_stack+0x172/0x1f0 [ 345.519451][T18808] should_fail.cold+0xa/0x15 [ 345.524053][T18808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 345.529868][T18808] ? ___might_sleep+0x163/0x280 [ 345.534730][T18808] __should_failslab+0x121/0x190 [ 345.539679][T18808] should_failslab+0x9/0x14 [ 345.544190][T18808] kmem_cache_alloc+0x2b2/0x6f0 [ 345.549064][T18808] ? trace_hardirqs_on+0x67/0x230 [ 345.554084][T18808] ? kasan_check_read+0x11/0x20 [ 345.558936][T18808] alloc_uid+0x148/0x4d0 [ 345.563183][T18808] ? free_uid+0x250/0x250 [ 345.567510][T18808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.573749][T18808] ? security_capable+0x9b/0xd0 [ 345.578615][T18808] set_user.isra.0+0x1e/0x210 [ 345.583312][T18808] __sys_setuid+0x226/0x450 [ 345.587823][T18808] __x64_sys_setuid+0x31/0x40 [ 345.592503][T18808] do_syscall_64+0x103/0x610 [ 345.597930][T18808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.603867][T18808] RIP: 0033:0x4582b9 [ 345.607767][T18808] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.627382][T18808] RSP: 002b:00007f65612aac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000069 [ 345.635793][T18808] RAX: ffffffffffffffda RBX: 00007f65612aac90 RCX: 00000000004582b9 [ 345.643760][T18808] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000c00 [ 345.651727][T18808] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 345.659691][T18808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f65612ab6d4 [ 345.667657][T18808] R13: 00000000004c64b9 R14: 00000000004db900 R15: 0000000000000005 20:59:43 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000100)={0xaed, 0x0, [], {0x0, @reserved}}) keyctl$chown(0x16, 0x0, 0x0, 0x0) [ 345.709044][T18803] CPU: 0 PID: 18803 Comm: syz-executor.0 Not tainted 5.1.0-rc4+ #60 [ 345.717058][T18803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.727323][T18803] Call Trace: [ 345.730661][T18803] dump_stack+0x172/0x1f0 [ 345.735003][T18803] should_fail.cold+0xa/0x15 [ 345.739609][T18803] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 345.745439][T18803] __should_failslab+0x121/0x190 [ 345.750381][T18803] should_failslab+0x9/0x14 [ 345.754896][T18803] kmem_cache_alloc+0x47/0x6f0 [ 345.759672][T18803] ? lock_acquire+0x16f/0x3f0 [ 345.764352][T18803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.770598][T18803] skb_clone+0x150/0x3b0 [ 345.774854][T18803] netlink_deliver_tap+0x95c/0xc00 [ 345.779980][T18803] __netlink_sendskb+0x63/0xd0 [ 345.784758][T18803] netlink_unicast+0x60f/0x720 [ 345.789525][T18803] ? netlink_attachskb+0x770/0x770 [ 345.794637][T18803] ? inet6_fill_ifaddr+0xce0/0xce0 [ 345.799752][T18803] rtnl_unicast+0x4c/0x70 [ 345.804078][T18803] inet6_netconf_get_devconf+0x3bc/0xb90 [ 345.809714][T18803] ? addrconf_sysctl_stable_secret+0x760/0x760 [ 345.815889][T18803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.822128][T18803] ? addrconf_sysctl_stable_secret+0x760/0x760 [ 345.828292][T18803] ? kasan_check_read+0x11/0x20 [ 345.833143][T18803] ? addrconf_sysctl_stable_secret+0x760/0x760 [ 345.839313][T18803] rtnetlink_rcv_msg+0x83c/0xb00 [ 345.844251][T18803] ? rtnetlink_put_metrics+0x560/0x560 [ 345.849709][T18803] ? netdev_pick_tx+0x300/0x300 [ 345.854559][T18803] ? netlink_deliver_tap+0x22d/0xc00 [ 345.859841][T18803] ? find_held_lock+0x35/0x130 [ 345.864603][T18803] netlink_rcv_skb+0x17a/0x460 [ 345.869384][T18803] ? rtnetlink_put_metrics+0x560/0x560 [ 345.874839][T18803] ? netlink_ack+0xb50/0xb50 [ 345.879429][T18803] ? kasan_check_read+0x11/0x20 [ 345.884303][T18803] ? netlink_deliver_tap+0x254/0xc00 [ 345.889591][T18803] rtnetlink_rcv+0x1d/0x30 [ 345.894001][T18803] netlink_unicast+0x536/0x720 [ 345.898764][T18803] ? netlink_attachskb+0x770/0x770 [ 345.903873][T18803] ? _copy_from_iter_full+0x25d/0x900 [ 345.909242][T18803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.915489][T18803] netlink_sendmsg+0x8ae/0xd70 [ 345.920276][T18803] ? netlink_unicast+0x720/0x720 [ 345.925223][T18803] ? tomoyo_socket_sendmsg+0x26/0x30 [ 345.930528][T18803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.936771][T18803] ? security_socket_sendmsg+0x93/0xc0 [ 345.942867][T18803] ? netlink_unicast+0x720/0x720 [ 345.947805][T18803] sock_sendmsg+0xdd/0x130 [ 345.952226][T18803] sock_write_iter+0x27c/0x3e0 [ 345.957005][T18803] ? sock_sendmsg+0x130/0x130 [ 345.961711][T18803] ? inode_has_perm+0x1b0/0x230 [ 345.966563][T18803] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 345.972800][T18803] ? iov_iter_init+0xee/0x220 [ 345.977568][T18803] new_sync_write+0x4c7/0x760 [ 345.982247][T18803] ? default_llseek+0x2e0/0x2e0 [ 345.987114][T18803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.993357][T18803] ? security_file_permission+0x94/0x380 [ 345.998990][T18803] __vfs_write+0xe4/0x110 [ 346.003324][T18803] vfs_write+0x20c/0x580 [ 346.007570][T18803] ksys_write+0x14f/0x2d0 [ 346.011909][T18803] ? __ia32_sys_read+0xb0/0xb0 [ 346.016672][T18803] ? do_syscall_64+0x26/0x610 [ 346.021347][T18803] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.027420][T18803] ? do_syscall_64+0x26/0x610 [ 346.032100][T18803] __x64_sys_write+0x73/0xb0 [ 346.036775][T18803] do_syscall_64+0x103/0x610 [ 346.041364][T18803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.047253][T18803] RIP: 0033:0x4582b9 [ 346.051183][T18803] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.070788][T18803] RSP: 002b:00007ffb8c88cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 346.079194][T18803] RAX: ffffffffffffffda RBX: 00007ffb8c88cc90 RCX: 00000000004582b9 [ 346.087169][T18803] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 346.095133][T18803] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 346.103119][T18803] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb8c88d6d4 20:59:44 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffe5b) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x80, 0x20000) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) [ 346.111176][T18803] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 20:59:44 executing program 0 (fault-call:1 fault-nth:6): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:44 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) getsockname$ax25(r0, &(0x7f0000000080)={{0x3, @null}, [@null, @rose, @remote, @netrom, @null, @rose, @netrom, @null]}, &(0x7f0000000100)=0x48) keyctl$chown(0x16, 0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x280000, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000040)) 20:59:44 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setuid(0x0) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:44 executing program 4 (fault-call:2 fault-nth:3): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) syz_open_procfs(r2, &(0x7f0000000000)='fd/.\x00') sched_yield() 20:59:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:44 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000001c0)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:44 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4) 20:59:44 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x7, 0x1, 0x200) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x1, 0x9}, 0x58}, 0x10) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:44 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x501000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x2000, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f00000000c0)="45d8248f430f07c4622d0cba36000000672e0f09e8f5b8fc95c461f97e1a410f35c744240000400000c74424026f76a9dec7442406000000000f011424c4a12d6840fe470f01c9", 0x47}], 0x1, 0x40, &(0x7f00000001c0)=[@dstype3={0x7, 0x1}], 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:44 executing program 4: socketpair$unix(0x1, 0xa, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x80) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 20:59:44 executing program 1: r0 = socket(0x10, 0x6, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000080)=""/45) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x10000, 0x9, 0x2, 0x1000}, {0x28, 0x400, 0x5, 0x10001}, {0x8, 0x1, 0x4, 0xffffffffffffff77}, {0x715, 0x8, 0x9}]}) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:44 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:44 executing program 5: r0 = socket(0x10, 0x2, 0x0) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() getresuid(&(0x7f0000001800), &(0x7f0000001840)=0x0, &(0x7f0000001880)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000018c0)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000019c0)=0xe8) syz_mount_image$ntfs(&(0x7f0000000180)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x9, &(0x7f0000001640)=[{&(0x7f0000000200)="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", 0xfb, 0x6}, {&(0x7f0000000300)="bac17f82177dbf86309d78c110af4f2cde11d97bfd471e728915137c023ca11e167b2693f9dc77a800d37de9a9f60d101d7b0212670ef1accdec89d11587642696e0c3b8f5f286c07aa7d9562f51630e719f7d1c1e12713cbb0b521f0a5b6e89daf0830d029e54cf815f75f9b48a5d1bb6f8f4816ca31e49a599052588ff8859fb58b980d1f3d7e98a104596110612a48ebc046d9992b411c9ccbfc0fd8626dda577690826d08912d3c864d412daeaee5719", 0xb2}, {&(0x7f00000003c0)="1b11c7b54974e086fe09c221acfa518d0312f7d91e2eb39e8bfc922f6530f4781ca1579ad512693da6e2f7c2907d6402a0b5fc544a", 0x35, 0x6}, {&(0x7f0000000400)="4cdec67b0db55964587a", 0xa}, {&(0x7f0000000440)="a0e94681564df857c5bd7a054c5946f17b3856a4b8bce981f7855327484c010652e58c006e711cfe888b26c594689ba649cc1b1f9ab99ae5a9a573b307937dd3d35d08a7c8186e21bb04a5b0130efd56c8f1c84dd41652d94eaeb35a505fa6d2466d6232143cd822242e0feba04965282c1a723bcba61ed4723bbbf5a64bd71df9eacc9df32ec6053944b83a0bfae32213c5c20c53ff8b79089ed61303b8f3c7c05d", 0xa2, 0x4419}, {&(0x7f0000000500)="f4fbd16ceda46dee873cba8fcf41552a1fce681fc9d8da57", 0x18, 0x7}, {&(0x7f0000000540)="069e0aa82c285ec23afb3a6b28c8bbac325f8a713df849a65f7a3ee80d0b05878258d73a191427a9a938b295fa788fbfe6d5e2227af5c0151af9a0d3ecde85e46d2ce01a66edd73ea755020c4859c7bd6d9d1aed5e0e", 0x56, 0x3ff}, {&(0x7f00000005c0)="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", 0x1000, 0xfffffffffffff84c}, {&(0x7f00000015c0)="c34bacab749a17f6d795c91586d1c6d7244c764c31a8cd63b9dc6e21cd70b9f293bfd18b79340a28015364f3fb51a3161cd4697afd8692c77e6d1f0a2d811475c211203675317d33ed20f6b1859d6701ec94a30ea685363668c3c095792d1e278d28", 0x62, 0xc03}], 0x80040, &(0x7f0000001a00)={[{@gid={'gid', 0x3d, r1}}, {@case_sensitive_yes='case_sensitive=yes'}, {@umask={'umask', 0x3d, 0x7}}, {@gid={'gid', 0x3d, r2}}, {@uid={'uid', 0x3d, r3}}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}, {@errors_recover='errors=recover'}, {@errors_continue='errors=continue'}], [{@seclabel='seclabel'}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, r4}}, {@pcr={'pcr', 0x3d, 0xf}}]}) r5 = shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_STAT(r5, 0x2, &(0x7f0000000000)=""/71) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x1ff}, &(0x7f00000000c0)=0x8) r7 = open(&(0x7f0000001c00)='./file0\x00', 0x10002, 0x10) ioctl$KVM_SET_PIT2(r7, 0x4070aea0, &(0x7f0000001c40)={[{0x1, 0xcc, 0x9, 0x100, 0xfffffffffffffffb, 0x1, 0x100000001, 0x7, 0x8000000000000000, 0x6, 0x1ff, 0x120, 0x7f}, {0xffffffffffffffff, 0x3ff, 0x2, 0xd2, 0x0, 0x20, 0x7ff, 0x0, 0x0, 0xf5, 0x7, 0x5, 0xe}, {0xbdc2, 0x100, 0x2, 0x100000001, 0x6, 0xdb, 0x2, 0x2, 0x6, 0x5, 0x0, 0x2, 0x7}], 0x7f}) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={r6, 0x9d81}, &(0x7f0000000140)=0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r8) r9 = syz_open_dev$mice(&(0x7f0000001b40)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r9, 0x8048ae66, &(0x7f0000001b80)={[{0x2, 0xa5a, 0x5, 0x555b, 0x34c20f33, 0xb074, 0x2, 0x4, 0x9, 0x3, 0x8, 0x0, 0x9}, {0x15c, 0xf2e, 0x2, 0x7, 0x3, 0x8b, 0x200, 0xb176, 0x1, 0x9, 0x905, 0xffff, 0x9}, {0xf81, 0x7fff, 0x0, 0x5, 0x10000, 0x9, 0x8a1, 0x14a, 0x5, 0x5, 0x20, 0x9, 0x2}], 0x40}) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x10400, 0x0) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f00000000c0)={0xa, {0x80, 0x81, 0x7fff, 0x20}, {0x2, 0x10000, 0x2, 0x8}, {0x6, 0x4}}) setuid(r1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10000, 0x0) write$P9_RREMOVE(r3, &(0x7f0000000040)={0x7, 0x7b, 0x2}, 0x7) 20:59:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) r0 = socket(0x10, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@remote}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/user\x00', 0x2, 0x0) setuid(r2) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x9, 0x8100, 0x7, 0x9ed, 0xffffffffffffffc0, 0x7, 0x200, {0x0, @in6={{0xa, 0x4e23, 0x1, @remote, 0x5}}, 0x0, 0x80000000, 0x9, 0x9, 0xffffffff}}, &(0x7f00000003c0)=0xb0) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000400)=@assoc_id=r3, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') syz_open_procfs(r1, &(0x7f0000000080)='net/stat\x00') setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000100)=[{0x80, 0x8f30, 0x5, 0x7}, {0x9, 0x0, 0x3f, 0xf1ee}]}, 0x10) 20:59:44 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 20:59:44 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x8a, {0xd7, 0xffffffff, 0x7, 0x4, 0xc794, 0x1}, 0x5, 0x7c1}, 0xe) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) fstat(r0, &(0x7f0000000080)) setuid(r2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x202080, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f0000000040)={0x7, 0x8000}) 20:59:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="0f00000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:45 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 20:59:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = dup2(r4, r3) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000001c0), 0x3e5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4}, 0x1c) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x27) fcntl$setstatus(r5, 0x4, 0x427ff) setuid(r2) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) 20:59:45 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400, 0x0) write$P9_RRENAME(r1, &(0x7f0000000080)={0x7, 0x15, 0x1}, 0x7) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3e86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:45 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f0000000080)={0x268, r2, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x554}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x637}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0xa8, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x401, @empty, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7, @loopback, 0xec}}}}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x37}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x26}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1000000000000000}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}]}, 0x268}, 0x1, 0x0, 0x0, 0x4040}, 0x4000000) 20:59:45 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 20:59:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1000, 0x4000) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000180)={0xd1, "a76313f4dafc7b0cf94d23823cdfb73763e181382677a915788e260626df23c4ba0e4d84115d69ef834aafe3c021bc051709cedee43cec82cf22891184d432523fd068e3519373296271caac82df7effe192ead36c847b5aeb07cdeaf781d841236802d4404100ecfb34a60eddd92240a7bebdbc6b7e79849b44517cb92c84397483288f189244bc3b6814b42d94d6ec28cde71eb9e207998e613cd5820289c84b838d62653d70b404f23abbe3d854b6c98ea721bbf4d171aaedb8a014b99ba65a9f720393d02ddab53410b28bde45a848"}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') read$eventfd(r4, &(0x7f0000000000), 0x8) 20:59:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x18000, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) 20:59:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1000000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:45 executing program 5: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x800) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e21, 0xfffffffffffff684, @remote, 0x2}}, 0x4f14, 0x5, 0x9, 0x400, 0x4}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={r1, 0x8000, 0x7fff, 0x81, 0x75, 0x7fffffff, 0x0, 0x8, {r2, @in={{0x2, 0x4e22, @multicast1}}, 0x1, 0x7, 0xe988, 0x8, 0x8}}, &(0x7f00000002c0)=0xb0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:45 executing program 3 (fault-call:3 fault-nth:0): r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="3500000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0xe179}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000100)={0x1, 0x4}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setuid(r3) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') 20:59:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x201, 0x70bd29, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x404c004) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000240)={r4, 0x2}) 20:59:45 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xfffffd1c) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f00000002c0)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000300)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000340)={r4, r5, 0x2}) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2) ioctl$VIDIOC_CROPCAP(r3, 0xc02c563a, &(0x7f00000003c0)={0x3, {0x0, 0x3, 0x7, 0x7f}, {0xfffffffffffffff7, 0x0, 0x1, 0x9}, {0x7, 0x80}}) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000100)="079f0b2deacbf1828bdc47afd990186290a0f68a6443471e2872356876afec604f45cc7861ff5b64e060ace90eee2bfad71e78e2a510984b33cab6323b87801dbfb180feb4383d9b6a64e046ce69a220f3f729a51dd6c7f9cc65ee0fe0a96981b6943915e0689beb0e452e3f90b4ca05e6063c9312a0dee6c9ed2b04aa4ecbd1eaec25b1ed8240c87258d1672f543f2e7b847f24", 0x94) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) setuid(r1) r7 = request_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='/dev/loop#\x00', 0xfffffffffffffffc) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000380), 0x4) keyctl$chown(0x16, r7, 0x0, r2) 20:59:45 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r2) syz_open_procfs(r1, &(0x7f0000000040)='\x00\x00\x00\x00\x00') 20:59:45 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="5200000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 20:59:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000040)='fd/.\x00') ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000000)) 20:59:45 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) accept4(r0, &(0x7f0000000000)=@in={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x80, 0x80800) sysfs$2(0x2, 0x7, &(0x7f00000000c0)=""/192) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="c000000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:45 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, &(0x7f0000000500)=[{&(0x7f0000000180)="fb580f94111e55cdb34bf64a4e1911ebb0fde75c815a41c01142f42a62118ae2f5a59eeb1b05b50fd61c5ca1472c71198e991825fa354d9a9788254f2747dfc8c5bae776d15f402098e124b0d7521f1c45fb41849af18ea4663572424c69e44e4c4127cc2f98884e1f234fc9846e9d40b60c328245d23cec5ac545ac7a5f5047c8a951c57b33d5d65777fca1cfd6945172ca9fe664ea81de029c8c76e1e086144ae31bb05eacfaf121cbedfa3fbbd6d25ecd36bceb6a11a583d6cb7da6e34025ce1bfa16ea40c0161abcd45c82a7610b1d80193faedfa76940edad90d501425aa47967ae472ce35b1b5ba5d98b6d8f84", 0xf0, 0x6}, {&(0x7f0000000280)="ad3fbbaa95e2e252e245ac5747d6aa991a0d5c0f7294acefa3773caa4cc986e95ced030c7a6480cef54b24", 0x2b}, {&(0x7f00000002c0)="9c1891682f6b8fca39d4149fcdc1edd4a911e96ddb658b9d52751d047e31b964ed1931aef25ffc9ce36c7e5e85c81f388fe9ea826b5184619cc6ff47600d484b56afce76b6f2eb8937c3f95a2f390a0f179edff09d46790b203e67bb39e5fcd6ed8757a87b76fcb3ba587a5d10acd42f6c9d15a1cd3d915d0781ee7a4c815f22ac2db87b149ae0e7daabc45516", 0x8d, 0x4069}, {&(0x7f0000000380)="60337af19715933a8301328a889370b05a39ea2061784c571c7e8f2722516a05e67fb9206d9a129fcd18c2740f1945243eab662e4f932371a9a91b2d4a05820098a2aa61b28e10c84bffd7fbfc2ba0f8a145c7c919bb8ad4dfc04c9ae1b9b60023f96daa5106bc38b750939333cdf235166d7796317cc6d84a0e1054869cff8509176d343b69a8230252aedbc62383c574ddbb2c7ef1ab866a7ff9212fe25a54ac777e9db452", 0xa6, 0x6}, {&(0x7f0000000440)="56028248f8485989211f8b408112df0099e8902822defe103f10266cb8e60c61b7d5132345389c08d47d84fc3daf9f87433bb69a312ad99d3045b5531c7568c0ea828d9f8b1bdf08f1e79494ef79225f63e6220ea7da5cde6499475dc060b24bc0b245d8e3794d2e836f5880307b92dbd05c190220b51df637cfc454be4e66bc73c434a4cce3a3a14b9cae2c44f9a2fa24632940", 0x94, 0x7}], 0x204018, &(0x7f0000000680)=ANY=[@ANYBLOB="6572726f72733d636f6e74696e75652c6e6f646973636172642c71756f74612c6572726f72733d72656d6f756e742d726f2c726573697ab70a303030303030303030303066662c6e6f646973636172642c71756f74612c646973636172642c686173682c00430ce360e9a964ce9835902da9682f1dbcb466c598ff0796dd14a610d35a96fff84004d78317727c7dc58610407f77aa3db8d1000000000348dc4cbfafbba3d1ea414b8f6321653dc2abbffe13b9385626c171ec542889414fb7cdc2386a9e2eeca2fe83e01e22198fafa1bc69d49f3e9fe0b9454b1f549ed37ced513c3e44626530154bed1ee607010a96e874b0e6"]) setuid(r1) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x400800) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f0000000040)=0x6) renameat2(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x2, 0x10, 0x1f}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r2, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0x40, 0x0, 0xfffffffffffffc01, 0xffff, 0xae1, 0x4, 0x200, 0x101, 0x3, 0x100000001, 0x2, 0x99, 0x6, 0x0, 0x1ab]}, &(0x7f0000000280)=0x100) setuid(r1) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x100) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000040)={0x200, 0x5a2, 0x4, 0x3, 0x1f, 0x1}) 20:59:45 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000000)=""/59, &(0x7f0000000040)=0x3b) ioctl$KVM_CREATE_PIT2(0xffffffffffffff9c, 0x4040ae77, &(0x7f0000000080)={0x2c}) 20:59:46 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x10, 0x800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000000)=0xfffffffffffffe44) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:46 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x3, 'caif0\x00'}, 0x18) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') [ 347.938243][T18997] jfs: Unrecognized mount option "resiz· [ 347.938243][T18997] 00000000000ff" or missing value 20:59:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = dup3(r0, r1, 0xfffffffffffffffe) write$UHID_CREATE2(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b200ff0300000000070000000800000005000000e0fed49dad95765e65998c77c210976e032607885dc8a4315f9169b460b70de57c020364e8ec1abcf36eb358e3774667560dd2e76f23474bf3faa3b5949b22a11fd0c5bf2baa0c2d5be121081a0d24055182e5531bb908fa40916401430e81d0208f59bec6759d37f7936d44ac1ac5bba0f1d191847e16e5e5368a206e874dffffffffffffffffc418fbfed0db456c03e86688af3e8da4fe90f3ad29529b0e095aa1bff41794ed228e8ed743c24e2199ba5f"], 0x1ca) 20:59:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="c00e000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:46 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x460003, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000100)={0x7, 0x4d, 0x1}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10004, 0xeefffdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 20:59:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000180)={0x3}) r3 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='mime_typesystemem0\x00', 0xfffffffffffffff9) r4 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r4) keyctl$negate(0xd, r3, 0x91df, r4) 20:59:46 executing program 3: prctl$PR_SET_FP_MODE(0x2d, 0x2) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) inotify_init() modify_ldt$write(0x1, &(0x7f0000000040)={0x80000001, 0x20100000, 0x4000, 0x3, 0x9, 0xfffffffffffffffa, 0x3, 0x5f, 0xfff, 0x400}, 0x10) setuid(r1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) renameat2(0xffffffffffffffff, 0x0, r2, 0x0, 0x4) 20:59:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="effd000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:46 executing program 1: r0 = socket(0x2000013, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r1, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r2) ioctl$KVM_SET_REGS(0xffffffffffffff9c, 0x4090ae82, &(0x7f00000001c0)={[0x9, 0x0, 0x2, 0x8001, 0x9357, 0x7, 0x2, 0x411, 0xfffffffffffffffc, 0x70, 0x9, 0x8, 0x0, 0x100000000, 0x2, 0x4], 0x100001}) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:46 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000180)) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x9, 0x4, 0x1, r1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x1) ioctl$KVM_GET_ONE_REG(r4, 0x4010aeab, &(0x7f0000000040)={0x2, 0x10001}) setuid(r3) 20:59:46 executing program 5: r0 = semget$private(0x0, 0x4, 0x2) semctl$IPC_INFO(r0, 0x3, 0x3, &(0x7f0000000000)=""/135) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:46 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x2c000) bind(r2, &(0x7f0000000140)=@isdn={0x22, 0x6, 0x3, 0x1ff, 0x2}, 0x80) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x48000, 0x0) renameat2(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4) setuid(r1) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64IPIN\x00', &(0x7f0000000080)='self\\proc!\xf5cpuset*md5sumppp0selfmd5sumvmnet0$\x00', 0x2e, 0x3) 20:59:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="e03f030052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)=')security\x00', 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000000c0)={r2, 0x3, 0x9}, &(0x7f0000000100)={'enc=', 'oaep', ' hash=', {'wp512-generic\x00'}}, &(0x7f0000000180)="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", &(0x7f0000001180)="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") keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:46 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCDISCONN(r2, 0x7439) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400002052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:46 executing program 2: r0 = syz_open_dev$vcsa(0x0, 0x7ff, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @local, 0x8}}}, &(0x7f0000000040)=0x84) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5) r2 = getpgrp(0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) clock_gettime(0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) syz_mount_image$btrfs(0x0, &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB]) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x7, 0x7, 0x3000}, 0x4) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/relabel\x00', 0x2, 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x74000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf9fdffff00000000}) 20:59:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fffffff, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x408000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x80, r3, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x464}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'eql\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0xc840) 20:59:46 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x6, @remote, 0x3d}, 0x52) 20:59:46 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:46 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = shmget$private(0x0, 0x2000, 0x780000a1, &(0x7f0000ffe000/0x2000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x1000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="e800000150462f0f2a4e61a05e4bda659d861d6a5f42e423e6baf70cf9d77be91d294f61f55805dc45b132a003f83eea9e5b610782c23951f26fc4992f8bfc46112f446eaad6502ad1cb9c26d0cdef6c17ca8793664e1af7e741a36a94965901371e4490c5aa3bf58357c41da91a420a1239af7e260a7e729a356ee587eb5d4f7e6f1dd9d4f4b5bf644fa259a766b0d7fd2b4d2fb1ab485f714d24b2043201b06e49b4708814f3755405284399b331954373332c38579ab50a89cd84ce8649c2f9f49e28c25d80452869b1809d3b6da8805d16d77b9175e531dad158b3479234741b75d809995815c5", @ANYRES16=r2, @ANYBLOB="020028bd7000fedbdf25060000000800040002000000140003000800080001000000080001000100000008000600040000006c00020008000b0002000000080007000300000008000900f7ffffff14000100e0000002000000000000000000000000080002004e20000008000300020000000800080001000080080005000300000014000100ffffffff00000000000000000000000008000700020000004400020014000100fe880000000000000000000000000001080004000400000014000100ac1414bb00000000000000000000000008000800bb0a00000800080009000000"], 0xe8}, 0x1, 0x0, 0x0, 0x1}, 0x8000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:46 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000200)={{0x6, 0xff, 0x7ff, 0x7805, 0x7, 0x1f}, 0x7fff}) setuid(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000000)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'irlan0\x00', r2}) 20:59:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="effdffff52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 348.725713][T19069] overlayfs: missing 'lowerdir' 20:59:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:46 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000000)={0x3, 0x7f, 0xfffffffffffffffd}) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') [ 348.795787][T19084] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18000 sclass=netlink_route_socket pig=19084 comm=syz-executor.3 [ 348.811614][T19069] overlayfs: failed to resolve './file1': -2 20:59:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000004c0)=0xc) kexec_load(0x100000000, 0x6, &(0x7f0000000400)=[{&(0x7f0000000000)="58af78ac969bf27db892925bab99265fd0b4f694aa7f699e13b9f35be7e92e5e2d5d755f1eb88210ebff74b647c520ea0c5bb9d048f140e19d772551dbe25b7825ff9100eccdd6080dae98db2a4cb36daf45ee8f5b", 0x55, 0x5, 0x8}, {&(0x7f0000000080)="585814ebd4e59712f936c9ea57f4f6ae4f6fd0bb3948d1c9f2579fdd4d431efc3f682592e2f7e408a438f961f89cf02e22f749045b450904bcc15d7be4898ab7f1d6a99a018c4159ff3f05ccfdfa65d6094007cd95fafa4c4013994aaf0f46ae7d7e2176eb96e8e44e1f7b58b9", 0x6d, 0x5, 0x7}, {&(0x7f0000000180)="3650ef578f954c70f57c4aa64dc9fabda6a7582fa412066e9c1fe3cc3264ed491585f980e84cbd132835ad752a743444564386c93cf145cbc94971be7baff55f4e2d40c8bbebb209b657d34b246be5cd35829684357c63c30bd2b9227b381d76a42398895e00aa4f1d5418b7aabaee4e5f4fe28e05f8b6837f1fb42f1fccd8d3240bf49875125a57cbd5ec47f17115f9216662b1389b44ffd5d1f9ca6a7fe7a96df38a2057e91cda20b861b429337625a6f93f87940fd4826b9e3521a32bd9e894530763f45c3128f8ac012526db662a5535724370509ed3490c8affd756bf0284b2a06655679dbbe109d95ececc68d2d6387ba6dd8adf27", 0xf8, 0x7, 0xb86}, {&(0x7f0000000100)="dbbd27d7f698437540a7b1b4a485331c34880c85243528", 0x17, 0x0, 0xfffffffffffff17b}, {&(0x7f0000000280)="2f5978ab7855a1a73647225b63ca00bad0857ed1c5a71b40314d5ce45280b89786ebf5c3e44a8eb566597166862ad5ccada3a5f488e81c0983409338492c58e212d5adfe3bc96986b218485d2388adebb2546ebfe2842efc530c4d0e32f8cc4aca114a9065b666a0329c722b0bc26a97c65a1029b214c24a9b67f9715c4a30", 0x7f, 0x9, 0x1832}, {&(0x7f0000000300)="89aaa66a14139dcb4b1b6aef87f981fd9e21ee7a34e7972c2e32afa8c9e06ee73b5c842eaea205afa965bac9bdf62b5ef75fe56f69b8394d9cf85b4b15ec2bb2c412a6a0955b2a7515c8e9fc861e90aa6db78f6696f815d34df7ba3a45feb570db52de4d79fc680e2f880fbed4255eb62026c2690bb2e5d91c14bd230e62395a9e8f7929a6b9be119f50b67cf59fd98440ec51b969cdf14000d5d43c9833670c42d85af9e32b13d3a11d4ab3ca66e2d1d02296a8604b9ce017c01b8aae30572cf88a47001fc283354951d36f2c7193d0fdd85fe798c403694e6a", 0xda, 0x2, 0x6}], 0x3f0000) r3 = syz_open_dev$cec(&(0x7f0000004180)='/dev/cec#\x00', 0x3, 0x2) ioctl$SIOCNRDECOBS(r3, 0x89e2) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x7) fstat(r1, &(0x7f0000000500)) setuid(r2) [ 348.910126][T19095] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18000 sclass=netlink_route_socket pig=19095 comm=syz-executor.3 [ 348.931694][T19069] overlayfs: missing 'lowerdir' [ 348.947924][T19069] overlayfs: failed to resolve './file1': -2 20:59:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x240000, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0xe4, "e363db316aef05e61877582d4c72d8745146649c15f846cbe6a3b8bc7b4883680b2b78d4e45261fb6410e87c9172adb9574374beb536ce6b920bb6886db89768c8c8f1d5c9bfcdcfb0b3159ae0667c7cf0fa7bee3b2e10ab6556185969369d8332cb3aa454cfae486a7c83806ebc7e6803d279566fe3a7cdd14227c3950ed4f54bc2b4e4fd7d3a0b4899c4aee416f68c9ca35b32c4a8e23d887c87d5257e35f52ec3208eb1405ef6912b1b095c5dd10d9d8e3be615c9d21dbd99acee76e8e0a72c7087ff3d6ceebfc5611598124838bb453cc65aac5d3ed4fc67e65e2dca4528bf56e4c1"}, &(0x7f0000000140)=0xec) fcntl$getflags(r0, 0x1) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x81, 0x6, 0x8004, 0x4, 0x7, 0x8c8f, 0x5, 0x4, r1}, 0x20) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000200)={0x9, "87c6544c6ac42145a5dfa62925c04d79e5bfcedfc757dd0dcb09071c54635e72", 0x3, 0x104, 0x7fff, 0x800, 0x12, 0x4, 0x5ec5, 0x9}) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f00000001c0)={0xffffffffffffffa3, 0x8}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) keyctl$chown(0x16, 0x0, 0x0, 0x0) [ 349.017807][T19103] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=19103 comm=syz-executor.0 [ 349.085666][T19103] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=19103 comm=syz-executor.0 20:59:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80800, 0x7af86e5) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x4e20, @remote}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='sit0\x00', 0x8, 0x1, 0x7fff}) r1 = socket$inet(0x2, 0x2000000080003, 0xc) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\x02\x00\x00\x00\x00t\x00', 0x20, 0x1, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'veth0_to_bond\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 20:59:47 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = open(&(0x7f0000000080)='./file0\x00', 0xa00, 0x80) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f0000000100)={0xb1, &(0x7f00000001c0)=""/177}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1) 20:59:47 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) sendmsg(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@generic={0xa, "b6cebca7f850ee1b4f15fef792f73a2aed472de45ecc0787ec6d7cdb0c30a702501b467583a929f8049d1bda41473230de1f3ae470c1b7ec39e24f5a94cd61ff96a594a00ad6a70e65d41aeae3d31932346c4a1b2d229d20eda9bcd2054574373cab928133ca580bc6cafe40038457d447ca1261523af4f9005f7bbbe0a7"}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000080)="fc80286d69febe80639c70ef9f4828736a7f503689b1276c2dbf6d22b5855e75a44c69768e920f406218b622c34b9a27cb51260f6b1cad9cdd723cf514c7eab6cd193fa319", 0x45}, {&(0x7f0000000100)="e5a153996dd6d626ae3eb9001db6036ecd7c6247935c0f08d70ebed2", 0x1c}, {&(0x7f0000000140)="8eca64f6657e97a226fa499ecb97e943fc2122aea6c814c1d48157b953d38dc3a490e50325359195be942ccff52b7092b29c397e874de7c629c87bbf444da33a36fc2ab6c935f77d3b89c88619f00861fd6411d1d6ee2fe8179c15d3356155fafd9edf1bfed7e3b00845d8e2239fe6c4b83be4da8aa59885b37a2a5870fec04bf49637a2cc92a19bed76a419844f17c0a1792920ada7353c22173d97ec26990358b9a67f02c549ba1c7e4d729832032e497daaae9f340df3fec494501bd2af81f45b", 0xc2}, {&(0x7f0000000240)="aa48ebad8f9c34ab1af827a599634fd46754104563c0d57dd488c5c7dee88576a492eef5343fb47412ff0fb0793520c3b746aacbdc6ea2", 0x37}, {&(0x7f0000000280)="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", 0x1000}], 0x5, &(0x7f0000001300)=[{0x108, 0x0, 0xfff, "7c144813ee48bfd29001b87e493fb070b71fd2c842c5fdf2a120376a86d4180880565740edcd972157676233c2a5088ef5c48252759d3e786c9d3ec21cca645006c831b2d55fadec7b1ce141b5e07e6ebdc493df3f71155d56e638dc038bd0b0ac86fde02d38264a16c0f945bd85cabd3ee63214d25abecad51e1ab093b029c990d09d3557aa2623a7741583bf5379557f167d56fbd9d2cf80aa4c312c3223a43e952cf27491a924e48a6f0ba1f749f45eb0204b2a05e97f6da202ab15cdcf33b99ee88680809698887933699c5c04d0e874f67aeb1d799c9680f0feb6d5b77fb937f2d57e0d54707cc8a57f7fd00fd3cff50549cd"}, {0xb0, 0x109, 0x80, "8153320fbd113e913f4aec6fc941e4751af8018f45ccba8fdcfb702885791a5b45b939ee3a0e5469754d8defdb84479d00e80725d680b1c29681245adb54f7f76a88b8b18fa2ea4b36a866f24d195b0dda24beba380f72ea0cfbe210f360793eb9dcb5fecef864c091cf099698c6289077002bf26411500e479b0d16e51b587870e7ffd51408939b6de655b3eb07075e66815415e67e0c3541"}], 0x1b8}, 0x8000) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000000)={0xc0000000, 0x100, "0b5821f2f587dec3dae5cab2fc4afa7024ddf83eab4f6fa0c2b85496546cb5a0", 0x0, 0xf, 0x6, 0xff, 0x5, 0x4, 0x9, 0xffffffffffff1e32, [0x1, 0x5, 0x6, 0x1]}) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) accept4$packet(r2, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14, 0x80800) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f0000000880)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00000008c0)={@loopback, @remote, 0x0}, &(0x7f0000000900)=0xc) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000940)={@remote, @initdev, 0x0}, &(0x7f0000000980)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000a80)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000b80)={0x0, @loopback, @multicast1}, &(0x7f0000000bc0)=0xc) accept4$packet(r2, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000c40)=0x14, 0x80000) getsockname$packet(r2, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000d40)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000f00)={'vcan0\x00', 0x0}) recvmmsg(r2, &(0x7f0000005900)=[{{&(0x7f0000000f40)=@l2, 0x80, &(0x7f0000001040)=[{&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/40, 0x28}], 0x2}, 0x1}, {{&(0x7f0000001080)=@ax25={{0x3, @null}, [@null, @bcast, @rose, @null, @remote, @bcast, @rose, @null]}, 0x80, &(0x7f0000001300)=[{&(0x7f0000001100)=""/118, 0x76}, {&(0x7f0000001180)=""/191, 0xbf}, {&(0x7f0000001240)=""/87, 0x57}, {&(0x7f00000012c0)=""/27, 0x1b}], 0x4}, 0x100000000}, {{&(0x7f0000001340)=@nl, 0x80, &(0x7f0000001540)=[{&(0x7f00000013c0)=""/95, 0x5f}, {&(0x7f0000001440)=""/90, 0x5a}, {&(0x7f00000014c0)=""/76, 0x4c}], 0x3, &(0x7f0000001580)=""/38, 0x26}, 0x8}, {{&(0x7f00000015c0)=@nfc, 0x80, &(0x7f0000001740)=[{&(0x7f0000001640)=""/18, 0x12}, {&(0x7f0000001680)=""/82, 0x52}, {&(0x7f0000001700)}], 0x3}, 0x8001}, {{&(0x7f0000001780)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001800)}, 0xfffffffffffffffb}, {{&(0x7f0000001840)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000018c0)=""/227, 0xe3}, {&(0x7f00000019c0)=""/17, 0x11}], 0x2, &(0x7f0000001a40)=""/126, 0x7e}, 0x9ec2}, {{&(0x7f0000001ac0)=@sco, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001b40)=""/149, 0x95}], 0x1}, 0xc01f}, {{&(0x7f0000001c40)=@nl=@proc, 0x80, &(0x7f0000003040)=[{&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/230, 0xe6}, {&(0x7f0000002dc0)=""/93, 0x5d}, {&(0x7f0000002e40)=""/210, 0xd2}, {&(0x7f0000002f40)=""/171, 0xab}, {&(0x7f0000003000)=""/14, 0xe}], 0x6, &(0x7f00000030c0)=""/4096, 0x1000}, 0x7}, {{&(0x7f00000040c0)=@nl=@unspec, 0x80, &(0x7f0000004840)=[{&(0x7f0000004140)=""/40, 0x28}, {&(0x7f0000004180)}, {&(0x7f00000041c0)=""/235, 0xeb}, {&(0x7f00000042c0)=""/225, 0xe1}, {&(0x7f00000043c0)=""/153, 0x99}, {&(0x7f0000004480)=""/154, 0x9a}, {&(0x7f0000004540)=""/161, 0xa1}, {&(0x7f0000004600)=""/242, 0xf2}, {&(0x7f0000004700)=""/218, 0xda}, {&(0x7f0000004800)=""/33, 0x21}], 0xa, &(0x7f0000004900)=""/4096, 0x1000}, 0xe5}], 0x9, 0x40010103, 0x0) getpeername$packet(r2, &(0x7f0000005c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005c40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000005d40)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005e40)=0xe8) accept4$packet(r2, &(0x7f0000005e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ec0)=0x14, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006780)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000006880)=0xe8) getpeername$packet(r2, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006900)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000006940)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000006a40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000006a80)={'vcan0\x00', 0x0}) getsockname(r2, &(0x7f0000007240)=@xdp={0x2c, 0x0, 0x0}, 0xfffffffffffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000072c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000088c0)={'veth0_to_hsr\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000008900)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000008a00)=0xe8) accept4$packet(r2, &(0x7f0000008a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008ac0)=0x14, 0x80000) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f000000c2c0)={@rand_addr, 0x0}, &(0x7f000000c300)=0x14) accept$packet(r2, &(0x7f000000c340)={0x11, 0x0, 0x0}, &(0x7f000000c380)=0x14) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f000000d000)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f000000cfc0)={&(0x7f0000007300)=ANY=[@ANYBLOB="d40b0000", @ANYRES16=r3, @ANYBLOB="040026bd7000fddbdf250000000008000100", @ANYRES32=r4, @ANYBLOB="f00002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000900000008000600", @ANYRES32=r6, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000300000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004004f09000008000100", @ANYRES32=r7, @ANYBLOB="7c01020038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000300000008000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656ed1aa912111b261626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000800fffe030000000800dd59ffff000007000300dc0e00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="e401020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400fbffffff3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f616463617374000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004005519000008000600", @ANYRES32=r13, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000700000008000600", @ANYRES32=r14, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400f9ffffff3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400b300000008000100", @ANYRES32=r16, @ANYBLOB="ec00020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000500000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ef0a000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000000010040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000000000080007000000000008000100", @ANYRES32=r17, @ANYBLOB="0801020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r18, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001400040000020001000800008d0240ba060000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r19, @ANYBLOB="c000020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000200000008000600", @ANYRES32=r20, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000010000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b75700000000008000100", @ANYRES32=r21, @ANYBLOB="740102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="6c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000003c000400020003040300000031060670610000000100ff00000000005100fd080400000009007f07590b00000700d9ff09000000000805060000000008000100", @ANYRES32=r24, @ANYBLOB="c800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000700000000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000700000008000100", @ANYRES32=r25, @ANYBLOB="f401020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r26, @ANYBLOB="0800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004009800000008000600", @ANYRES32=r27, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r28, @ANYBLOB="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", @ANYRES32=r29, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004006effffff"], 0xbd4}}, 0x8000) prctl$PR_SET_UNALIGN(0x6, 0x1) 20:59:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000010001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 349.260628][T19132] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:59:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = creat(&(0x7f0000001500)='./file0\x00', 0x16) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000001540)="5afe1c6820ec517bd2d0b025b0e94dfa44b106aace3d64b5b4c2f5e9e039b545b93fb666d7c0fea2063c4e7c8515139534638989cb5fd6b842ebccd1cb335cdb09b9db018511fad2bdc581060b229655a1dfc028f9af53101785910dcd40ae065a93a180f7b9388d62e6578ae71df2c244896fa6496bf452e8595a4c", 0x7c) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0xcb51, 0x8, &(0x7f00000013c0)=[{&(0x7f0000000180)="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", 0x1000, 0x9}, {&(0x7f0000000080)="384edd420f4cb76dcf45dfea1da0481661cf8d745ff0c1395e783a01f1", 0x1d, 0x7}, {&(0x7f00000000c0)="0f2ae173da04af7269520d78f40742f1106dad0e42fe7dd512a56a4a6b3d57cdbbbfa1c9b4e45b23899b72fedb6b", 0x2e, 0x4}, {&(0x7f0000001180)="9cb1450f82161867076eedb1787895600b062f6583b01ec1fd434c407d8ee1f997b01d9a80bad05a8e80b5c58af95dda38a8a2858a5968aebb58834468389d5bd21ab3080696e944cdfd3ffb4fa0e10eb6ccffd77eb82a0c260e96d4720290aee6bed72eba6a12636cf9e653ef8193d6f71e6c81e2fa24", 0x77, 0x800}, {&(0x7f0000000100)="26c6b8a0ecd260856f62e0d903d0635f1b15d54470eb0541afc497a427eb47d81aae0ff71e2773323bcd0661495a1bbc6b20bf714c5b77327fc02b", 0x3b, 0x5f38}, {&(0x7f0000001200)="bbf1ffa3a4c50b94ccca6fcebb86e237ad2abc312d145e2e36fbae11a74e7bc4a49cc56fa1e697f94a58f79f9c40adf6cf82c1d67553ebd2066a987148b0d431690a3e9e814987a516e833", 0x4b, 0x80000001}, {&(0x7f0000001280)="182931eea50d7dd8c291a1244b2d354b10fe4ae71a523a1cfa9ba36269c05d0c46b970801964f8c110dc47089dfed3b9e15aba1c6cfcf1382cdf689141eb116bf0a757f06fcca14aa1ffcb8bfc0065c52c405c6b1d04a55b6926685ab6398af1dcde6324695d99c8f12cad64dadbdf452193c17be52737c3cb344a170d0b7adfb1e430ec1bf0c6a98853f78a2f9248ebb5f71ea52959ad6352632d4a9960ac4e91752562954479d6a8ecf9fdfb171aa36ba48eb92c22a1b95fe24501064c4e017de63e5d64afcce97c7e350a9d069400d483eb133f4a4e22c4b91d080fb790ab464f5e92a4c35c", 0xe7, 0x2}, {&(0x7f0000001380)="5f03e6c10b58a14b4a838ee8f9ea923898b3fe710ac1048f23359b316ccc", 0x1e, 0x7fffffff}], 0x1020008, &(0x7f0000001480)={[{@errors_remount='errors=remount-ro'}, {@grpquota='grpquota'}, {@errors_continue='errors=continue'}, {@noquota='noquota'}, {@integrity='integrity'}, {@resize='resize'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xa7'}}]}) 20:59:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000011001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:47 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffd56) setuid(r1) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) write$P9_RSETATTR(r2, &(0x7f0000000040)={0x7, 0x1b, 0x1}, 0x7) 20:59:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt(r0, 0x9, 0x100000000, &(0x7f00000002c0)=""/193, &(0x7f00000001c0)=0xc1) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000240)={0x1, 0x1, {0x55, 0x0, 0x8, {0x8, 0x6}, {0x3, 0xfffffffffffff483}, @period={0x5f, 0x3, 0x1, 0x2, 0x5c1, {0x9, 0xffffffffffffffff, 0x2}, 0x3, &(0x7f0000000080)=[0x7, 0x1, 0x5]}}, {0x56, 0x5, 0x0, {0x5, 0x1f}, {0x111}, @period={0x5e, 0x1, 0x40, 0x71, 0x100000000, {0x8, 0x166, 0x2, 0x6}, 0x5, &(0x7f00000000c0)=[0x0, 0x4b8, 0x7, 0x262d, 0x20]}}}) setuid(r2) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000100)={0x2, 0x1, 0x41}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') [ 349.328703][T19127] ebtables: ebtables: counters copy to user failed while replacing table 20:59:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80800, 0x7af86e5) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x4e20, @remote}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='sit0\x00', 0x8, 0x1, 0x7fff}) r1 = socket$inet(0x2, 0x2000000080003, 0xc) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x1d8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x250) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00\x00\x00\x00\x02\x00\x00\x00\x00t\x00', 0x20, 0x1, 0x138, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000380], 0x2, 0x0, &(0x7f0000000380)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x0, 'bcsf0\x00\x00\x00\x00\b\x00', 'veth0_to_bond\x00', 'vcan0\x00', 'vlan0\x00', @broadcast, [], @empty, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1b0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) 20:59:47 executing program 3: r0 = socket(0xa, 0x10000000002, 0xe95cac1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:47 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setuid(r1) getsockname$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x3}, 0x4) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x800, &(0x7f0000000300)=ANY=[@ANYBLOB='default_permissions,metacopy=on,xino=off,index=off,euid=', @ANYRESDEC=r1, @ANYBLOB="2c7375626a5f757365723d3a29f02c7063723d30303030303030303030303030303030303035352c7569643e", @ANYRESDEC=r1, @ANYBLOB="2c646f6e745f6d6561737572652cd5f41eb87a82a170d2ae8e5ccc646f6e745f61707072616973652c00a1ee03cef5aaa47e6256b65b60e7f9f3642bb2982f80bbc237ff3aafba8b7a6d10d96bfe449f521176c3451d793240d9a000373fb41ade73c0a85cba0e40f2c3cbb059932ff0100c965302"]) keyctl$chown(0x16, 0x0, 0x0, 0x0) [ 349.484434][T19146] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 349.500407][ T26] audit: type=1400 audit(1554843587.584:152): avc: denied { getopt } for pid=19142 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 20:59:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 20:59:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000012001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:47 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) [ 349.653625][T19156] ebtables: ebtables: counters copy to user failed while replacing table 20:59:47 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000080)=0xffffffffffffff09) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:47 executing program 5: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000080)) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = add_key$keyring(0x0, &(0x7f0000000680)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x40000000000005, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) io_setup(0x40, &(0x7f00000000c0)=0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$P9_RLOPEN(r4, &(0x7f0000000040)={0x18}, 0x18) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x5, 0x1000) io_submit(r3, 0xfffffdbc, 0x0) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000140), 0x7}]) [ 349.741583][T19172] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:59:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000013001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffff800, 0x400902) getpeername$netlink(r1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r2) [ 349.876020][ T26] audit: type=1400 audit(1554843587.954:153): avc: denied { map } for pid=19177 comm="syz-executor.5" path="socket:[69098]" dev="sockfs" ino=69098 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 20:59:48 executing program 3: socket(0xb, 0x0, 0x9) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:48 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80, 0x80800) sendmsg$tipc(r0, &(0x7f0000001540)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x2, 0x1}, 0x3}}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000000100)="512ef9e0fb67823a8644ed57bb13448d6d93504293b49209384376e1168187ee10bd", 0x22}, {&(0x7f0000001180)="785afd6e4dfd5d8b1388594a2426298eda7f1bf8df95977af10f63953fc9d05177f8a5762b8bb0bb846c3e2c8aefc2cc7cb937453ac3a2e2720452ccefe7ffb782933088398da7eb0c2045a13d6884198fddd77a24b3e839881572404385241fb445f68dcb19b83b7ba637ef", 0x6c}, {&(0x7f0000001200)="db92cf9b965ff7442a61b857cb6823fb7f5479914cc03ee8529b0a33974d1f07da5f5477b6888b898c597bcd", 0x2c}, {&(0x7f0000001240)="528d04480b7e360c4b2158ab8c507f062ab5b18359ea9dc73ac400ee21055073f1b5a50b7e00201dd525ac7155c0f4ee87a930dd5a6e5e02bad783ea5abc33c419e959766e4efeba00502e5276fae21abd6ac5588cb82534561b82d2a38308", 0x5f}, {&(0x7f00000012c0)="8cefb67fce157ad73ce2666ed33d6611f0d9b6689a9a76c9b6195b9f1feff1d747949491e7e9af4dba56a5a44a4f4f08ed9173bf17bb7d72caffe7d5392ddf3b06b718a98eb54366ac4f73c2a378", 0x4e}, {&(0x7f0000001340)="d993d8e95a3cf75b36fdb329eee09906b4212c7638aefb6f04f0794eb4c983f5acd9a158f6701d223fba0585ce5a10e7d55b0e", 0x33}, {&(0x7f0000001380)="6a04147d8e221890fdf136b699c6027c0cb84af0c88b314a2a3a17018b3d8576c10f44b2de00a8b26a7b1dcaa5f397da2c781c7330488ce26e4b028d34fd3812de26661be0e40cefa5989694d05714964082ee330f16e4c633a1ddd45851f617753526ec9c9ba1022a5f8bc71f3dc1a769f53a157ae9712a56cc279ac1c330", 0x7f}], 0x8, &(0x7f0000001480)="c6e9d6d5bfe664f6bf8185d25d661c5c2000b51c43856cfe0d1971b446503427b38d8dd8936773cf28df60b78b743fdca7d39d2a4bb78a2818b7ac6e7791b6586d7a267bc093ce10ef5c1f6fccc4ee9a603106cbe5f06e3048e1d647e64f80b58022da537cbb1921ac01c10db3a00bd39930431e05417c9b22052d09b2f589606c45f5479ad6ca1e1a95d20b38f16e56e06c7621cf139122bfef276ded892dfdec2d30104ad9081192253e25befed78284", 0xb1, 0x40041}, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001b40)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000001b80)={0x4, 0x0, 0x20, 0x2, 0x9}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x9) setuid(r3) syz_mount_image$nfs(&(0x7f0000001580)='nfs\x00', &(0x7f00000015c0)='./file0\x00', 0x0, 0x7, &(0x7f0000001a40)=[{&(0x7f0000001600)="86812f1dbf268718945de3db8271f1033442fced2e07726b09fd2b88e30014828b95801426dcd926123889fdf5ebde7eb7165dc78a64f2e3f7e09f5af709d8721c15ef3cc67462c66c6b1b2c8bca3b8ee4e752a7c1ecdee21d269a6007b9c6b6d689ed5b95100f16e13eec038af96359dc7528cfca4d83858fbd71994708a75509336e6cddd5c92599e27c4c119d69db55a011cb2bc350adb394ea715b6df6b077e47f9327f3d3f05a3ac0aa7b7df57036a672d483a1", 0xb6, 0x401}, {&(0x7f00000016c0)="e21883e5ed3502ec25fba84a646549bf2bb1151c11a9508d293e085eec212e03c7fcd3aa2da8bd138a14038d2fc8f5968db5902714864e4999f50343aaac6787", 0x40, 0xffff}, {&(0x7f0000001700)="c2a9568b4c1f7d3b7e11b27948f93d88a3d1e2599c92b5a3e135eaaf58aa253d11fd9406b55b1c88b3d421638271df675a0f709bdb1c51f95e9c224c6c22fa86b34ef4369a7af80b8232f9b56f6751371ebe6133a2c1f0272b7f8855d12078a5015ae841cafdf4dc30c0fb18b16238a9d8a46ed6f3e6ab2943b24be7b62e434307148fcfff6364c755be50b1f149d3d73e0b96c29d45c41d69e278a4339e92788c144b75e59a4a9e84140fcb4bb11ceba707a8383b31d562eb5c21326752b17d3ee61817da607fa0131f4fcadda4333406d1f030b3", 0xd5, 0x7f0}, {&(0x7f0000001800)="3a2a0015118d2d019df740f1af6e2559368f410c3f25515502d2aad8c2ea506d632fc70f7c9c1bbe688082766aa76f9f39c4ea164415791c6969af21fd53500acfaee1f7a15873143a99445ab216091ccfd3d0a8675c880b27e16c4989d7c15878558652d30f719a837d627cae918b4cddda", 0x72, 0x100000001}, {&(0x7f0000001880)="50b9dcf780e6940299e4a494c5256a276cb65d438c81a22ce3cb41de807f71b1d421f48b884ae161a264c2d264623fa079d54ba8123b23a66f87d9d7d681dc44fa1625541040425937228dd9d3a804bb893a911180b09e2674532fac5121287270a5db5ac8fd29940a32329f8bb1d7132cec7febd7403ab080601f82b689d4828b2d9fa7c9cc17831e01cd1dc053e15e58945d1d7025ce1471707e84de788177d319a34115b37050ec88bc1ac28ca9447e", 0xb1, 0xb47}, {&(0x7f0000001940)="dcfed6ec6570ac6d94949ae20f4e7c8dd5a4ce7f85c0cb4de17949d70cce19d05c3b100d437203702a9431d361ff715df215c0b80980d0d8215a4d7c9931fe3a9785a7d719f75a2b0b600f86304eda7ae521af91402b98b21a7f23b7775c35775a", 0x61, 0x5}, {&(0x7f00000019c0)="82819d7f373298265e66335493145793d3f2e35a52fd7e8013ccc3fe62ede6f8462ec68917dc0a01d2e358b4d6fa6a7e778b2ffea48ddae47e01fe278c115b5b09b7810a87683f50248881e1238a22071304a0a2986bfe19ddc8ce6423fae21bc3", 0x61, 0x673}], 0x2800000, &(0x7f0000001b00)='wlan1userem0\x00') 20:59:48 executing program 1: r0 = socket(0x14, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ATTR(r3, &(0x7f00000001c0)={0x78, 0x0, 0x2, {0x3, 0x10000, 0x0, {0x3, 0x1, 0x8a9a, 0x5, 0xce9, 0x3, 0x10001, 0x3, 0x6, 0x400, 0x8, r1, r2, 0x87, 0x400}}}, 0x78) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000000)='yam0\x00'}) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') [ 349.951429][T19192] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:59:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000014001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000140)={0x7, 0x70, 0x0, 0xfffffffffffffbff, 0x5, 0x3, 0x0, 0x2, 0x10, 0x3, 0x401, 0x3b, 0x1, 0x5, 0x5, 0x4, 0x7, 0xffffffffffffffff, 0x2, 0x5, 0x0, 0x3, 0x101, 0x9, 0xa1, 0x851, 0x4, 0x9, 0x8, 0x100, 0x6, 0x9273, 0x401, 0x4, 0x7fffffff, 0x8, 0x8, 0x3, 0x0, 0x4, 0x4, @perf_config_ext={0x2, 0x80f}, 0xcc0, 0xb007, 0x0, 0x1, 0x100000000, 0x6, 0x7}, r3, 0xa, r2, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) write(r5, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x7ff, 0x0, 0x0, 0x1000, 0x3}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000002c0)={r6, 0x4}, 0x8) ptrace$cont(0x38, r3, 0x1, 0x2) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r7+30000000}, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f00000001c0)=r5) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) 20:59:48 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffd21) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x116, 0x30, 0x8000, 0x40}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000500)=0x80000000, 0x4) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r4, 0x5, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000780)=ANY=[@ANYRES16=r4, @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="ab02588212375fb9a9ce847777515030f0edc445e7edc63f9c677be59a2f14ba28ea86230804a670af3c2359dd339cc3e0bf333d50d2e7fe2386c71981d212e53b3b465ad038b0e9cfd743fa3c872f0a66dc702f62ab00d646ee8dc75e7a474cf2f178b2fddffac6b4bc9985216c01038bc680a406e90b14ebd9e8c82cfd04ef1e5c450f2d6dc2f33c865f", @ANYRES32=r2, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB="6243fd6d89e9623d66dab808efb8e982417f0d0cd42c80bb6e726e56649aa786f4375ed9bf7d9d6ecee38d00c7141c25541604510f93a3b8c98c7878e01a1a1b49f4f514a80cd172fd08c753bb607c99b4f2b7571ce4e79d46", @ANYRES16=r1, @ANYRES32=r4], @ANYBLOB="28d495b2ef1d1b2e6897f1d5c480bc04672eee46167f7094fdd459642b17ecb9590b41a972f3", @ANYRESOCT=r0], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES16=r0], @ANYRESHEX=r2, @ANYPTR=&(0x7f0000000740)=ANY=[@ANYRESDEC=r1, @ANYPTR], @ANYRESDEC=r4, @ANYRESOCT=r3, @ANYBLOB="2e7997c4372c1b3125b916f3159ead14fc2e"], &(0x7f0000000100)=0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_all\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r5, &(0x7f0000000580)={0x28, 0x2, 0x0, {0x2, 0xe9ae, 0x3}}, 0x28) ioprio_get$uid(0x3, r2) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)={0x190, r6, 0x204, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x807}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7f}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x221}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x84, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x5}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x41}, 0xc0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x0, 0x6, [0x4966, 0xffffffff, 0x8001, 0x1, 0x64a, 0x80000001]}, 0x14) setuid(r2) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) [ 350.184347][T19213] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 350.209339][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 350.215437][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigsuspend(&(0x7f00000001c0)={0x8}, 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$VIDIOC_S_FBUF(r3, 0x4030560b, &(0x7f0000000180)={0x90, 0x8, &(0x7f0000000040)="1f8d8dbf1ba449ed1e5b46d1f93350fff3e029c9602472e0a025c3b2f5e86b91cb6b2045848a148b15cd19f8ff05294d849ec9cb4424f99d746354974e8a5eb23d7ee8bdea2e05ae19b4a98b95d1ebb607eece7e52556d279f8e203286489f9e1cec18eb4c4869ac250cef1b9749267b107e7145230889177344f031517109058fd761fe5d20319889316ea9a36b2694436e9fe78b59aded52aa1ed0a3fa33b6457ead905de60245fc2dd07e40086edef8468b2dfe5185c55159579a062650433b59d186b4c1620fd1d3951a3a3fe6bf94949db3a03524ae6dba025cea4bd4fe351e7993bc5651c5", {0xed, 0xd6a, 0x77737e5d, 0xf, 0x5, 0x1, 0x0, 0x200000000010001}}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) accept4$packet(r3, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000540)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000640)=0xe8) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty, @local}, &(0x7f0000000780)=0xc) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f00000007c0)={@empty, 0x0}, &(0x7f0000000800)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000940)={@rand_addr, 0x0}, &(0x7f0000000980)=0x14) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000009c0)={0x0, @rand_addr, @dev}, &(0x7f0000000a00)=0xc) getsockname$packet(r3, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14) getpeername$packet(r3, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b00)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000b40)={@remote, 0x0}, &(0x7f0000000b80)=0x14) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000c00)={0x0, @remote, @remote}, &(0x7f0000000c40)=0xc) getsockname$packet(r3, &(0x7f0000000dc0)={0x11, 0x0, 0x0}, &(0x7f0000000e00)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000e40)={0x0, @multicast1, @multicast1}, &(0x7f0000000e80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000ec0)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000001000)={@local, 0x0}, &(0x7f0000001040)=0x14) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001180)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000001280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001300)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in=@multicast1}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000001600)=0xe8) getsockopt$inet6_mreq(r3, 0x29, 0x0, &(0x7f0000001b00)={@remote, 0x0}, &(0x7f0000001b40)=0x14) getpeername$packet(r3, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001bc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000001d00)=0xe8) getsockname$packet(r3, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001d80)=0x14) accept4$packet(r3, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002200)=0x14, 0x800) getsockname$packet(r3, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002400)=0x14) accept4(r0, &(0x7f0000002440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000024c0)=0x80, 0x80800) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000002500)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000002600)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000002640)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000002740)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000003400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000033c0)={&(0x7f0000002780)={0xc14, r4, 0x12, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x134, 0x2, [{0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0xfffffffffffeffff, 0x3ff, 0x4, 0x1}, {0x10001, 0x0, 0x8, 0x8}, {0xafe, 0xffff, 0x5, 0x6}, {0xffffffffffffffe1, 0xa2a0, 0xffffffff00000001, 0xd1fe}, {0x7f, 0x4, 0x7, 0x8}, {0x81, 0x3, 0x6, 0x401}, {0x2, 0xff, 0x8001, 0x4}, {0x1082, 0x100000000}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x248, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7bf7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x10001}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}]}}, {{0x8, 0x1, r13}, {0x1e8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x138, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1bf}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xdd4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff8}}}]}}, {{0x8, 0x1, r20}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r22}, {0x134, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x6, 0x2, 0x0, 0xfffffffffffffff7}, {0x100000000, 0x6, 0x4a, 0x1ff}, {0xfbcc, 0x7fffffff, 0x2, 0xfffffffffffffffe}, {0x6, 0x3, 0x9, 0x3}, {0x7b8, 0x1000, 0x4, 0x1b62}, {0x26, 0x1000, 0xdb3f, 0x5}, {0x4, 0x5, 0x6}, {0x1cf, 0x1, 0x0, 0x1}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r23}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r24}}}]}}, {{0x8, 0x1, r25}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r26}}}]}}, {{0x8, 0x1, r27}, {0x198, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r28}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x9, 0x0, 0x9}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r29}, {0x198, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x10000000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r31}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r32}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0xffffffffffff8000, 0x3, 0x8496, 0x5}, {0x8, 0x4, 0x18, 0x5}, {0x9, 0x7, 0x4, 0x8}, {0x80000000, 0xfffffffffffffff8, 0x7df9, 0x4}, {0x2, 0x80000001, 0x9, 0x3}, {0x2, 0x100000000, 0x8, 0x2}, {0x8000, 0x8001, 0x100000000, 0x7}]}}}]}}]}, 0xc14}, 0x1, 0x0, 0x0, 0x4000040}, 0x8000) 20:59:48 executing program 1: r0 = socket(0x10, 0x2, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000001200)={{0x2, 0x0, 0x4, 0xe6c4, '\x00', 0x2}, 0x1, [0x2790, 0xd3, 0x100000000, 0x1000, 0x7, 0x2, 0x80, 0x10000, 0x9ba, 0x7be791f7, 0x10001, 0x5, 0x8, 0x0, 0x226, 0x858, 0x800, 0x13, 0xfffffffffffffff8, 0x1, 0x9, 0xb9d, 0x800, 0xd243, 0x4, 0x1, 0xffff, 0x9, 0x1, 0x1, 0x8, 0x0, 0x400, 0x0, 0x0, 0x0, 0x5, 0x100000001, 0x8, 0xfffffffe0000, 0x7, 0x3, 0x1, 0x2, 0x8, 0x8, 0x7fffffff, 0x20, 0x100000000, 0x7d7, 0x10000, 0x7, 0x100000000, 0x3, 0xffffffffffffff7f, 0x4ef, 0x7fffffff, 0x95f, 0x2, 0xb6e, 0x6, 0x4, 0x10, 0x9f42, 0x5a, 0x7, 0x9, 0x0, 0x7, 0xa2e0, 0x2584, 0x8001, 0x6, 0x8, 0x7ff, 0x4, 0x0, 0x0, 0x9, 0x9, 0x4, 0x9, 0x7fff, 0x7fff, 0x20, 0x2, 0x4, 0x7, 0x5, 0x9, 0x7, 0x80000000, 0x2, 0xb002, 0x0, 0x7, 0x80000001, 0x2, 0x3, 0x100, 0x1d, 0x7fff, 0xfffffffffffffffb, 0x9, 0x3, 0x7fff, 0x3, 0x9, 0x2, 0x5, 0x1, 0xfffffffffffffbff, 0x8, 0x8000000000000000, 0x100000000, 0x2, 0x1000, 0x6, 0x6, 0x1a9b, 0x400, 0x3, 0x8000, 0x4, 0x8, 0x8, 0x1, 0x8001], {0x77359400}}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000001700)={0xb, {0x10001, 0x1ff, 0x7, 0x7ba}, {0xfff, 0x7ff, 0x4, 0x480000000000}, {0x1, 0x94d}}) ioctl$TIOCSCTTY(r0, 0x540e, 0x7) recvfrom$netrom(r0, &(0x7f0000000000)=""/9, 0x9, 0x61, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) [ 350.529335][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 350.535198][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:48 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000015001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:48 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x4, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x801}, 0x8000) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:48 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000080)={0x6, 0x0, [], {0x0, @bt={0xf9d, 0x200, 0x0, 0x2, 0x9, 0x1ef, 0x1753200000000, 0xcf, 0x1, 0x1, 0x3, 0x7, 0x317, 0xffffffff, 0x1609e5739061458e, 0x20}}}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000001c0)={0x3, 0x7}) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x87, 0x3f, 0x8, 0x6, 0xce, 0x800}, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x800) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) r2 = open(0x0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000400)=[0x7, 0x81]) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x5, 0x30, r2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x2004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000000000000000b008000000000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r3}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000003c0)={r2}) sendmsg$rds(r1, &(0x7f0000001c00)={&(0x7f0000000100), 0xfffffffffffffe4d, &(0x7f00000002c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40), 0x0, 0xffffffffffffffff}, 0x0) [ 350.817374][T19237] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 350.828926][T19239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=19239 comm=syz-executor.3 [ 350.850608][T19237] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 20:59:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000016001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 350.871701][T19239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=19239 comm=syz-executor.3 20:59:49 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x9bb21cf4f1d477) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x7, &(0x7f0000000000)={0xbf7, 0x1}) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:49 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8008}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r1, 0x20, 0x70bd26, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x50) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 351.069667][T19257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=19257 comm=syz-executor.5 [ 351.123185][T19267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=19267 comm=syz-executor.5 20:59:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x2) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e24, 0x20, @remote, 0x3}, {0xa, 0x4e21, 0x8, @mcast1, 0x3}, 0x1, [0x1f, 0x0, 0x8, 0xfbe, 0x400, 0x3c6, 0x20, 0x8]}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000000c0)={0xa, 0x2, 0x2, 0x800}, 0xa) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) 20:59:49 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000080)) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:49 executing program 3: r0 = socket(0x10, 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x0, 0x8, 0x80000001, 0x918d, 0x2, 0x3f, 0x6000, 0x18b, 0x38, 0x18, 0x2, 0x8, 0x20, 0x1, 0x6, 0x20, 0x7}, [{0x3, 0x9, 0x6, 0x10001, 0xd3, 0x4, 0x2, 0x2}], "e65ee3cdd0a393b1b83712d5e80a9244bbe112ac728313e2c393ea680081244fe1e686c16b8c22f57b4630575add2dd47ab6d4fef9104481f6cb1f1514f370b89d35f31ac1c1d0d7bcc55534e3614f2d8bfb31b3c7c1805078041ae80efad31d2ca7f840933ef4b7f0f88a769fa293f058bd86b1c7ea3028787326aec2b0f2b0eeee06d0f63ba010ce1d46f2e81d8825dfb798bb7be9058ddd587e28a46dc67a9e3f5121f91520f115108ba290d6e624815b449b02eb4e778c34e11cce597b61c3a7d8fa1c36ff59a66626ba0f6cd9ebd145cd28d39d6a8145a89a6446f3fa8e2181", [[], [], []]}, 0x43a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x100, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000040)={0x100000001, 0x3, 0x10001}) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:49 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000005c0)={@rc={0x1f, {0x6, 0x1, 0x3, 0x3ff, 0x1f, 0x2}, 0x8}, {&(0x7f0000000480)=""/234, 0xea}, &(0x7f0000000580)}, 0xa0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') listen(r1, 0x3b) 20:59:49 executing program 5: r0 = socket(0x10, 0x2, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x16, 0x0, 0x0, 0x0) [ 351.345411][T19286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pig=19286 comm=syz-executor.3 20:59:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)) setuid(r1) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000080)={'bond0\x00'}) [ 351.396203][T19286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pig=19286 comm=syz-executor.3 20:59:49 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket(0x13, 0x3, 0x9) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:49 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="02000000010002000000000002000100", @ANYRES32=r2, @ANYBLOB="02000100", @ANYRES32=r2, @ANYBLOB="040006000000000008000200", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB="083814d51a8ebb1182b0830a98605f020700e3558970e0dac0ee384e0182d0d28541f78763f0d7b91171790fee444df9f3466f49ad7525d506b47067e8bea22a2a85da6a7d", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r3, @ANYBLOB="10000100000000002000070000000000"], 0x6c, 0x1) r4 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000240)={r4, 0x98, 0x20}, &(0x7f0000000280)=ANY=[@ANYBLOB='enc=oaep has~=michael_mic-generic\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/78], &(0x7f0000000300)="8e5f3dff3be8f1a1b5d03b3fae4ee2770f1945745babae7cc528b904a40698ae2ff320324da97f4e4cc314c6424d", &(0x7f0000000340)=""/101) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') fcntl$lock(r0, 0x25, &(0x7f00000003c0)={0x0, 0x0, 0x3, 0x9, r1}) [ 351.489322][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 351.495141][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:49 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setuid(r1) socket$rxrpc(0x21, 0x2, 0xa) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) ioctl$NBD_SET_SOCK(r2, 0xab00, r0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:49 executing program 5: r0 = socket(0x10, 0x2, 0x4000000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setuid(r1) r3 = dup3(r0, r0, 0x80000) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000240)={{0x2, 0x4e21, @loopback}, {0x7}, 0x40, {0x2, 0x4e24, @multicast1}, 'irlan0\x00'}) keyctl$chown(0x16, 0x0, 0x0, r2) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0x8, 0x2) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040)=0x7, 0x4) [ 351.889324][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 351.889733][ C0] protocol 88fb is buggy, dev hsr_slave_0 20:59:50 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000080)) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:50 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xffffffffffffff56) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mISDNtimer\x00', 0x42000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000080)={0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {}]}) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff9, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x1}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000500)={r3, 0xfb, "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"}, &(0x7f0000000640)=0x103) 20:59:50 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) socket(0x10, 0x2, 0x1000000000000000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000100)=0xffffffffffffffd4) setuid(r2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x4000, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) r5 = getegid() r6 = getuid() write$P9_RSTATu(r3, &(0x7f0000000300)={0xb8, 0x7d, 0x2, {{0x0, 0x9a, 0xe67d, 0x20, {0x80, 0x1, 0x5}, 0x7000000, 0xfff, 0x80, 0x5af, 0x12, '/dev/input/event#\x00', 0x35, ')securityselinux&vmnet0em0wlan0)systemselfkeyringeth0', 0x7, 'queue0\x00', 0x19, 'ppp0,vmnet1*!em1selinux@('}, 0x9, 'vmnet1@\xda\\', r4, r5, r6}}, 0xb8) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000100)={0x9, 0x7, 0xfffffffffffff917, 'queue0\x00', 0x6}) writev(r1, &(0x7f0000000540)=[{&(0x7f00000000c0)="67db80807defeff27c22124480232a25d1fae565cab0a3f6", 0x18}], 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r7) keyctl$chown(0x16, 0x0, 0x0, 0x0) [ 352.126120][T19335] QAT: Invalid ioctl [ 352.140976][T19338] QAT: Invalid ioctl 20:59:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:50 executing program 1: r0 = socket(0x5, 0x2, 0x4b) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:50 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = dup(r0) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}, {}, {0x20, 'security'}, {0x20, '(ppp1H'}, {0x20, 'wlan0eth1ppp0\xb3'}], 0xa, "765ec9cda1af4bb4"}, 0x34) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000040)={@loopback, @rand_addr, 0x0}, &(0x7f0000000080)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f00000000c0)={@empty, 0x7a, r3}) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) sched_setscheduler(r1, 0x6, &(0x7f0000000000)=0xea42) keyctl$chown(0x16, 0x0, 0x0, 0x0) ptrace$cont(0x9, r1, 0x445e, 0x8020000000000000) 20:59:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000020001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:51 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000080)) keyctl$chown(0x16, 0x0, 0x0, 0x0) 20:59:51 executing program 5: 20:59:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000080)=0x10000, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xffffffffffffff5b) 20:59:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) getpeername$tipc(r2, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x1}}, 0x18) ioctl$KVM_SET_TSS_ADDR(r3, 0xae47, 0xd000) 20:59:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000021001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:51 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000080)={{0x1, @addr=0x7}, 0x8, 0x3, 0x2}) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:51 executing program 5: 20:59:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000022001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:51 executing program 3: r0 = socket(0x2000010, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10) timerfd_gettime(r4, &(0x7f0000000040)) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000080)={0x280000000, 0x0, r1, 0x0, r2, 0x0, 0x5, 0x1}) setuid(r2) r5 = msgget(0x2, 0x20) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000140)={{0x3, r2, r3, r2, r3, 0x2, 0x5}, 0xb5, 0x1, 0x697, 0x383, 0x8000, 0x8000, r1, r1}) renameat2(r4, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:51 executing program 5: 20:59:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000024001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:51 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000080)) 20:59:51 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e23, 0x86a, @remote, 0x3fc00000}}, 0x4, 0x9c5}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000180)={r2, 0x7d, "5d463e5a5e8e033ded1e4eab512fe6c53ca5b051c295324cdacd2851c93621ca3c7df98485a3cb513f235ef74d5fd3476597fc1d8a25e67db90e211c84fff4fb0ddca457617da9981c48e434026ba7c2728ed3281b676c7d8318439ef435b4c2963221dcffee5de451e25a5bc0dd90a2aa6a75fb221beb89ae6ad615df"}, &(0x7f0000000240)=0x85) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) 20:59:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xcd1, 0x2, 0xc, 0x7, 0x1, 0x7d, 0x1, 0x4, r1}, 0x20) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) setuid(r2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) getpeername$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) 20:59:51 executing program 5: 20:59:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000025001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:52 executing program 5: 20:59:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000026001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000000)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000028001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = msgget(0x1, 0x400) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000000)=""/17) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) [ 354.370313][ C0] net_ratelimit: 6 callbacks suppressed [ 354.370360][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 354.382626][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:52 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000080)) 20:59:52 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fdinfo/3\x00') ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0x5) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000000c0)={'security\x00', 0x2, [{}, {}]}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r2) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:52 executing program 5: 20:59:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x50, r0, 0x80000000) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000029001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) setuid(r2) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000080)=0xfffffffffffffffe) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') fcntl$setstatus(r0, 0x4, 0x0) 20:59:52 executing program 5: 20:59:52 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 354.728512][ T26] audit: type=1400 audit(1554843592.804:154): avc: denied { map } for pid=19452 comm="syz-executor.3" path="socket:[69532]" dev="sockfs" ino=69532 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_route_socket permissive=1 20:59:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x5, 0x400) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000280), &(0x7f0000000300)=0x60) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x41, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000040)={0x40000000, 0x4, "5a4ca412d259480af40c377656e74bfb6ba1ddf5d68a02394e6ef999ccd91afd", 0x4, 0x100000000, 0x8, 0x800, 0x1, 0x87e, 0x80000001, 0x1, [0xfffffffffffffffd, 0x1, 0x5, 0x10001]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) 20:59:53 executing program 5: 20:59:53 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffd27) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="fd668bef75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c009f77e41a107a4eb3ab27c1588469ef01b74f9349549c692b80cb3ab1592f571c0657262a55383ce23f37c336f899c0bfe0aa62867568ff3236a0854fc22c53ddf433daa3fa156b37847467fbc1c5dcf994fcc5a679e34d05edb32da46ee457953662677b6e221b71f0178fdf05494cadfef0eb57b9a2f5310e0f152c73f6953c8ac5f7dd219121defe2e13f42d158c1b30fa7d55ee71d2cf2d6455c1c643ff1fe1a543ef623789d75bcb6ab97b0945913e1cccef1d8409032a748e80613cb64b3c7b2331a9a21c"]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000100)=0xe8) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') syz_mount_image$iso9660(&(0x7f00000001c0)='iso9660\x00', &(0x7f0000000400)='./file0\x00', 0x101, 0x6, &(0x7f00000008c0)=[{&(0x7f0000000440)="c1165d6ccbe4463579b2e259b7ca1dde3aa3e16fc86389", 0x17, 0xfff}, {&(0x7f0000000480)="f98dab418fdfec97dfe6e802e0afc2716126e1e96a64610f172097ffdc839a27ea58dbef42920e6541d085f916268df3c334e7e3a54ffb463e71f0e27a5472c09bf253f4d3ce8a82577770", 0x4b, 0x5}, {&(0x7f0000000500)="a8cd2748f605d28db9816e37007b53b9746ce1e8e48cd72b095249e59af04e0d3912d8ae9adc058eda3e26a5d20f8f70a6375211ff55424710d2aef7ef9120a08820aba751f57dc6e42a9dda6234081f9d14e207a7285571b987f1fb153fc412a8171cd90c140e2d11e62a22ec38eda1171df6e7abd5596b25f6de9828bbe032255b4e505af3ef624d86919787ff7bb0cfa776e992f1478812e1cd4a126493466b642fb94472502b51593dd2db982ded4e093021e7f2f7864adb15879460b525e5c5af40970577e6ec3f280b05fbae4466", 0xd1, 0x2}, {&(0x7f0000000600)="01416a63f803271d8f7c7491553bb81ec5b9d3ba20a35efab95b4ba010c1223705eda720ce560da1e00621783c6ed9edaed2dbc1b6cef275c1bf5c064d3f51808caa6dc5f1a27185c784820d5bda2213b6cf4a26062c122c0c6825ccdcb06820bfd5bb7c9444e15f9d0b8d13d743546228b5159d5a271af7fb548a64225ba16ff95ea8ae52128df9d0e1a2e06d321776b7e084378d545c9101c69c25dd37899dad7322e06d28b311d3c1c012e027978dfd9605b84f548e23021fbc09bf3d7df448685bf6d3ed8785375056a443bcfe26d5eeebdb181e50", 0xd7, 0x7ff}, {&(0x7f0000000700)="2453ba36c172f4ad84264505301d196e32411fd13fcf09dbdac2dd763ceca9c79631c32d17abf7de98b8783a306e7f66cd81082f7ab91984895b60bbc7cfed9b787c84f0995a46406a82bfd4a89554adba432d6b6cc7e3b9e36fe60e101b54c2ef8f829e3317f5d45e2c23be16645fe97f682d08eddcfb4c740a1691729caba80dcdf5d819ca60f910b2b721121a215903392a2e3c3036345371d917", 0x9c, 0x3}, {&(0x7f00000007c0)="c1745ef8c2c5229c806af5e95bf16896a92aa6cb0265b1c9876d445e20c800c61e27db6296a3da743601e2c664dbd419f5effc98594925d3bf67226fa75fab8ef54970f41643adc70eff3d03621fe543be2adc0d249a1958fdcc982eb7adc6e9001bdd31f9505c226845c25deb824e75a66eae130ccb7a0ef0db89883e6411da478d1f022e362912386a2b4ef74e27c94b2d925cc7850ea20a2b77f792479acc1b940d0085e8b814a52e17fa3ef4b64e6089c648954a9aa3a7c79f1b9f88d0cac2cc21edc97f92b07e1487024101179a889ae25b5bed0bce80b9e63c602ae9cb260b14f98bc8e99c6ccc2bbb7061e087157b78c419555b52c8e2355227", 0xfd, 0x5}], 0x108010, &(0x7f0000000980)={[{@dmode={'dmode', 0x3d, 0x81}}, {@sbsector={'sbsector', 0x3d, 0x1c0000000000}}, {@map_acorn='map=acorn'}, {@overriderock='overriderockperm'}, {@dmode={'dmode', 0x3d, 0x9}}, {@dmode={'dmode', 0x3d, 0x1}}, {@map_normal='map=normal'}, {@check_strict='check=strict'}], [{@fowner_eq={'fowner', 0x3d, r2}}]}) [ 355.152266][T19488] overlayfs: unrecognized mount option "ýf‹ïupperdir=./file0" or missing value 20:59:53 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 20:59:53 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x9, 0x1}, {0x8, 0xffffffff00000001}]}, 0x14, 0x2) setuid(r0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x6, "bb50c97c6946"}, &(0x7f0000000040)=0x2a) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200c0, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{0x5, 0x3ff, 0xf48}, {0x80000001, 0x400, 0x7fff, 0xbf}, {0xffffffff, 0xfffffffffffffff7, 0xd9d9, 0x1}, {0x6, 0x6f, 0x8, 0x20}, {0x4, 0x9, 0x2b45, 0xcf}]}) 20:59:53 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:53 executing program 5: 20:59:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:53 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:53 executing program 5: 20:59:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000180)="6301bcc6dd4fe07606e92e0cbe65d2d3c1674a0c57d21a0ece1fca2c8e0aadaa5994a29103491a8017642db506c4c7bdd27e7ab3081d3cb0c8418841978381855bf4e92aaf710f8db0a11884108bd61dd5035af9c9613cc1fdca53f60582d5dbf0e08ea8910532b9dc101bf01c8641050fc706b198cfd4def1081f2492c559c62d9538a0d251f17f4c4f64786d7166a33da4122c8ee4bf634bb7f51354b4b24cfa217d2c4cd06e63d5981520e752d2476ae0f59c1bc589", 0xb7, 0x9}, {&(0x7f0000000240)="4c614699a2340e55af4188fb7813e453615802f06f26589cf509f11c740bd762baa0145ac78c3a02330364193c86034c127b49248503cbaaee80d48b92f364ba523d45d6d143a32d22074800bc9bb06921ef230bc42f54b077fbdd7367b1240104c608752ae03e79ae19fd2b041c0ee9656d87e9364dfc78453d9c02eddb20dddaa6904ab7ed74845f99e06f16c82c30a9fc695ea6586cb75f557d112325d7d4523aecc12e6cb3914841d799861266c2882efc371f52f41d8a11b257ea9ecf6ba7000f9a1281276ac43a4a5f3120c7be4d3d70f16f7676c529a9b1eab689bc40007356b1a5c487db88d236a400ff0760", 0xf0}, {&(0x7f0000000340)="edad633a5f9b4f6f554c6b1343fbf246dbdee37841f1859c3ef8ebefbba68c48c0be9b6b2eb83b24fab97cf18df76ff9690dd94188edb72271fcb132591e7a5a427675a3a509388f57f446f3055d543732882a379f1afd04108661621c9fe89885271a416ec7c052b73c2b9a0dbeafd39a0c62240f7da11afbe03dc35932338fbc3afc03440bf1363cd3b6ab251de41df227e952d65886", 0x97, 0x592e}, {&(0x7f00000000c0)="b7be5fd79ab41ae80dfe262484a84c2d663eac1de18ba9a813a136cd863ecda01761a2c6151c146ce1c29fc9229c0f9ea175df0df1629629797f894d1b9e641a8d7cd2a0c8a44843a9315a1b1fe786", 0x4f, 0xfffffffffffffffe}, {&(0x7f0000000400)="5ed576b1aa6e26c49d869d899b0681dc3bdb08318afd7ecaa78974554fb8d5b15b5c3219f593c21ab9cfec9766844af5042581285c78de3a3f0beacfa725ad8a9ef62104ba8553b8cd5891379b426bd4bdf6d3af856a4ac8a64c0eb9c6f08a619e5f27e9a2781ac09fd4e915299fee5071cdfa0550ad3d47c6af15b982ab13b3103e1b0a33164cc8a4fd7f991b5504d49bf597", 0x93, 0xfffffffffffffc01}, {&(0x7f00000004c0)="0f3d49b71cdb3029e88f0b73fb75e5c9bd41641768934e0bb46edb2198b87afb8704d50a0b18c255783520480bdaa65e42e38f70b189cb170cffede79d4265bed4ff8281f4cbf9ecc69ae14c3ba463bb2dcf3d3db9c43677c2a0fefefafd939acdf94d45ad07d8b288d647dbd1ea6ef0469b67cd4b97a51e5e006f057420249c02c80a0b381328837f1b09db59e15ff31f237db16af6459b1dfe8655032f1eb82d4398337517f19ed33e07e4f1f5a1596366aefdf5a8c6c84161dc8b03fd9136a2a256fd60d93f281d58", 0xca, 0xffff}], 0x88000, &(0x7f0000000680)={[{@noacl='noacl'}, {@user_xattr='user_xattr'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x6}}, {@noacl='noacl'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x71c}}], [{@smackfstransmute={'smackfstransmute', 0x3d, ')='}}, {@audit='audit'}, {@smackfsfloor={'smackfsfloor', 0x3d, '(#,'}}, {@fsmagic={'fsmagic', 0x3d, 0xffffffff}}, {@uid_lt={'uid<', r1}}]}) setuid(r1) 20:59:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:53 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/mnt\x00') r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x1) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2) 20:59:53 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) rt_sigreturn() fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000002c0)=0x5) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000200), 0x4) setuid(r1) fgetxattr(r2, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00', &(0x7f0000000100)=""/24, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000080)={0x2, 0x7, 0x209}, 0xc) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_udp_int(r4, 0x11, 0x6f, &(0x7f0000000240), &(0x7f0000000280)=0x4) 20:59:53 executing program 5: [ 356.049333][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 356.050194][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 356.055280][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 356.067715][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:54 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) 20:59:54 executing program 5: 20:59:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:54 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000080)={{0x1, @addr=0x7}, 0x8, 0x3, 0x2}) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:54 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) bind$llc(r0, &(0x7f0000000000)={0x1a, 0x30e, 0x8, 0x7, 0x1, 0x9, @local}, 0x10) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:54 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f00000000c0)={0x91, 0x3}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x80000, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000040)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) 20:59:54 executing program 5: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 20:59:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x10000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffd80) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40080, 0x0) write$FUSE_POLL(r3, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x1, {0x1}}, 0x18) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000100)={@initdev, @multicast1, 0x0}, &(0x7f0000000180)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000200)={@multicast2, @remote, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000280)={@empty, @dev, 0x0}, &(0x7f00000002c0)=0xc) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="78000000190000022bbd7000fcdbdf251d80203b0000fe0000220000080001000000000008000400", @ANYRES32=r4, @ANYBLOB="08001a007f000000100001000000000000000000000000000c4467b6b5245811f7af67a9a27e0001000000000079f0ffff0800da9729cd000008000400", @ANYRES32=r5, @ANYBLOB="08001a000000000008001a000000000008000400", @ANYRES32=r6], 0x78}, 0x1, 0x0, 0x0, 0x4040044}, 0x4) setuid(r2) 20:59:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000030001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:54 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e23, 0x9, @rand_addr="32c71d1825161cf7aae050f300844722", 0x1f}, {0xa, 0x4e22, 0x8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x81}, 0xffffffff7fffffff, [0x7, 0x31, 0x35ce, 0x6, 0xe974, 0x6, 0xbf, 0x100000001]}, 0x5c) 20:59:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getuid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x0, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x1c00000000000}}, ["", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) setuid(r1) 20:59:54 executing program 3: syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x20, 0x14f900) r0 = socket(0x10, 0x4, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendto$unix(r0, &(0x7f00000000c0)="728299ea7beede3d10609b437650c7712c9f6f088acaa7865167b482f11135c3dccd924b20da82866654be75236655b4f9ac22adb8ef90ac860d349aaed790e26e813894ad7c889be6f26849a668dca94fdc0614743f4506d4b74e677eebd0aabe7053cdfd9788f5ba6acddc21d27445d3e519b841e5383ca2f015f11622af2ecf09b27f9b6af8a2989b0d63677cba6001e70096d279e900c9b4ae2fed50a2c312", 0xa1, 0x84, 0x0, 0x0) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) [ 356.765472][T19563] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 356.779352][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 356.785394][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:55 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) 20:59:55 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x80800) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000480)="64f5d9f7", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000080)={{0x1, @addr=0x7}, 0x8, 0x3, 0x2}) setuid(r1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 20:59:55 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = geteuid() setuid(r1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) 20:59:55 executing program 5: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 20:59:55 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$TIOCGETD(r4, 0x5424, &(0x7f00000000c0)) setgid(r3) renameat2(r4, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000140)='./file0\x00', 0x0) flistxattr(r4, &(0x7f0000000100)=""/23, 0x17) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) [ 357.460061][T19585] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 20:59:55 executing program 4: socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffff9, 0x200c3) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x5) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) setuid(r1) 20:59:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:55 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 357.729321][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 357.735228][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:55 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioprio_get$uid(0x0, r1) setuid(r1) [ 357.863150][T19608] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 357.955728][T19613] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:59:56 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f00000004c0)) 20:59:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000034001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:56 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:56 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x8, 0x30, 0x571, 0x7}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r2, 0x3, 0xffffffff, 0xfffffffffffffffe}, 0x10) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:56 executing program 4: r0 = getpgrp(0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000040)=0x2000) getpgrp(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0x5) setuid(r3) 20:59:56 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 358.453485][T19630] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:59:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:56 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @loopback}}, 0x100000000, 0x6, 0x9, 0x1000, 0x2}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0xfffffffffffffff8, 0x8, 0x2, 0x58, 0x7, 0x20, 0x80000001, 0x5, r1}, 0x20) r2 = socket(0xf, 0x0, 0xb) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x6, 0x2000) ioctl$PPPIOCSACTIVE(r4, 0x40107446, &(0x7f0000000200)={0x5, &(0x7f00000001c0)=[{0x3, 0xff, 0x7, 0x1}, {0xffff, 0x100000000, 0x6a, 0x5}, {0x1, 0x492, 0x200, 0x9}, {0x1, 0x7ff, 0x5, 0x80000000}, {0xffff, 0xfffffffffffffffc, 0x3, 0x100000000}]}) setuid(r3) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000cab000)=0xffffffffffffff4e) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x201e00) setuid(r1) [ 358.519709][T19629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:59:56 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:56 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 358.692110][T19652] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 358.745150][T19657] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:59:57 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 20:59:57 executing program 3: r0 = socket(0xa, 0x200000005, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x100000, 0x10000) write$P9_RRENAMEAT(r2, &(0x7f0000000040)={0x7, 0x4b, 0x2}, 0x7) renameat2(r2, 0x0, r2, 0x0, 0x4) 20:59:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000042001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:57 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:57 executing program 1: write(0xffffffffffffffff, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = dup3(r1, r0, 0x80000) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000000)={0x3, "b90995fb8824877313e389650dffe105c9f4416f1ab6131bc3a8e1795a73c343", 0x5, 0x10, 0x504, 0x4, 0xc8ae4f5549942252, 0x0, 0x0, 0x9}) 20:59:57 executing program 1: write(0xffffffffffffffff, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 359.399111][T19670] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:59:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000043001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x40400) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000180)={0xbc, &(0x7f0000000080)=""/188}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f00000001c0)=0x1) setuid(r3) 20:59:57 executing program 5: write(0xffffffffffffffff, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:57 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x141400, 0x0) timerfd_gettime(r1, &(0x7f0000001100)) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) recvfrom$inet(r1, &(0x7f00000000c0)=""/4096, 0x1000, 0x10040, &(0x7f00000010c0)={0x2, 0x4e24, @broadcast}, 0x10) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000040)=0x11) 20:59:57 executing program 1: write(0xffffffffffffffff, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 359.809309][ C0] net_ratelimit: 6 callbacks suppressed [ 359.809318][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 359.820731][ C0] protocol 88fb is buggy, dev hsr_slave_1 20:59:58 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 20:59:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000048001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:58 executing program 5: write(0xffffffffffffffff, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_cache\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', r1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) 20:59:58 executing program 1: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:58 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0xc}, r2}, 0x14) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000049001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:58 executing program 5: write(0xffffffffffffffff, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:58 executing program 1: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 20:59:58 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x2) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x40, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x4000, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x2, 0x0) renameat2(r2, 0x0, r3, 0x0, 0x0) 20:59:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 360.609321][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 360.615119][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 360.929736][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 360.935533][ C1] protocol 88fb is buggy, dev hsr_slave_1 20:59:59 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 20:59:59 executing program 5: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0xc008ae88, &(0x7f00000000c0)={0x7b, 0x600000000000000, [0x175], [0xc2]}) setuid(r1) 20:59:59 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000040)={0x5, "fb62f098b264eb2f8786da8e277297505cae63e9349ea65d70a88afe668c3558", 0x3, 0x408, 0xffffffffffff0001, 0x2, 0x19, 0x3, 0x7fffffff, 0xfff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:59 executing program 1: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:59 executing program 5: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:59 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) getgroups(0x3, &(0x7f00000000c0)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x4000, 0x0) fchown(r3, r0, r1) name_to_handle_at(r3, &(0x7f0000000140)='./file0\x00', &(0x7f0000000680)={0x38, 0xc55a, "171126b5ef9d05b4574083d9e55a000000000000000000a3206f6ce80d400462e2435b52b3ba56ed72084592680ee32c"}, &(0x7f00000001c0), 0x1400) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x20, 0x1, &(0x7f0000000380)=[{&(0x7f0000000280)="9497b7c41611f0ae3da3d914a39c784c77ce44befad35b95eb21501930696c929eeaacb21660212ea74e833660ee21a768cb3c32613870c350fa92189fc70c5adf3696407d5cd626b7db1f402e1aabfe00bdaaebcdb1bc4f5d2fb65b43de71e97a1f827bb4eada9038dcf58577c27bc554aa748244edbaea9adcfe7802fa5d5bb4d0841c0b102f9733fd7716ab405a1901f3a32c88c8fda5116b8ddc5e39221bb00c39884f7f565ee32a14c1f942491541a4bb1cfc87787adaebe3c0abb558c4741de17bd916413009b3645779f46ef8ed4e8502718d8510b21a9d811f1719d500132a1aee27295e", 0xe8, 0x2}], 0x44800, &(0x7f00000003c0)={[{@umask={'umask', 0x3d, 0xfffffffffffffff9}}, {@session={'session', 0x3d, 0xfffffffffffffffb}}, {@creator={'creator', 0x3d, "f2877e28"}}, {@umask={'umask', 0x3d, 0x4}}, {@umask={'umask', 0x3d, 0x8}}], [{@dont_measure='dont_measure'}, {@euid_gt={'euid>', r0}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@uid_eq={'uid', 0x3d, r0}}, {@appraise='appraise'}, {@obj_user={'obj_user', 0x3d, '*)vboxnet14,'}}, {@obj_type={'obj_type', 0x3d, '/dev/vfio/vfio\x00'}}]}) lchown(&(0x7f0000000000)='./file0\x00', r0, r2) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 20:59:59 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 20:59:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x401, 0x101000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x50, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fd}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x50}, 0x1, 0x0, 0x0, 0x804}, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x0, 0x400) faccessat(r4, &(0x7f0000000480)='./file0\x00', 0x0, 0xc00) ioctl$VIDIOC_SUBDEV_G_CROP(r4, 0xc038563b, &(0x7f0000000180)={0x1, 0x0, {0x5, 0x3, 0x4, 0x20f}}) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000240)={r5, 0x700, 0x101, 0x7, 0x4}, &(0x7f0000000280)=0x14) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x74, &(0x7f0000000040)=""/91, &(0x7f00000000c0)=0x5b) setuid(r3) 20:59:59 executing program 5: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 361.889340][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 361.895170][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:00 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:00 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000050001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) setuid(r1) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x1800000000000000, 0x100000000, 0x2, 0x9, 0x100, 0x6, 0x8, 0x8, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r3, 0x2}, &(0x7f0000000100)=0x8) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 21:00:00 executing program 5: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 5: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = syz_open_procfs(r1, &(0x7f0000000000)='smaps_rollup\x00') ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4, 0x7fffffff, 0x0, 0x1b, 0x2, 0x4, "0f5bca8a726eb609c947e62b001a15f012d518013a1d3387c71b348a7cd963aa6d10c7f2fe2f3dd1f7bb2a74b8d2b23a111f691372ea0166e6e7e0989f57df51", "eb139462a85f4446ee6472353e70b08a56213009e112e546e9731df3d74d0877ecec9e295184bbba7319176376f6b3c56685111a22858d1f12502f7a1a086e65", "f9147aceedda7b6c033d254051f2a5a1e9b9ecf9efdf63cc1a44ff561d65dc00", [0x6, 0x4]}) setuid(r2) r4 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)="efbe182969cb44a4dca2536b4984dd0b67bfcad198059a54e4cdb26075102d12819ffe4ac46f61a06d2be4d4739e0c92d4f03cb6dd72920c2bed2d7d8bec29aa47951fb79a0f5d7d1a674e7952240e799ba75f1c7355388ab8e2c2febaad6c3b9b5bf05a9146d62da576ee8013fc9cf216ed0c6a9525f5a05e00dd357c25cac5e558ca7d72ae286b46e3ea8172498bfdec104b97f2c373b23664d82f92dde9ec3d3fefa3c9c606881b3cc1de3cf467df23a8ad9ded1076f464d5487a", 0xbc, 0xfffffffffffffffc) keyctl$revoke(0x3, r4) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$VIDIOC_G_OUTPUT(r3, 0x8004562e, &(0x7f00000002c0)) gettid() setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000001c0)=ANY=[@ANYBLOB='broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB='\x00'/48], @ANYBLOB='\x00'/136], 0xf8) 21:00:00 executing program 1: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000051001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) syncfs(r0) 21:00:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) [ 362.289729][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 362.295947][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:00 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:00 executing program 5: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 1: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2402000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1) 21:00:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x400c55cb, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f0000000040)) 21:00:00 executing program 5: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 1: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:00 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0xfffffffffffffffa, 0x0, 0x10001, 0x1}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x400, r1, 0x10001, 0x7}) socket(0x11, 0x7, 0x3) setuid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) 21:00:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2403000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'system.', 'cpusetsystemtrusted*\\\x00'}, &(0x7f0000000080)='procposix_acl_accessGPL\x00', 0x18, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) utimensat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x2710}}, 0x0) 21:00:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2404000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:01 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:01 executing program 1: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:01 executing program 5: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) tee(r0, r1, 0x8001, 0x4) setuid(r2) ioprio_set$uid(0x3, r2, 0xeaf2) 21:00:01 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000000)={{0xffffffffffffffff, 0x1, 0xfff, 0x0, 0xaf0}, 0x9, 0xa1}) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2405000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:01 executing program 5: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2406000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7f000000000000, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0x211) setuid(r2) 21:00:01 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x80000) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000040)={0x9525e462088de631, 0x0, [], @raw_data=[0xffffffffffff7fff, 0x6, 0xffffffffffff8000, 0x7fff, 0x7, 0x5, 0xb19, 0x609, 0x5, 0xd84b, 0x3, 0x4, 0x2, 0x5f, 0x99, 0x3ff, 0x9bbe, 0x6, 0x2, 0x9, 0x80000001, 0x0, 0x6, 0x9, 0x7bf, 0x6, 0x8001, 0xffffffffffffae02, 0x0, 0x5, 0xfa, 0x8]}) flock(r0, 0x2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:01 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 21:00:01 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 21:00:02 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:02 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:02 executing program 4: r0 = getpgrp(0xffffffffffffffff) getpgid(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) 21:00:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2408000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:02 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 21:00:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 21:00:02 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 21:00:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2409000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000040)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000001200)={@can={0x1d, r3}, {&(0x7f00000001c0)=""/4096, 0x1000}, &(0x7f00000011c0)}, 0xa0) 21:00:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 21:00:02 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x40002) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, 0x9e2) 21:00:02 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000), 0x0) 21:00:03 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240a000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000), 0x0) 21:00:03 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) getsockopt(r0, 0x24, 0x2, &(0x7f0000000000)=""/202, &(0x7f0000000100)=0xca) 21:00:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000), 0x0) 21:00:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000), 0x0) 21:00:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 21:00:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000), 0x0) 21:00:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240b000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:03 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7ff, 0x608200) r3 = openat$cgroup_type(r2, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000080)) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 21:00:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00", 0x12) 21:00:03 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240c000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000), 0x0) 21:00:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) accept$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) 21:00:03 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x2) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffe64) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x12, r2, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x4, 0x100132, 0xffffffffffffffff, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x21, 0x0, &(0x7f0000000180)) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000534000/0x3000)=nil, &(0x7f0000bd1000/0x2000)=nil, &(0x7f000038f000/0x4000)=nil, &(0x7f0000b1d000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f000051f000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff1000/0xe000)=nil, &(0x7f000072e000/0x2000)=nil, &(0x7f0000615000/0x4000)=nil, &(0x7f0000956000/0x3000)=nil, &(0x7f0000000100)="c9a2ad7d3de7a5263063745043c3c03483c5348fa638a65273c86177bca4653c77efb61381df82114b66c99476ebfe4fbd15fc1cc3081b71e0c6a19f2912882ee31dad4ac00bbc1a94d84b78313acf1b9d5005d28a1b73c5360c3f4af4e32d06bb49914c2282b17b", 0x68, r3}, 0x68) fsetxattr$security_capability(r2, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v3={0x3000000, [{0x9, 0x100000001}, {0x4, 0x7}], r1}, 0x18, 0x3) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000000c0)) 21:00:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00", 0x12) 21:00:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00", 0x12) [ 365.666151][ T26] audit: type=1400 audit(1554843603.744:155): avc: denied { map } for pid=20001 comm="syz-executor.3" path="socket:[71557]" dev="sockfs" ino=71557 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=rawip_socket permissive=1 21:00:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00", 0x12) 21:00:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240e000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x81, 0x0) sendmsg$alg(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000180)="16505f7ef5d3048187ba222eeedf39825a16214f207dcf0b63be7cb26404ff89e33c45065a0daed1f2347426339e43e7b9343aac99e1a742d9df73051be0e0a8a5ac5bec482ff3496cf3cafdee6c9558bdc33d1248df4a2e6064bcb5076619b426610205249ff053b7ff5ee84f11634b7a3d3f5281f16a773127d5555b51caf8", 0x80}, {&(0x7f0000000200)="4bb7849782f16bf41c048da6f4eac1df7505cef91dbe4e122ebe5abc96ce2b14d06e2d38b02be7c2b55e3c39b3170e864cb4d61a677cb88982e59a242ad4506c2cfe2fd58f52c4bd629d6a2c6b93b12ad525efb8a36917761957c849ee266eb75483dd5c42234fa750d5f592b297a0e52ef8b7015c7b84de0da60bb33c38bea41746f1828dcd0d7e55f98c29f36f7061fcada2934c56e210f8b1c80fac61dfc6c4c664d13f678535e9439e422dbc10e0a7df624465e46491660e52a58f0dc650063d5f3f26af29a159aad610d83ea62f81c85e70cb801a", 0xd7}, {&(0x7f0000000300)="73d99b2f75f0f76ea00da4d2e236e2cca40c150a88f148ad6c75e80600f608c457a7efd889e91083cf6774a2bcd90af929690d45f254bc1b8faa93c95bf77939a5a68ca61acb9bd4f3ad726f57cc4e1a0af907bd3045030a618fe60720e829870d872eed538502031ee16d08bc964acd2d930953096e069d229dd0c049516ec1e2064ff74827a3687dd8a15cfcc18693b8f3000cc5e2ed6f00eaa5a32af17292b7cb8a05b7b105a9cbdac8", 0xab}, {&(0x7f0000000100)}, {&(0x7f00000003c0)="394ce59b15eb6fa83d408162db084e96848d0e7e820da83acc6dfb7ab6b9f2421bdbc79f81e9bc7533de9286a5680442141bb6e098155090982192e65602549263c2c93e3e01f6c5c4fca6f8afe066185627299d242455ccdff785a3485e40e4f633b151c41175", 0x67}, {&(0x7f0000000440)="624f949ae7cb2ef051508f4b565b3d671c7b262aa6073e6123133583f22b12415316c2f4ebd9d10ebaa1df9dec0fd817869459e5e5cffe6350e42c137a1e210ed62b0dd4b434be1f69c03569a3fbb546e66609373aea58026c2ca606f36e951395dd11f19b972512b42a55268b34a58e", 0x70}, {&(0x7f00000004c0)="55fb68d6f110d7bd2c72619b97ef6f2b7fe14f4ec22b2096511aa8b1158c65df50aecb6ae3988c0465dbc4335781be29e69ddc920d9d51c8141a453790053fc579727b01183e3853a8fd61dd358571930d813b3141497ff405c618b8562d39d77a5d96f4abbb", 0x66}, {&(0x7f0000000540)}], 0x8, &(0x7f0000000600)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0xb0, 0x117, 0x2, 0x9b, "816d5685f279529109244ea86c8f0cc6978b99d1c6e81836d9969cfa264f91581377158a75477d12f69839d83929f9eb0131f76fae9ac122ccaee1347d4c974b27731973e23252c16bf4706ccbfbb20fb4ea23a7fb5cda5931f6f40459be6a2dd940dc9bb388c3f4f10c0ed979c14ac9a85a08e3d519e3bc46dd6fcd8ee1da318b563d2ad65be238d06fe70b1a05a56b0409e770b535c86fea332e"}, @iv={0xb8, 0x117, 0x2, 0xa1, "f57d0bdb72921f1fd30aefbcbd4689da570cf27024a0b2a98fb836748e665d36fa58371e8e0883bc313b131708f61330e5e5170c586537b815f7d957ad875b79caf96066dcbb26d5023a3246f726c6753c3d072b6d6405b1bd5b801fac69312921fa636ca0b85ca71b21bba673ab654755b3379759c52d30bad4f4e52c9d3ff11d1b441a98420c925514b190508e3c412a59f79561d200a8250f999b003e1b4d44"}, @iv={0xb0, 0x117, 0x2, 0x9a, "4748ff46bb530823b036c6e00f618a66751038a72ef9ba1bd4d6852123dbadd80e7874db5460fc7a5435e950f21b7e9d5151d95ef9254486a7f6a5a7b29c1937a65e3f1380ff376d0816d5cd42fd44c1d92f56e99d354e9264d2e4ec135f0ce4a6d47f8e4d4e034319136ffa05456138efedb0412eaa36fc91727a47f9c0cc28d9c79b67f0751f40abc951b6396684de25827619d0c7192509a4"}, @iv={0x58, 0x117, 0x2, 0x42, "99106c33e399dc4751ac3faca8ef326bdbd01e924e1dc26df2a95dc5d8751537675d9d7c870cb6c749c1606f5a359c0dba8767d17c7c8fff9ce0e48c1087f755f305"}, @assoc={0x18, 0x117, 0x4, 0x3ff}], 0x2a0, 0x4000}, 0x80) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) 21:00:03 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) unlink(&(0x7f0000000000)='./file0\x00') renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:04 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffff", 0x1b) 21:00:04 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) 21:00:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00", 0x12) 21:00:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240f000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:04 executing program 3: r0 = socket(0x10, 0x2, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) setsockopt$rose(r0, 0x104, 0x4, &(0x7f0000000080)=0x948, 0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x301000, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000040)={0xc220, 0xfffffffffffffffb, 0x9, 0x2}) 21:00:04 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffff", 0x1b) 21:00:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2410000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00", 0x12) 21:00:04 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffff", 0x1b) 21:00:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) kcmp(r2, r2, 0x2, r1, r0) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040)=0x17, 0x0, 0x2) 21:00:04 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2411000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:04 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:04 executing program 4: delete_module(&(0x7f0000000000)='cgroup\x00', 0x200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 21:00:04 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff08000000", 0x20) 21:00:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffff", 0x1b) 21:00:04 executing program 3: r0 = socket(0xc, 0x100000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) 21:00:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2412000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r1) 21:00:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffff", 0x1b) 21:00:04 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2413000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff08000000", 0x20) 21:00:05 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff08000000", 0x20) 21:00:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/snmp6\x00') socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000240)={r1, r2, 0x7, 0x0, &(0x7f0000000200), 0x9, 0xb02, 0x3, 0xfffffffffffffffc, 0x4, 0x0, 0x2, 'syz1\x00'}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sockstat6\x00') ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000080)={0x0, 0xb, 0x9, [], &(0x7f0000000040)=0x2}) r4 = socket(0x11, 0x200000000002, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 21:00:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2460000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffff", 0x1b) 21:00:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff080000000000", 0x22) 21:00:05 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:05 executing program 3: r0 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000380), &(0x7f0000000400)=0x60, 0x80000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x100, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000480)=r1, 0x4) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000002c0)) setuid(r3) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000080)="b10077d48368326c657285e26b8cd2f6f260f2bee9b66935b06667ba5c1ea9e727622781b9a44e0a8ca4d3038ca683a2f1997bf3d46f63882f4dcf497cea0dc562e79582f551214af1ef4b1455a09e2b9efca9937bc37ffa1fa5274c3d46c48f0e23823d974451ecd6a871b5e6d0b1ca1c3ba5645954603e4521218835c8e71240348c2adb52f84b9b3b716019267c71eed7e24fe5ad28719ecb91613e9bad63", 0xa0, 0x2}, {&(0x7f0000000140)="501f53e7b39acfd9c8dc8dd6c8a1f93ff4c533ef330c6e17cd61bbf55da8da2b935e002a31a3908026774679d0b4a2ec", 0x30, 0x2}, {&(0x7f0000000180)="2aa565704829e6a579d1ffb56eeb2247873c5f1d892b69993e416343b1246366415fa64d0cdbde15c1230740ccbc55df9303771f1a0ff9613a4f7d2748bae17455b5e529d0dc24a10325a5e28b9ce90c931e4307b90f788ad2302636508b", 0x5e, 0x2}], 0x800, &(0x7f0000000280)='ppp0[selinux\x00') renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f0000000100)) setuid(r1) 21:00:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff08000000", 0x20) 21:00:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24e0000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff080000000000", 0x22) 21:00:05 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:05 executing program 4: socket$vsock_dgram(0x28, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 21:00:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24f0000052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff08000000", 0x20) 21:00:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff080000000000", 0x22) 21:00:05 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400030052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff08000000000000", 0x23) 21:00:05 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x8000) 21:00:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff08000000", 0x20) 21:00:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 21:00:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400050052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:05 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000100)=0xe8) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000140)=@hci={0x1f, r2, 0x3}, 0x80, &(0x7f0000000480)=[{&(0x7f00000001c0)="7153b5350789824bea619e85491e549eb0442f6e94256df6eb72edbf04e18a59d8b3d7814dc770a55ad68635752fe5c41e857b1f17e2b580b17d358352943b79c59af4f2a88e43ebc175942257969dbdd74f90eb9668ed9882be465b06f81eb6f6df7e01aa4c84a251aae0f40895023cc9686043db2a", 0x76}, {&(0x7f0000000240)="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", 0xfa}, {&(0x7f0000000340)="708ce31e6735d49b98795ce47859a4157a339842ab2f7118c3aa7149471841b71639c314a649e63389c1f60a4536aed5a95bd647b9dfc09f62315088244ab39fbdaafd68912fbe6b7193576d95cc8772533e775590d1d2eb099ed91f068398c1240361b672dd3d94d29a6b42", 0x6c}, {&(0x7f00000003c0)="df8946905b2c05db80f0a6e4930e2951171063cfc10d41ea51bee9fdf0d64a71bfc2c5816b137d7b2a9c1c85927168a1876f463994aaf716b2f4a606f7480c138a2c6e711d41e8511eb6a2f7d73bfbe6b1940f5100fcb543988fe161242006ebbff908980d83ba75f4f217f45fd5093b8e61bd81b8753bca9ff2acf49f43cb641b6e4ba33fb5aad4bd7e834209cf0f1ff2cb95c3caf4e68b4ca13078da8307248712cb626a54dd64ba60b6fed7038f3c59952c", 0xb3}], 0x4}, 0x840) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:05 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2414050052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:06 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24, @remote}, 0x1, 0x3, 0x4, 0x4}}, 0x33a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 21:00:06 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff08000000000000", 0x23) 21:00:06 executing program 3: r0 = socket(0x10, 0x2, 0xfffffffffffffff7) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x260040) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff080000000000", 0x22) 21:00:06 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400060052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@empty, @in6=@local, 0x4e23, 0x800, 0x4e22, 0x2, 0xa, 0x20, 0x20, 0x33, r2, r1}, {0xf1cc0000, 0xffffffffffffffc1, 0x1f, 0x8, 0x0, 0x4, 0x6, 0x5}, {0x1, 0x9, 0x6, 0x1}, 0x5, 0x0, 0x2, 0x1, 0x3, 0x1}, {{@in6=@local, 0x4d3, 0x33}, 0xa, @in=@rand_addr=0xfffffffffffffff9, 0x3503, 0x1, 0x3, 0x7, 0x6, 0x91, 0xb9}}, 0xe8) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:06 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff08000000000000", 0x23) 21:00:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket$nl_netfilter(0x10, 0x3, 0xc) 21:00:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff080000000000", 0x22) 21:00:06 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400090052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x10000027f) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@empty, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x2c000, 0x0) ioctl$TIOCMGET(r3, 0x5415, &(0x7f0000000380)) setuid(r1) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0xfffffffffffffffc, 0x270800) ioctl$KVM_GET_SREGS(r4, 0x8138ae83, &(0x7f00000001c0)) 21:00:06 executing program 3: r0 = socket(0x10, 0x2, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x20000, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x8000, 0x0) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1, 0x37) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x28000, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) renameat2(r3, 0x0, r2, 0x0, 0x5) 21:00:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff080000000000", 0x22) 21:00:06 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000a0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) pipe2(&(0x7f0000000080), 0x80000) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x6, 0x400000) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x101040, 0x100) write$P9_RSYMLINK(r3, &(0x7f0000000040)={0x14, 0x11, 0x1, {0x0, 0x4, 0x1}}, 0x14) setuid(r1) 21:00:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xb5bfef0b664349cb) setuid(r1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x1, 0x7, 0x4, 0x2, "c6d325080ec6d10cca235d4154f426e829219693476caa4219d8d3a5f080536a82bdb9e35d5b36c3d5929ba06c7bdfb11554e353b0a95f1c34ded34f274dd2", 0x23}, 0x60) sendto$inet(r0, &(0x7f0000000100)="6d4c9f01951d2a891196f494b7b1072e03c8d9c8fc4974e5e57892663d1567eebc7b3590d10d777649ae1c734cbb3fcc9a0552b352c0be463dd855b17bde6a5721258453d7941357b562c2513c875991e3b1aca18c73162330ac3e8cfc36875d022b8c9a3c40f071cb6bc4b9fa2224acdf0eff2e0a62085c8a93fb2aef6e700154cca8fec9bd9ceae582e85e31aeb2557d0f3a1f8b8ce663e542f94c800740fd2911908c64175dcc8bd7e4ae8d7022fac7879f4c054013b0ca7fd89170501ada76e58de9605ea58fbe53cf7d062291239c6e310300618de1e896b7158c487c14fe53b5bd77", 0xe5, 0x40, &(0x7f0000000200)={0x2, 0x4e20, @rand_addr=0x10001}, 0x10) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x94000, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f00000000c0)) 21:00:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff08000000000000", 0x23) 21:00:06 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x480, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000040)=""/163) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @empty}}, 0xfffffffffffffffe, 0x5, 0x3, 0x3ff, 0xfd54}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e21, 0xc0, @dev={0xfe, 0x80, [], 0x23}, 0x1}}}, 0x84) setuid(r1) recvfrom$x25(r0, &(0x7f0000000100)=""/241, 0xf1, 0x2100, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000cab000)=0x2c9) setuid(r1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), 0x1ff) 21:00:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000b0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:06 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff08000000000000", 0x23) 21:00:06 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:07 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000c0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:07 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff08000000000000", 0x23) 21:00:07 executing program 4: socketpair$unix(0x1, 0x20000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffea6) setuid(r1) personality(0x410000e) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="fff8c69fb027a6afe03fd8d98ba73393a1c0e3ce05d7d533889a59ca86ad18b6c9d1ddf31a33283604a37ca7a332188402d5c42cb2a373c060f7cacbc3f2ddd7f7faf7ef81a557e6a48994", 0x4b, 0x1}], 0x800000, &(0x7f0000000180)={[{@fault_injection={'fault_injection', 0x3d, 0x5}}, {@acl='acl'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x2}}], [{@fsmagic={'fsmagic', 0x3d, 0x20}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, r1}}, {@euid_eq={'euid', 0x3d, r1}}, {@measure='measure'}, {@smackfsroot={'smackfsroot', 0x3d, 'cpuset.'}}, {@smackfsdef={'smackfsdef'}}]}) 21:00:07 executing program 5: write(0xffffffffffffffff, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:07 executing program 5: write(0xffffffffffffffff, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:07 executing program 1 (fault-call:1 fault-nth:0): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 369.201177][T20293] erofs: read_super, device -> /dev/loop4 [ 369.261190][T20293] erofs: options -> fault_injection=0x0000000000000005,acl,noacl,fault_injection=0x0000000000000002,fsmagic=0x0000000000000020,euid=00000000000000000000,euid=00000000000000000000,measure,smackfsroot=cpuset.,smackfsdef=, [ 369.313389][T20301] FAULT_INJECTION: forcing a failure. [ 369.313389][T20301] name failslab, interval 1, probability 0, space 0, times 0 [ 369.330888][T20293] erofs: cannot find valid erofs superblock [ 369.340184][T20301] CPU: 0 PID: 20301 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #60 [ 369.348405][T20301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.358478][T20301] Call Trace: [ 369.361838][T20301] dump_stack+0x172/0x1f0 [ 369.366205][T20301] should_fail.cold+0xa/0x15 [ 369.370858][T20301] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 369.376690][T20301] ? ___might_sleep+0x163/0x280 [ 369.381649][T20301] __should_failslab+0x121/0x190 [ 369.386602][T20301] should_failslab+0x9/0x14 [ 369.391113][T20301] kmem_cache_alloc_node+0x264/0x710 [ 369.396432][T20301] __alloc_skb+0xd5/0x5e0 [ 369.400776][T20301] ? skb_trim+0x190/0x190 [ 369.407343][T20301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.413596][T20301] ? netlink_autobind.isra.0+0x228/0x310 [ 369.419349][T20301] netlink_sendmsg+0x97b/0xd70 [ 369.424744][T20301] ? netlink_unicast+0x720/0x720 [ 369.429698][T20301] ? tomoyo_socket_sendmsg+0x26/0x30 [ 369.434998][T20301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.441263][T20301] ? security_socket_sendmsg+0x93/0xc0 [ 369.446732][T20301] ? netlink_unicast+0x720/0x720 [ 369.451766][T20301] sock_sendmsg+0xdd/0x130 [ 369.456200][T20301] sock_write_iter+0x27c/0x3e0 [ 369.460998][T20301] ? sock_sendmsg+0x130/0x130 [ 369.465794][T20301] ? inode_has_perm+0x1b0/0x230 [ 369.470978][T20301] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 369.477233][T20301] ? iov_iter_init+0xee/0x220 [ 369.481973][T20301] new_sync_write+0x4c7/0x760 [ 369.486675][T20301] ? default_llseek+0x2e0/0x2e0 [ 369.491570][T20301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.497926][T20301] ? security_file_permission+0x94/0x380 [ 369.503587][T20301] __vfs_write+0xe4/0x110 [ 369.508836][T20301] vfs_write+0x20c/0x580 [ 369.513095][T20301] ksys_write+0x14f/0x2d0 [ 369.517438][T20301] ? __ia32_sys_read+0xb0/0xb0 [ 369.522242][T20301] ? do_syscall_64+0x26/0x610 [ 369.526996][T20301] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.533077][T20301] ? do_syscall_64+0x26/0x610 [ 369.537998][T20301] __x64_sys_write+0x73/0xb0 [ 369.542600][T20301] do_syscall_64+0x103/0x610 [ 369.547402][T20301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.553314][T20301] RIP: 0033:0x4582b9 [ 369.563746][T20301] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.583954][T20301] RSP: 002b:00007fdbcc412c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 369.592404][T20301] RAX: ffffffffffffffda RBX: 00007fdbcc412c90 RCX: 00000000004582b9 [ 369.601261][T20301] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 369.609250][T20301] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 369.617348][T20301] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbcc4136d4 [ 369.625339][T20301] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 [ 369.658693][T20293] erofs: read_super, device -> /dev/loop4 [ 369.677248][T20293] erofs: options -> fault_injection=0x0000000000000005,acl,noacl,fault_injection=0x0000000000000002,fsmagic=0x0000000000000020,euid=00000000000000000000,euid=00000000000000000000,measure,smackfsroot=cpuset.,smackfsdef=, [ 369.705820][T20293] erofs: cannot find valid erofs superblock 21:00:07 executing program 3: r0 = socket(0x10, 0x2, 0x5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0x3) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040)=0x1, 0x4) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000e0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:07 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:07 executing program 5: write(0xffffffffffffffff, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:07 executing program 1 (fault-call:1 fault-nth:1): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x242, 0x0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) setuid(r1) 21:00:08 executing program 5: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 369.931330][T20324] FAULT_INJECTION: forcing a failure. [ 369.931330][T20324] name failslab, interval 1, probability 0, space 0, times 0 21:00:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000f0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:08 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x0) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) setuid(r0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) accept4$ax25(r2, &(0x7f0000000040)={{}, [@default, @remote, @netrom, @null, @default, @rose, @remote, @rose]}, &(0x7f00000000c0)=0x48, 0x80000) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000100)=0x3, &(0x7f00000001c0)=0x2) [ 369.998529][T20324] CPU: 0 PID: 20324 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #60 [ 370.006566][T20324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.016638][T20324] Call Trace: [ 370.019950][T20324] dump_stack+0x172/0x1f0 [ 370.024509][T20324] should_fail.cold+0xa/0x15 [ 370.029122][T20324] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 370.034956][T20324] ? ___might_sleep+0x163/0x280 [ 370.039824][T20324] __should_failslab+0x121/0x190 [ 370.044775][T20324] should_failslab+0x9/0x14 [ 370.049307][T20324] kmem_cache_alloc_node_trace+0x270/0x720 [ 370.049333][T20324] __kmalloc_node_track_caller+0x3d/0x70 [ 370.049351][T20324] __kmalloc_reserve.isra.0+0x40/0xf0 [ 370.049368][T20324] __alloc_skb+0x10b/0x5e0 [ 370.049385][T20324] ? skb_trim+0x190/0x190 [ 370.049401][T20324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.049427][T20324] ? netlink_autobind.isra.0+0x228/0x310 [ 370.061185][T20324] netlink_sendmsg+0x97b/0xd70 [ 370.061205][T20324] ? netlink_unicast+0x720/0x720 [ 370.061221][T20324] ? tomoyo_socket_sendmsg+0x26/0x30 [ 370.061236][T20324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.061249][T20324] ? security_socket_sendmsg+0x93/0xc0 [ 370.061260][T20324] ? netlink_unicast+0x720/0x720 [ 370.061276][T20324] sock_sendmsg+0xdd/0x130 [ 370.061299][T20324] sock_write_iter+0x27c/0x3e0 [ 370.061322][T20324] ? sock_sendmsg+0x130/0x130 [ 370.133318][T20324] ? inode_has_perm+0x1b0/0x230 [ 370.138198][T20324] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 370.144656][T20324] ? iov_iter_init+0xee/0x220 [ 370.149533][T20324] new_sync_write+0x4c7/0x760 [ 370.154223][T20324] ? default_llseek+0x2e0/0x2e0 [ 370.159103][T20324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.165358][T20324] ? security_file_permission+0x94/0x380 [ 370.171107][T20324] __vfs_write+0xe4/0x110 [ 370.175799][T20324] vfs_write+0x20c/0x580 [ 370.180058][T20324] ksys_write+0x14f/0x2d0 [ 370.184399][T20324] ? __ia32_sys_read+0xb0/0xb0 [ 370.189200][T20324] ? do_syscall_64+0x26/0x610 21:00:08 executing program 5: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 370.193886][T20324] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.200146][T20324] ? do_syscall_64+0x26/0x610 [ 370.204849][T20324] __x64_sys_write+0x73/0xb0 [ 370.209480][T20324] do_syscall_64+0x103/0x610 [ 370.214092][T20324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.219992][T20324] RIP: 0033:0x4582b9 [ 370.223995][T20324] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.243611][T20324] RSP: 002b:00007fdbcc412c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 370.252039][T20324] RAX: ffffffffffffffda RBX: 00007fdbcc412c90 RCX: 00000000004582b9 [ 370.260110][T20324] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 370.268099][T20324] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 370.276113][T20324] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbcc4136d4 [ 370.284279][T20324] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 [ 370.292575][ C0] net_ratelimit: 8 callbacks suppressed 21:00:08 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100000000005) [ 370.292583][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 370.303938][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:08 executing program 3: r0 = socket(0x10, 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={r4, r2, r3}, 0xc) setuid(r2) 21:00:08 executing program 5: r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 370.609334][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 370.609565][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 370.615224][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 370.621355][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:08 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:08 executing program 1 (fault-call:1 fault-nth:2): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400110052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:08 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000080)={0x1, 0x0, 0x103, 0x1, {0x7, 0xed85, 0x7fffffff, 0x1}}) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @rand_addr=0x7}, 0x3, 0x0, 0x3, 0x2}}, 0x26) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000100)={'gretap0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x406082, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x400000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000200)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) 21:00:08 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:08 executing program 5: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 370.846992][T20367] FAULT_INJECTION: forcing a failure. [ 370.846992][T20367] name failslab, interval 1, probability 0, space 0, times 0 [ 370.887029][T20367] CPU: 1 PID: 20367 Comm: syz-executor.1 Not tainted 5.1.0-rc4+ #60 [ 370.895076][T20367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.905145][T20367] Call Trace: [ 370.908481][T20367] dump_stack+0x172/0x1f0 [ 370.913006][T20367] should_fail.cold+0xa/0x15 [ 370.917615][T20367] ? __netlink_lookup+0x3c8/0x7a0 [ 370.922656][T20367] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 370.928502][T20367] __should_failslab+0x121/0x190 [ 370.933466][T20367] should_failslab+0x9/0x14 [ 370.938007][T20367] kmem_cache_alloc+0x47/0x6f0 [ 370.942808][T20367] ? lock_acquire+0x16f/0x3f0 [ 370.947520][T20367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.953890][T20367] skb_clone+0x150/0x3b0 [ 370.958154][T20367] netlink_deliver_tap+0x95c/0xc00 [ 370.963306][T20367] netlink_unicast+0x5a7/0x720 [ 370.968110][T20367] ? netlink_attachskb+0x770/0x770 [ 370.973233][T20367] ? _copy_from_iter_full+0x25d/0x900 [ 370.978621][T20367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 370.984874][T20367] netlink_sendmsg+0x8ae/0xd70 [ 370.989663][T20367] ? netlink_unicast+0x720/0x720 [ 370.994640][T20367] ? tomoyo_socket_sendmsg+0x26/0x30 [ 370.999941][T20367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 371.006204][T20367] ? security_socket_sendmsg+0x93/0xc0 [ 371.011821][T20367] ? netlink_unicast+0x720/0x720 [ 371.017213][T20367] sock_sendmsg+0xdd/0x130 [ 371.021847][T20367] sock_write_iter+0x27c/0x3e0 [ 371.026622][T20367] ? sock_sendmsg+0x130/0x130 [ 371.031318][T20367] ? inode_has_perm+0x1b0/0x230 [ 371.036199][T20367] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 371.042495][T20367] ? iov_iter_init+0xee/0x220 [ 371.047224][T20367] new_sync_write+0x4c7/0x760 [ 371.051922][T20367] ? default_llseek+0x2e0/0x2e0 [ 371.056896][T20367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 371.063150][T20367] ? security_file_permission+0x94/0x380 [ 371.068815][T20367] __vfs_write+0xe4/0x110 [ 371.073403][T20367] vfs_write+0x20c/0x580 [ 371.077665][T20367] ksys_write+0x14f/0x2d0 [ 371.082009][T20367] ? __ia32_sys_read+0xb0/0xb0 [ 371.086793][T20367] ? do_syscall_64+0x26/0x610 [ 371.091483][T20367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.097597][T20367] ? do_syscall_64+0x26/0x610 [ 371.102383][T20367] __x64_sys_write+0x73/0xb0 [ 371.106989][T20367] do_syscall_64+0x103/0x610 [ 371.111606][T20367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.117525][T20367] RIP: 0033:0x4582b9 [ 371.121433][T20367] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:00:09 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) socket(0x3, 0x800, 0x100) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400120052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 371.141186][T20367] RSP: 002b:00007fdbcc412c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 371.149891][T20367] RAX: ffffffffffffffda RBX: 00007fdbcc412c90 RCX: 00000000004582b9 [ 371.157879][T20367] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 371.165871][T20367] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 371.173857][T20367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdbcc4136d4 [ 371.181847][T20367] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 21:00:09 executing program 5: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x3d08) setuid(r1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000180)={{{@in=@local, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe8) write$cgroup_type(r2, &(0x7f0000000280)='threaded\x00', 0x9) connect$packet(r2, &(0x7f0000000100)={0x11, 0xfd, r3, 0x1, 0x4, 0x6, @dev={[], 0x14}}, 0x14) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x9) [ 371.192573][T20367] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:09 executing program 1 (fault-call:1 fault-nth:3): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:09 executing program 3: r0 = socket(0x10, 0x2, 0x0) chdir(&(0x7f0000000000)='./file0\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) fsetxattr(r0, &(0x7f0000000040)=@random={'os2.', '-\x00'}, &(0x7f0000000080)='vboxnet0\x00', 0x9, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:09 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:09 executing program 5: r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400130052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setuid(r1) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x40, 0xcf70f1968f91d925) ioctl$CAPI_NCCI_GETUNIT(r2, 0x80044327, &(0x7f0000000040)=0xa4) 21:00:09 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:09 executing program 5: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:09 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000d00)={0x0, 0x0}, &(0x7f0000000c80)=0x123) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x8, &(0x7f0000000580)=[{&(0x7f00000000c0)="7a0cc13285c505ec5d245c93bf9ad66ab22ddf976976a57fc4d17bdf0ec55348ea4b2dbc74d6fae5cca50cf321fccb06ead5ddbb942e06ff94bb737ebc74c9c699f1558001b40165aed2c420155f3be311f26cdee88e786613068a2f41661f2662b7bdbcff051e2273c767c9c08ff62e6a2e1c890ce53eb4932437d225775d5c243ad67c6259d7d4f0674f44ef1552895333fb9a907a6ad642231a6802d7ab0cbe2a1d4c68b193e4a5eeeb07391da1c1bf2d42a13fed036f9dba681ee15531c5ae2f", 0xc2, 0x6}, {&(0x7f00000001c0)="08fdd93e785891bebd24dbfa2319754dd055636c5bb4877fb7511a4603357601c2e9af80c8552e18df50680aca82963aa976c8aff0cf177cda96132979230caea083c0aaaafb384ef0a421fa99af56209197d54a8f65b491bb50079b6d2998b43f5121a6befb05574f1771518e0e3db844d0f83bd39ce58ede1123eeef0fc0d7a2953c6508a5276c58295f46217720708e3e9e", 0x93, 0x800}, {&(0x7f0000000280)="1031245da03dbb6e329b0890ceef0c5d53ee1382c55cf07ea4", 0x19, 0x9}, {&(0x7f00000002c0)="ad77ce9c76a46cab", 0x8, 0x7}, {&(0x7f0000000300)="591b299b99e2724d77759bb0fb062c1ca2f639a4b9739bc3eb3e54e0e11cf874b835a74b104f23ee1704a28de4fbb8209ff6571616e37ac81e72ee93b77c04696999fb150a8af2d11817010cb5c7dd4e2bf6ef5702cd72ce6ae95c8bd54d1ae01c070cb53005fba6c3", 0x69, 0xa8}, {&(0x7f0000000380)="69e9499b140b6a28c1aa01e543fe23b5729d6b0cdb04ffb9cb14128a0351df3518889299b5d186d4670849d0d0cd58cf5748d889bb66e497f9434e5a499a66ecd6494a6586f82ef86a2078a83a8a7e8739acf6e6414012c4cb1f332d8aae244b0ed444cd21fe", 0x66, 0x5}, {&(0x7f0000000400)="497cbe8ff6f6d9804b81c17b8654bd8b64e35738bab88eb97ded4aaa34f4ab555a430fac0c8910f461e07441ded4436c421e5b81d86d5d0288adb359aca268e415aa1b5c4daa43a2dc2a0b64b7979ed9f879d7571b127718e37e0d330cbb0185c505ddaaea3b4eb6a03f7bcf13ce8ef966c3416dec7c59cfe1e66aa05540b0626ec995cd317b1d3674a616f61bb6", 0x8e, 0x8}, {&(0x7f00000004c0)="a31c0c35c465235e18fc47d1e2f2d506a4b2baf5619bee70da819a03d1590f06a668e6197d584a89d23666fe75f8ab6559e7fd212c3b5ce6c09aea16d08e45590bc2383c2f39c611229fc25365e88311f2c12d35e8fd0fe7fa0fbb6304a294e84c79a6ecea0efc1910d74f8548d4a22e65dba26c8d9ec236420e542ab6a557433647fa260a7dc7d2d56b2edcf2f195f0ff8987f551892f391305ce434a52d084af1f4c5a6a859cad36fda3b264957bf166", 0xb1, 0x6}], 0x10, &(0x7f0000000640)={[{@shortname_mixed='shortname=mixed'}, {@fat=@quiet='quiet'}, {@nonumtail='nnonumtail=1'}, {@utf8no='utf8=0'}, {@shortname_winnt='shortname=winnt'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '*userlo+lomime_typeuser'}}, {@context={'context', 0x3d, 'root'}}]}) setsockopt(r0, 0x0, 0x7d2ee86d, &(0x7f0000000d40)="340f29b402cde0c543e55bdd6d1c2917e8b3b4a09552a2df418c060e5cfb5b27970fab004a2b8e1fa9c04b01afd5776cb852d0672f92654f7f1c150c7a0b2928a612d86591d836a3e7f7cd5e44e7cb5f6d7558536ea282d142737193f5da45a1461382d6b7b8090c034eedd46e4b279bbe78a95928c1e30803d167a6b9a9c3d3f2b75f53b4949de15e28eda62ab1ea6593b56ffac344435007a146c418c2c99943de61c231ab4a05a9f6dda1", 0xac) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000c00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000e00)={0xdae, "dea1d724a4b5f28816c73cb3bab6733f866fffdb7081671aaff32f2820f0d408", 0x3, 0x20, 0x10000, 0x1, 0x2, 0x0, 0x9, 0x4}) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) r3 = syz_open_dev$cec(&(0x7f00000006c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000700)={{0x2, 0x5, 0x37, 0x1, '\x00', 0x200}, 0x1, [0x2, 0x5, 0x0, 0x3, 0x7, 0xffff, 0x5, 0x9, 0x3f, 0xd268, 0xdb42, 0x979, 0xd30d, 0x0, 0xffff, 0xbc, 0xffff, 0x3, 0xd9c, 0x3, 0x1, 0xffffffff, 0x1, 0x623d, 0x7f, 0x4, 0x7, 0x101, 0x6, 0x0, 0x3, 0xffffffff, 0x8, 0x400, 0x7fff, 0x9, 0x7, 0x20, 0x4, 0x0, 0x5, 0x7ff, 0x0, 0x5, 0x8, 0x9, 0x7, 0x1, 0x1000, 0x4, 0x8, 0x2, 0xff, 0x4, 0x4325, 0x1, 0x101, 0xa6c84288000000, 0x3, 0x97f, 0x80, 0xfffffffffffffff7, 0x4, 0xd19, 0x3, 0x4, 0x40, 0xe, 0x6, 0x7, 0x534c, 0x100000001, 0x5, 0x0, 0xffffffffffffffff, 0x189, 0x6, 0x1, 0x3, 0x2, 0x0, 0x7ff, 0x5, 0x5, 0x5, 0x3, 0x23f79e7d, 0x10001, 0x0, 0x7, 0x1, 0x80000001, 0x0, 0x3, 0x0, 0x7, 0xffffffff00000001, 0x60, 0x0, 0x4, 0x3, 0x57, 0x7f, 0x1, 0x4, 0x3, 0xffffffff, 0xc3c6, 0x3, 0x800, 0x0, 0xbd, 0x5, 0x3, 0x8, 0x6, 0x1, 0x3, 0x9fe, 0x800, 0xffffffffffffff01, 0x4, 0xfffffffffffffff7, 0x4f, 0x3, 0x8001, 0x7f, 0x1], {0x77359400}}) sendto(r0, &(0x7f0000000000)="f983f5", 0x3, 0x40000, 0x0, 0x0) r4 = creat(&(0x7f0000000c40)='./file0\x00', 0x20) ioctl$KDDELIO(r4, 0x4b35, 0x7) 21:00:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2405140052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffec4) setuid(r1) 21:00:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24003f0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:09 executing program 5: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 371.769614][T20425] FAT-fs (loop3): Unrecognized mount option "nnonumtail=1" or missing value 21:00:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f00000000c0)=0x40) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f00000003c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="1c8e3e60ad937fda6c39c23383a268605975731f6b3df55f15ef9d12bb24b0e0fc3131ac5dabbd42773a37e5b9a38236d7c3ef6891bd75e86869f67703976050c07bf4ae4f28e98b82eba27b08b306f1f946b97e60a4befd6df4279cdd9f392d55a3e49c63776ab5ed8a60db22d393d3aa0d327f622d5495afc610", 0x7b, 0x2}], 0x8000, &(0x7f00000004c0)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@dmask={'dmask', 0x3d, 0x3ff}}, {@show_sys_files_no='show_sys_files=no'}, {@show_sys_files_yes='show_sys_files=yes'}, {@nls={'nls', 0x3d, 'cp1255'}}, {@gid={'gid', 0x3d, r2}}, {@gid={'gid', 0x3d, r2}}], [{@appraise='appraise'}, {@measure='measure'}, {@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/cachefiles\x00'}}, {@obj_user={'obj_user', 0x3d, 'user\x00'}}, {@measure='measure'}, {@fowner_lt={'fowner<', r1}}, {@obj_user={'obj_user', 0x3d, 'syz'}}]}) setuid(r1) r4 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="b63f6086a333990ee23d4a17b8353545807bf40e510e93a63cd8c676c3cc1af02d4c34f3e9327b2b6bf11c03389c33bc83db3187faa9ccd24eedf97a9cf223c653f3dad229e3b1a62bda753fdbb4b9380f0cc45a067b9181f32dedb9caa4645b52198c0aa5e55417f86c48cff96c54a61ccb5ce5e042cc17c29fcba57330f7a4890f51e85dbe42cfb9e5b935e10c9aeeefc336c7df232d8edc0552c709", 0x9d, 0xffffffffffffffff) connect(r0, &(0x7f0000000300)=@in6={0xa, 0x4e22, 0x6, @local, 0x81}, 0x80) umount2(&(0x7f0000000600)='./file0/file0\x00', 0x8) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f0000000280)='GPL\x00', &(0x7f00000002c0)) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') [ 371.897019][T20431] FAT-fs (loop3): Unrecognized mount option "nnonumtail=1" or missing value [ 372.115396][T20445] ntfs: (device loop4): parse_options(): Unrecognized mount option appraise. [ 372.142184][T20445] ntfs: (device loop4): parse_options(): Unrecognized mount option measure. [ 372.157114][T20445] ntfs: (device loop4): parse_options(): Unrecognized mount option audit. 21:00:10 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:10 executing program 5: socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2465580052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:10 executing program 3: r0 = socket(0x11, 0xfffffffffffffbfe, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x5, 0x3}, 0x8) socket$pppoe(0x18, 0x1, 0x0) 21:00:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008022300ffffffff0800000000000000", 0x24) 21:00:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffe3c) setuid(r1) 21:00:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400600052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 372.350608][T20461] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:10 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 21:00:10 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008002302ffffffff0800000000000000", 0x24) 21:00:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) setuid(r1) 21:00:10 executing program 1: r0 = socket(0x10, 0xffffffffffffffff, 0x7fffffff) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 372.689336][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 372.689610][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 372.695204][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 372.701288][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:11 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2458650052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:11 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@ng={0x4, 0x3, "ecb48a2024e1d683"}, 0xa, 0x3) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 21:00:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7482, 0x800c1) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000040)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r1, 0x0, 0x3, 0x4, 0x80000001}) setuid(r3) 21:00:11 executing program 1: r0 = socket(0x10, 0x3, 0x9) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 21:00:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4800) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000180)={0xd7, 0x0, 'client1\x00', 0xffffffff80000000, "3204e8867df46830", "50e8aa82fbc7fff453033878323eb697c7f778873a8256117c7c0bed68392e40", 0x6, 0x3f}) setuid(r1) 21:00:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400810052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:11 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0xfcea) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000cab000)=0xc0) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) [ 373.370338][T20505] selinux_nlmsg_perm: 2 callbacks suppressed [ 373.370355][T20505] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=49 sclass=netlink_audit_socket pig=20505 comm=syz-executor.1 21:00:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = fcntl$getown(r0, 0x9) rt_tgsigqueueinfo(r1, r2, 0x5, &(0x7f0000000040)={0xe, 0x9, 0xf8}) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000), 0x0) [ 373.704150][T20531] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 373.774137][T20533] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:12 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400e00052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:12 executing program 4: socketpair$unix(0x1, 0x10000002, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 21:00:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) inotify_init() setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x7) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x3, 'ip_vti0\x00', 0x3}, 0x18) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80040001}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='D\x00\b\x00', @ANYRES16=r2, @ANYBLOB="000228bd7000ffdbdf2502000000080002000200000008000400020000000400050004000500080002000a0000000800040003000000080001004e210000"], 0x44}, 0x1, 0x0, 0x0, 0x8044}, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000100)={0x80000000, 0x3bc, 0x2}) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video37\x00', 0x2, 0x0) fcntl$setstatus(r3, 0x4, 0x4400) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000000140)) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000080)=0x7) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000300), &(0x7f0000000340)=0x14) 21:00:12 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000), 0x0) 21:00:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) fdatasync(r0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:12 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000), 0x0) [ 374.059447][T20538] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400f00052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:12 executing program 4: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r0, 0x10, &(0x7f0000000140)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) setuid(r1) [ 374.111086][T20550] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x1, 0x0, 0x6, 0x8, 0xde10, 0xa8}, 0x371e}, 0xfffffffffffffe12) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000080)={0x1, 0x400}, 0x2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x3) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000100)='syz0\x00') openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x2b02c0, 0x0) 21:00:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:12 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00", 0x12) [ 374.487967][T20573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 374.505602][T20574] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:12 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000067001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:12 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x92c, 0x185100) ioctl$TIOCGPTPEER(r2, 0x5441, 0x57) setuid(r1) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r1) 21:00:12 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00", 0x12) 21:00:12 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x20000) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0xffffffba) r1 = socket(0x10, 0x3, 0x7ff) dup(r0) write(r1, &(0x7f0000000180)="2400000031001f0014f9f407002c04000a00071008000900ffffffff08000000000000008f3286b21501330f794a407ca368497846d9b2ad70d97e7ff6e14b92693391c16bde979cefad2e8a3206000000565bbee5893f46ca807b5d4d1e", 0x5e) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x3a, "f10e3954c903fd93dfbd5b672f42234ef426f763a4f4ea0f2b9b5e59270cdab38509eee5eb6dd22f25d4f03c9ddfdf464c4eb1962077ea7b4c7b"}, &(0x7f0000000000)=0x42) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000240)={r2, 0x2}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x0, 0x1, 0x0, 0x2, 0xfffffffffffffffe, 0x9, 0x0, 0x200, r2}, 0x20) 21:00:12 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00", 0x12) [ 374.854719][T20584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=20584 comm=syz-executor.0 21:00:13 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'veth1\x00', {0x2, 0x4e21, @remote}}) 21:00:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r2) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x301000, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000100)=[0x7ff, 0x7b4, 0x51d, 0xff, 0x100000001, 0x3, 0x0], 0x7, 0x6, 0x2, 0x6, 0xffff, 0x5, {0x7, 0x8, 0x7f, 0x3, 0x4, 0x80, 0x100000001, 0xfffffffffffffffe, 0x6, 0x20, 0x6, 0x1, 0xfffffffffffffff8, 0x7, "5c01d73bd039e6cd30439af5b42e3b65e42b1a9d9e9efb1dbed5a4f6871b5872"}}) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000080)=@rose={'rose', 0x0}, 0x10) 21:00:13 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x484282) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x400) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400020052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:13 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffff", 0x1b) [ 375.128954][T20606] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 375.169005][T20606] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:13 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:13 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000200)={r0, 0x7, 0x4}, &(0x7f0000000240)=ANY=[@ANYBLOB="656e633d6f61657020686173683d6362636d6163010000002d636500"/78], &(0x7f00000002c0)="9aba95468ca5ab4e9037bdedf292a4f82fed52a6a8686a0aba88de1a9c316cde42af15d3964bf6693a4d4f4d0bddb2a85edea5c67e2b4d94a4bb5d38bfa30798430c7016ffbc88465422a3610b696d7cbee0766ca11703e7feca9912595fc02a7fe1fb0ba25dbf19340256747b8c89f449ef3eac75f83bfc5ff7c0cdf3b7bf90d1a7286557bb", &(0x7f0000000380)=""/83) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7ff, 0x10000) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f00000000c0)={{0xff, @local, 0x4e22, 0x1, 'dh\x00', 0x28, 0x3, 0xe}, {@broadcast, 0x4e23, 0x1, 0xba, 0xb66, 0x5}}, 0x44) ioprio_set$pid(0x1, r2, 0x8cf2) readv(r1, &(0x7f0000000500)=[{&(0x7f0000000400)=""/205, 0xcd}], 0x1) getsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 21:00:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400030052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:13 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000100)={0x8, 0x1000, 0x1, 0x2ddc5db1, 0x1, 0x10001}) r3 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x400300) renameat2(r2, &(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x611d51e21068798f) 21:00:13 executing program 1: r0 = socket(0x10, 0x3, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000002, 0x10, r0, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:13 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffff", 0x1b) 21:00:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400040052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:13 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 21:00:13 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffff", 0x1b) 21:00:13 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40601, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000080)={0x0, 0xffffffff9e56731a, 0x7, 0x3, 0x0, 0x800, 0x8, 0x9, {0x0, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @remote}}}, 0xc5, 0x7c, 0x5, 0x7}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={r1, 0xc9, "868c73628147917148c2c56df111b2ebabd297bc0244f7eb451ccd15270d33f127d1213993909e3091a4a341debfd25adc6379d076d4bc89b4aeb30e41996765c4d9ceb531411741aad2a8a3d0b331251dca76bbcb8cf788d9f915c9ca2008ea06583c3d7f1a7cf34c6828587f85a579ccb9b0295190000ed0e1fc331c2e7d5f44b6f9ac55f27132bd6673544dd6cf64c192c03209fe639acbdf13d470cef61b277102ad685ebc18675b74c43bc20c708fcb09db8865d34e1cabfff42afba006391050a6441a41481c"}, &(0x7f0000000280)=0x6) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400050052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:13 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff08000000", 0x20) 21:00:14 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl(r1, 0xeebf, &(0x7f0000000000)="af4dc989371dc6") getsockopt(r0, 0xf700, 0x7, &(0x7f0000000180)=""/241, &(0x7f00000000c0)=0xf1) setuid(r2) 21:00:14 executing program 3: r0 = socket(0x10, 0x2, 0x0) setuid(0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@mcast1, @in=@remote}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) socket$inet_dccp(0x2, 0x6, 0x0) 21:00:14 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xfb1c, 0x101000) connect(r0, &(0x7f0000000080)=@x25={0x9, @null=' \x00'}, 0x80) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x21) 21:00:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400060052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:14 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff08000000", 0x20) 21:00:14 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff08000000", 0x20) 21:00:14 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400080052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:14 executing program 3: r0 = socket$inet(0x10, 0x2, 0x6) r1 = dup(r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r2, 0x1}, 0x14}}, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000140)=0xfffffffffffffffb) r6 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_FREQUENCY(r6, 0x402c5639, &(0x7f00000001c0)={0x9, 0x4, 0x7}) setuid(r5) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f00000000c0)) tgkill(r4, r4, 0x36) prctl$PR_GET_SECCOMP(0x15) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x3, 0x40}, {0xee, 0x7}], r5}, 0x18, 0x2) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x103001, 0x0) renameat2(r7, 0x0, r7, 0x0, 0x4) 21:00:14 executing program 1: r0 = socket(0x10, 0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) fcntl$lock(r0, 0x5, &(0x7f0000000140)={0x1, 0x0, 0x4, 0x7, r2}) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="040c27bd7000ffdbdf25090000000800060009000000400001000c0007000800000000000000080009000600000008000b007369700008000200670000000800060064680000080002000000000008000600666f00000c00010008000b00736970006010b12142ca6ea68291d1c0a62fe100e71b48297a40657da96fb8882c1d962e74da3d64a64c946d15d89cb964f68dc723557f5afab831bffa1597b246d6e1597b300b"], 0x68}, 0x1, 0x0, 0x0, 0x4040000}, 0x44000) write(r0, &(0x7f0000000000)="2400000031001f0014ffffffff0800000000000000", 0x15) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x10880) pipe2(&(0x7f00000002c0), 0x4000) 21:00:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20a801, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x28300, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000008}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0x194}, 0x1, 0x0, 0x0, 0x10}, 0x4000) ioctl(r0, 0x0, &(0x7f0000000340)="5691d6577537cbc2caff2d0d700029c65725a81ee535100670cd568de1e3e03aed8b13f90b788759b1d0b9292ec0656878de35f20e449201c31486b3e1ca891689fc086e060c6fbc5cab92641eb616975f7287a83ea125b25bd38d410c8f2bbdd9ab4ddb792a9a27e02808a500d26923e6106ba69a38ff0d328a85f256e8f991ab9aff9bb450cd90fbb8137daf551378f6ca701bf2c7ae1f0069ce6bd7bd509616da5f4960197ef40da664b3aa1d994fe79fc29067dac766b3dbb080447eb4b3") fstatfs(r0, &(0x7f0000000440)=""/4096) setuid(r2) 21:00:14 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x4200, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000080)) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:14 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff080000000000", 0x22) 21:00:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffe18) setuid(r1) 21:00:14 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x2, 0x10, 0x1ff, 0x9}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={r1, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x5}, &(0x7f0000000140)=0x90) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) setuid(r2) renameat2(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4) [ 376.775650][T20696] __nla_parse: 4 callbacks suppressed [ 376.775663][T20696] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400090052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 376.849310][ C1] net_ratelimit: 2 callbacks suppressed [ 376.849318][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 376.849334][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 376.854953][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 376.860883][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:15 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xe99, 0x400400) sendto$rxrpc(r0, &(0x7f0000000100)="8f1409a8fbdcae6872741ea324ab69ce450054d575de1ec7a9fdb1c1a3cfa55217c3a76d8011943738cb18024b864219992101c887e4afef9f467bc2bfa9d9df84c10d9dec64e7f4fd10132436746f6c25a9f40e701778cac01c9ffb74b1f66c4b0955a0dcb95c4984810d7fe6a18f08a4839c93fd28136677d8c92b608ebdfd80b40c632fe6bfc0e16e267427f904023d10a0719da359dc024764758b8da6fa50c631dc1be5a79c32f6549e", 0xac, 0x20000000, 0x0, 0x0) r1 = socket(0xe, 0x4, 0x21) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) sendmmsg$inet_sctp(r1, &(0x7f0000000280)=[{&(0x7f00000001c0)=@in6={0xa, 0x4e21, 0x77a, @mcast2, 0x8}, 0x1c, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000008400000000d7e43c3ded24d223000200180000000000000084000000050000003004000000008002"], 0x30, 0x8000}], 0x1, 0x800) write(r1, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:15 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff080000000000", 0x22) 21:00:15 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:15 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000040)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x80000, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)={0x1, 0x2, [@remote, @remote]}) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000040)={{0x411a, 0x3, 0x7a3, 0xe74e, 0xfffffffffffffdd8}, 0x9}) setuid(r1) 21:00:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000a0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:15 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff080000000000", 0x22) 21:00:15 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_NMI(r1, 0xae9a) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000080), 0x4) 21:00:15 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff08000000000000", 0x23) 21:00:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) setuid(r1) [ 377.446831][T20731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 377.486359][T20731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000b0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:15 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff7b) setuid(r2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x3) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'yam0\x00', {0x2, 0x4e20, @rand_addr=0x10001}}) getpriority(0x0, r1) 21:00:15 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ffa000/0x4000)=nil) write(r0, &(0x7f0000000040)="2400000031061f0016f9f407002cffff0900071008000100ffffffff0800000000000000", 0xffffffffffffff65) 21:00:15 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff08000000000000", 0x23) 21:00:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000c0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) syz_open_procfs(r1, &(0x7f00000001c0)='net/bnep\x00') r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x549800, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x3}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={r3, 0x400000000000002}, &(0x7f0000000100)=0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) 21:00:16 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setuid(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x200002, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x800, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x200000, 0x0) r3 = fcntl$dupfd(r0, 0x406, r0) renameat2(r3, 0x0, r2, 0x0, 0x1) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r4, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x8080) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000000)=""/24, &(0x7f0000000040)=0x18) 21:00:16 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff08000000000000", 0x23) 21:00:16 executing program 2: socket(0x10, 0x2, 0x0) setuid(0x0) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:16 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000280)={0x5, 0x1, 0x7ff, 0xffffffffffff0001, 0x1ff}, 0xc) r1 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="3200000078bcac5b025fb0fc7af080e6ac3eed573babc1ea0edae0bd33e53c2a7f27f40de1a967de6b4a2d91c61ef08c98c26fa39087c89ec74350ded5c6067fb1a5698f49511b56bfef579cebf7858703314dfc3a8c7bd959ba6e35552872e9464552d62384f3f68c673ae0760305dc733b62a29a759d2d"], &(0x7f0000000080)=0x3a) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x111100, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x23, 0x2, @thr={&(0x7f0000000040)="acbf0473a1589716961f42d6284f", &(0x7f0000000100)="45969a295599b56c586cbda307db60fe954b1a4979709654d7f797fb242c8941111ba46f1c1337a807c1a573205ede7457f3ff170d78b7a02925d4aeefbea3ac7918877e7782ee4db4077032a1aec897237df11c5ee99a01b8d70012222c538ee50218b97e287b3aa851b2b14a8212f6fd0c467b95ed1f63139bc2bb8e4d4bb1924aebb3"}}, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0xffffffffffff7fff, 0x2}, 0x8) 21:00:16 executing program 5: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:16 executing program 1: r0 = socket(0x1, 0x3, 0x0) write(r0, &(0x7f0000000100)="2400000031001f000858cc45a7a245730a00071008000100ffffffff08000000eeff0000", 0xfffffffffffffe08) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0xa00, 0x0) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000080)) 21:00:16 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="86bf41f22ea4313b57320f509cd2ed666ce999732e827e06acecc52da8938c52cfe1eb35e9e53e5b9b542a539a38a8c6526e3cb859c866ab3163608b0d031a55a6d8a4214be503ff6f0de4695aea7766d8b737144712dce01b0d9e4a08c1914e548b7c2f539ad3d0392ee931d0c575ef12cdec6f42fd04af9953b04a7ee3588cb349a47ba446451e8db69eefe7307b54cbc0c5c02eac046b52ec372e6e2e2f0b0c0812d1255fc6af21b875b87def8eb14a67691e62643c6a1d7fe95ea86198ada4fa8c59954541d37a2b7c449e2eb60d65f674abd22394fbaec2d0fd226a2023eaaee2db5ce0166013c62318f1", 0xed, 0x99}], 0x244008, &(0x7f0000000300)=ANY=[@ANYBLOB="844c676f66742c6769643d00"/22, @ANYRESHEX=r2, @ANYBLOB=',dmode=0x000000000000003f,iocharset=iso8859-13,subj_type=proc\\keyring),uid<', @ANYRESDEC=r1, @ANYBLOB=',uid<', @ANYRESDEC=r1, @ANYBLOB=',smackfsfloor=,audit,fscontext=staff_u,smackfsdef=,rootcontext=root,measure,fowner=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0x31a) setuid(r1) 21:00:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000e0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:16 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000f0052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:16 executing program 1: r0 = socket(0x12, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x511000) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000080)) 21:00:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) [ 378.609393][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 378.615308][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400100052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 378.930940][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 378.937188][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 378.939313][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 378.948735][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:17 executing program 2: socket(0x10, 0x2, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:17 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4000000000, 0x80000) pread64(r0, &(0x7f0000000340)=""/4096, 0x1000, 0x61) recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000040)=@ipx, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/226, 0xe2}], 0x1, &(0x7f0000000200)=""/221, 0xdd}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@dev, @in=@local}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f00000015c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001600)={'bond0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000002ec0)={'vcan0\x00', r1}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000002f00)={@mcast2, r2}, 0x14) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = add_key(&(0x7f0000001340)='cifs.idmap\x00', &(0x7f0000001380)={'syz', 0x2}, &(0x7f00000013c0)="bcad6c8ab46859dbf4a2a9461efbbdf619486d4125a8b9b7573acedb2ba2e86871e01471ce328496fd77c926f5fdb7f72d60b7973612a103c4c4133496dc4e8a229a98aacd29b371943b649cf5430bc2aa0ce276a85646479372cb62c59fcaa13fae89bd7898c84f072f2a0b6cbaa1865007d0b469633854c73e284325534b1cd88d1ea8a0cd3ac4ffb0f8b9e59b7544e85fc737ac31c780fb3d2da5e2557e3ce402d65c15007eb7f99054df7313d679ace3034c9bbd9fa59dbdba62861cf262f7005a7c2205293c64a7", 0xca, 0xffffffffffffffff) keyctl$get_persistent(0x16, r4, r5) setuid(r4) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001840)={r0, 0xc0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=0x1, 0x0, 0x0, 0x0, &(0x7f0000001680)={0x0, 0x8001}, 0x0, 0x0, &(0x7f00000016c0)={0x3, 0x7fff, 0x8, 0x40}, &(0x7f0000001700)=0x7ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)=0x800}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001880)=r6, 0x4) 21:00:17 executing program 5: socket(0x10, 0x2, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000180)=[0x1, 0xffffffffffff7fff, 0x4, 0x0], 0x4, 0x1, 0x0, 0x4, 0x0, 0xb1c, {0x80000000, 0xfffffffffffffff7, 0x9, 0x4, 0x5, 0x1000, 0x6, 0x400, 0x0, 0x3, 0x62, 0x40, 0x81, 0x6, "9967cc7655340b515a2b4c6d7042cd84ac444f5abb46f39071c6da355e001345"}}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40c000, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f00000000c0)={0x3, 0x7, 0x4, 0x1040000, {r2, r3/1000+30000}, {0x0, 0xc, 0x7, 0x1, 0x0, 0x5, "0273e9a2"}, 0x5, 0x2, @planes=&(0x7f0000000080)={0x7ff, 0x7fff, @mem_offset=0x2, 0x100000001}, 0x4}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) 21:00:17 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0x40, 0x4) 21:00:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400110052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:17 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:17 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) setuid(r1) socket$nl_generic(0x10, 0x3, 0x10) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8880, 0x0) renameat2(r2, 0x0, 0xffffffffffffffff, 0x0, 0x2) 21:00:17 executing program 4: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x80001, 0x0) getpeername(r0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, &(0x7f0000000140)=0x80) getpeername$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000001c0)="24000000180007141dffdd946f610500020081001f00000502000800080007001200ff7e", 0x24}], 0x1}, 0x0) getuid() setuid(r1) [ 379.532396][T20834] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 379.590847][T20834] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400120052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:17 executing program 1: r0 = socket(0x14, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:17 executing program 3: r0 = socket(0xffffffffffffffff, 0x3, 0x1f) connect$unix(r0, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e23}, 0x6e) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000080)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:18 executing program 2: socket(0x10, 0x2, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) 21:00:18 executing program 5 (fault-call:1 fault-nth:0): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400130052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:18 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x2) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000080)={{0x1059, 0x9}, {0x77, 0xf3}, 0x7, 0x4, 0x6}) 21:00:18 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x87, "eb8d2e1745c88bebf151d59bb91925b4d06a62d62424987a32cd7ddede77be68000cc4755f2899fc01298f84393a45712f2599e51fcaa3d6b419b4defca427e1ce1aa2fbc40f8475f2963693c4d9ae1e0b8b0865a38e5be16e35b0e8103426dfc3fe6e44e769a2ab4e4dbdbcde4df32c191149db88e08c7486a706133b74897dce08efafed44a7"}, &(0x7f0000000100)=0xab) sched_getattr(r1, &(0x7f0000000000), 0x30, 0x0) setuid(r2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x2, 0x10}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r4, 0x1}, &(0x7f0000000100)=0x8) setuid(r2) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000200)={r0, r3}) accept4$llc(r3, &(0x7f0000000180), &(0x7f00000001c0)=0x10, 0x80800) 21:00:18 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:18 executing program 4 (fault-call:1 fault-nth:0): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:18 executing program 3: r0 = socket(0x9, 0x1, 0x7) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0xe24, 0x0, @loopback, 0x4}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000cab000)=0xfffffffffffffe13) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x7fffffff, 0x2, &(0x7f0000000380)=[{&(0x7f0000000280)="8a8445676aee9070e884be0fc2538fc78f645a4e6c5571ac91fa4a5850b80e66fa01dd5bd0e016300dceec922109861f00d680f0a202fe170037c785109984c1fe1db5202fbf7f9de754553305cfcc0b1374ad76bb5cbfc3cc51064f53ec7ffc5519f3ea39eecb5d06086ea7a4ff025d0c47d043499856a749281d98419199c5ebc1909993581924665ef79334590c1332cef973e3ca6ce866bf0a5bd2bea147", 0xa0, 0x3}, {&(0x7f0000000340)="13b8489d4c85073cfef67b3d9778bd1251f62e1a4f144377a28e088999af4b2774ddb706c3cd75d9870ce71fa4b245e950d67686792e176c6a91", 0x3a, 0x9}], 0x2040400, &(0x7f00000004c0)=ANY=[@ANYBLOB='nnonumtail=1,mask=^MAY_EXEC,fowner<', @ANYRESDEC=r2, @ANYBLOB=',func=KEXEC_INITRAMFS_CHECK,euid>', @ANYRESDEC=r2, @ANYBLOB="2c7375626a5f747970653d2f5e40246d696d655f748e7065262c00a84b19cc803285facb0f0a731373f023281bc4e50566959835abc41175a31c258d26a2ac11019df42f85f7887b12c8cd3b50fade50210aa97d80ab9ffa7b6dfec8d7def97f5ebf95d271427df8247308f20df98b"]) setuid(r2) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x6}}, 0x18) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000080)={0x401, 0x1, 'client1\x00', 0x4, "b73e9c2d5b39feca", "3148ffceaa6908f4345573147e530e45f8b70b7d2648c7173c595025a15f1c85", 0x0, 0x7}) [ 380.328132][T20887] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400600052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:18 executing program 1: r0 = socket(0x10, 0xf, 0x3f) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001280)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000001380)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000013c0)={@ipv4={[], [], @multicast2}, r2}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@ipv4={[], [], @remote}}}}, &(0x7f00000001c0)=0xe8) [ 380.478782][T20896] FAULT_INJECTION: forcing a failure. [ 380.478782][T20896] name failslab, interval 1, probability 0, space 0, times 0 [ 380.546962][T20896] CPU: 1 PID: 20896 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #60 [ 380.555288][T20896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.565445][T20896] Call Trace: [ 380.568800][T20896] dump_stack+0x172/0x1f0 [ 380.573169][T20896] should_fail.cold+0xa/0x15 [ 380.577793][T20896] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 380.583622][T20896] ? ___might_sleep+0x163/0x280 [ 380.588502][T20896] __should_failslab+0x121/0x190 [ 380.593606][T20896] should_failslab+0x9/0x14 [ 380.598601][T20896] kmem_cache_alloc_node+0x264/0x710 [ 380.603913][T20896] __alloc_skb+0xd5/0x5e0 [ 380.608259][T20896] ? skb_trim+0x190/0x190 [ 380.612613][T20896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.618894][T20896] ? netlink_autobind.isra.0+0x228/0x310 [ 380.624565][T20896] netlink_sendmsg+0x97b/0xd70 [ 380.629358][T20896] ? netlink_unicast+0x720/0x720 [ 380.634316][T20896] ? tomoyo_socket_sendmsg+0x26/0x30 [ 380.639626][T20896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.645878][T20896] ? security_socket_sendmsg+0x93/0xc0 [ 380.651359][T20896] ? netlink_unicast+0x720/0x720 [ 380.656313][T20896] sock_sendmsg+0xdd/0x130 [ 380.660751][T20896] sock_write_iter+0x27c/0x3e0 [ 380.665533][T20896] ? sock_sendmsg+0x130/0x130 [ 380.670228][T20896] ? inode_has_perm+0x1b0/0x230 [ 380.675090][T20896] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 380.681687][T20896] ? iov_iter_init+0xee/0x220 [ 380.686408][T20896] new_sync_write+0x4c7/0x760 [ 380.691114][T20896] ? default_llseek+0x2e0/0x2e0 [ 380.696019][T20896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.702281][T20896] ? security_file_permission+0x94/0x380 [ 380.707915][T20896] __vfs_write+0xe4/0x110 [ 380.712291][T20896] vfs_write+0x20c/0x580 [ 380.716551][T20896] ksys_write+0x14f/0x2d0 [ 380.720888][T20896] ? __ia32_sys_read+0xb0/0xb0 [ 380.725646][T20896] ? do_syscall_64+0x26/0x610 [ 380.730326][T20896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.736410][T20896] ? do_syscall_64+0x26/0x610 [ 380.741099][T20896] __x64_sys_write+0x73/0xb0 [ 380.745679][T20896] do_syscall_64+0x103/0x610 [ 380.750299][T20896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.756187][T20896] RIP: 0033:0x4582b9 [ 380.760089][T20896] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.779806][T20896] RSP: 002b:00007f65612aac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 380.788211][T20896] RAX: ffffffffffffffda RBX: 00007f65612aac90 RCX: 00000000004582b9 [ 380.796262][T20896] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 380.804254][T20896] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 380.812245][T20896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f65612ab6d4 [ 380.820319][T20896] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 21:00:19 executing program 2: socket(0x10, 0x2, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:19 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="0f0000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400e00052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:19 executing program 4 (fault-call:1 fault-nth:1): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:19 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) write(r0, &(0x7f0000000000)="8d35aaf4d81d5ce0777bb9fdb0e64c42389ff6252a", 0x15) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) 21:00:19 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 380.994209][T20918] FAULT_INJECTION: forcing a failure. [ 380.994209][T20918] name failslab, interval 1, probability 0, space 0, times 0 [ 381.072103][T20918] CPU: 0 PID: 20918 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #60 [ 381.078806][T20925] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 381.080151][T20918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.080158][T20918] Call Trace: [ 381.080196][T20918] dump_stack+0x172/0x1f0 [ 381.080221][T20918] should_fail.cold+0xa/0x15 [ 381.080243][T20918] ? fault_create_debugfs_attr+0x1e0/0x1e0 21:00:19 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="100000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:19 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x280, 0x280, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xf, 0x1}}}, {{@uncond, 0xf0, 0x118}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 381.080266][T20918] ? ___might_sleep+0x163/0x280 [ 381.080294][T20918] __should_failslab+0x121/0x190 [ 381.080313][T20918] should_failslab+0x9/0x14 [ 381.080332][T20918] kmem_cache_alloc_node_trace+0x270/0x720 [ 381.080362][T20918] __kmalloc_node_track_caller+0x3d/0x70 [ 381.080380][T20918] __kmalloc_reserve.isra.0+0x40/0xf0 [ 381.080398][T20918] __alloc_skb+0x10b/0x5e0 [ 381.080415][T20918] ? skb_trim+0x190/0x190 [ 381.080431][T20918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.080446][T20918] ? netlink_autobind.isra.0+0x228/0x310 [ 381.080466][T20918] netlink_sendmsg+0x97b/0xd70 [ 381.080485][T20918] ? netlink_unicast+0x720/0x720 [ 381.080509][T20918] ? tomoyo_socket_sendmsg+0x26/0x30 [ 381.148891][T20918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.170501][T20923] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7640 sclass=netlink_route_socket pig=20923 comm=syz-executor.3 [ 381.174254][T20918] ? security_socket_sendmsg+0x93/0xc0 [ 381.174271][T20918] ? netlink_unicast+0x720/0x720 [ 381.174300][T20918] sock_sendmsg+0xdd/0x130 [ 381.218537][T20918] sock_write_iter+0x27c/0x3e0 [ 381.223321][T20918] ? sock_sendmsg+0x130/0x130 [ 381.228064][T20918] ? inode_has_perm+0x1b0/0x230 [ 381.232929][T20918] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 381.239190][T20918] ? iov_iter_init+0xee/0x220 [ 381.243885][T20918] new_sync_write+0x4c7/0x760 [ 381.248577][T20918] ? default_llseek+0x2e0/0x2e0 [ 381.253464][T20918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.259726][T20918] ? security_file_permission+0x94/0x380 [ 381.265374][T20918] __vfs_write+0xe4/0x110 [ 381.269713][T20918] vfs_write+0x20c/0x580 [ 381.273972][T20918] ksys_write+0x14f/0x2d0 [ 381.278320][T20918] ? __ia32_sys_read+0xb0/0xb0 [ 381.283097][T20918] ? do_syscall_64+0x26/0x610 [ 381.287786][T20918] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.294037][T20918] ? do_syscall_64+0x26/0x610 [ 381.298732][T20918] __x64_sys_write+0x73/0xb0 [ 381.303335][T20918] do_syscall_64+0x103/0x610 [ 381.307941][T20918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.313841][T20918] RIP: 0033:0x4582b9 [ 381.317743][T20918] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 381.337357][T20918] RSP: 002b:00007f65612aac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 381.345786][T20918] RAX: ffffffffffffffda RBX: 00007f65612aac90 RCX: 00000000004582b9 [ 381.353769][T20918] RDX: 0000000000000024 RSI: 0000000020000000 RDI: 0000000000000003 [ 381.361752][T20918] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 21:00:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400f00052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 381.369744][T20918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f65612ab6d4 [ 381.377726][T20918] R13: 00000000004c402c R14: 00000000004dcd70 R15: 0000000000000004 [ 381.391551][T20930] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7640 sclass=netlink_route_socket pig=20930 comm=syz-executor.3 21:00:19 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1b0000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:19 executing program 3: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 381.433542][T20934] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 381.463473][T20938] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket(0x200000000000012, 0x3, 0x2) write(r1, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:19 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:19 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="4a0000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000352001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:19 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) pipe(&(0x7f0000000000)) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) renameat2(r2, 0x0, 0xffffffffffffffff, 0x0, 0x2) eventfd(0x0) 21:00:19 executing program 4 (fault-call:1 fault-nth:2): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:19 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000300)="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", 0xffffffffffffff9d) 21:00:20 executing program 1: r0 = socket(0x100000000000010, 0x6, 0x800000000000000) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x19) ioctl$TIOCSBRK(r1, 0x5427) dup3(r2, r0, 0x0) 21:00:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000552001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:20 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="c00000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 382.109565][T20982] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:00:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x80000000, 0x2, 0x200, 0x8}, {0xffffffffffffff81, 0x0, 0x7a4, 0x5}, {0x7fffffff, 0x80000001, 0x7d75, 0xed}, {0x401, 0x2, 0xffffffff, 0x8000000000000000}]}, 0x10) [ 382.335837][T20993] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 382.350296][T20993] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:20 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="0f00000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000100)={0x0, 0x0, {0x2, 0x0, 0x2}}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mmap$binder(&(0x7f00008d8000/0x3000)=nil, 0x3000, 0x2000001, 0x13, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xcaf, 0x42) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'nlmon0\x00', 0x5}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x5212c1, 0x0) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f000049b000/0x18000)=nil, 0x0, 0x0, 0x4, 0x0, 0x0) 21:00:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400140552001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:20 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="c00e00004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8000, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000080)={0x3, "dbc0e5277d8e39d989b61aa4d8a0888caf5d6a028dd0897cf50ed24b5d76c75c", 0x2, 0x1}) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 382.787246][T21006] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000652001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:20 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="effd00004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1000000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:21 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x6) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000140)={0x7ff, 0x6}) r1 = shmget$private(0x0, 0x2000, 0x8, &(0x7f0000ffd000/0x2000)=nil) shmat(r1, &(0x7f0000fee000/0x12000)=nil, 0x7000) r2 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f00000001c0)={0xffffffff, 0x3, {0x2, 0x3, 0x5, 0x3, 0x4}}) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x0) epoll_create(0x7) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000080)={0x1ff, 0x1, 0x9, 'queue0\x00', 0x1ff}) 21:00:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="e03f03004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:21 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="1300000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 383.089308][ C1] net_ratelimit: 8 callbacks suppressed [ 383.089316][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 383.099426][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 383.100703][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 383.106414][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:21 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000952001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:21 executing program 1: r0 = socket(0x10, 0xa, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000204a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:21 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="3200000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)=@getstats={0x1c, 0x42, 0x301, 0x0, 0x0, {0xa}}, 0x1c}}, 0x0) eventfd(0xffffffffffffffff) 21:00:21 executing program 1: r0 = socket(0x20000000010, 0x3, 0x2) write(r0, &(0x7f0000000040)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000a52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:21 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="6700000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:21 executing program 3: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="effdffff4a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:22 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 384.096094][T21069] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=21069 comm=syz-executor.5 21:00:22 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="c000000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:22 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) shutdown(r0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000340)={0x15, 0x110, 0xfa00, {r1, 0x4, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x80000000, 0xe4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffff}}}, 0x118) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000140)) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x200) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000480)=ANY=[@ANYRES32=r3, @ANYBLOB="fb000000a079733a3af083c569cdc61145b1c1830150e4e1af7210b72f5631570030e060d67c1a29c279da91d4ae8a156b8ba894b033647fd75066d5447cf799d3cbf52ae53b6013b93680bd4331afb9573f6fbe75bee1361f79c22aa95268d08bf60f3f0bbf4155724f86a699ef6866b49981da05f6011779ffaf509b4a7da78c620f69bb6d6330beb7e95c6da5381f0843d84ceca140c737eda919a530eadc173f625c421d8bd130d0ae61c25ed0b865902076c345f4e54b11ecd251daf537c83d5417266f19e1e4179fb5bd33eea71d2ffb96bb15d248cfe61cdec77801d6467b4f9e103f3ce58f7cf531384b8488325d26dab68017c9d8acf3060912686ab775765f4b19d846ae91aa516629c5e5ac01b88e560b000098c33946ed345851073b354f147dfaa013ff4828a0b62ea37b81d0e880e46d8fdc05cb780a785ea5b8d5c8f8ff8fb16a1bb02f044994136d8fac3d63593719343297db4936bd92de56a6053c8a8e613a24622ae1ebb537519da9ebeab7b27fc746b80c9daa21fd3dec7c2fb0c82769b18514fe69ed236715f46a5c4e22a0c6c71413623bb48ffe0e4e5b2d2d53daac03a3d16265708307e1202b64a5f5fcc1d6f6aee3dce79f56ef7834889dea47717901265d2df0a2ffd0f7d484ae046425f00febfa83c2bf0bcf121158acbd9566cc7d32a3c1282b2d1e2b32a29b50be6350bc72af4cb52338a0bf1d73894b0df3bec348e95927788ea5da56b0a79c1a2454aa4af2fb57cd2025d8cff88742a6a8d8add525b87a329322ed6258915c2492d43939ba45ee69a5afe449a4c4f61a9f6cf0c3722d90c09c4732f09262194d78feaf2200a84e1c65461f6a2c242bf45b1caa161f1d6ea601f0e195198808e433e758bfbe327e999ca50e310d74f19d4cdcfcbb6b9557a45ee3bd5f82f21f81d2cd6ae1bb993b780d724a24728cf7b6e775882ec3dce2455878c2726acc964812713c95372b61e8b2a4a2daafea1c3f41b94ba02f2a3dcb99475000cc1f2c8500ed7d1ece2121c534a950fd140cbf86dca241e339399dd431a5871d56009713913d38337f64fbf970bdb7df08c096e37cfa008627002495a6e1db5439fdaf12674c2b526ad6b4fc0fb5ee7404feeaae"], &(0x7f0000000240)=0x103) r4 = socket(0x10, 0x3, 0x0) fcntl$setsig(r2, 0xa, 0x1e) write(r4, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000b52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:22 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000010001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="c00e000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 384.401103][T21075] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 384.438491][T21079] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000c52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:22 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000011001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 384.532956][T21085] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000040)="0e75a171863b86d3965522a410a5fa46c2c00f13c2a816068c107e0bcd3af2b370aba54d945a2f1fd60c8e7ac4b9de3089da3e0f65e91f04e8e5bc5d264deaab282f6bb04085d0e85a2cbde8fc685794ef50ad45baedef8742796bb5604e8e43e5e3358300c01d92b2a30aced538d06f3613e6a1770208ec8dd9077834bca2dd297c26d2ef1ea094c6a717855bb0839d706f719d96cd3f0845dbfd800a3cd1d9", 0xa0}, {&(0x7f0000000100)="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", 0xfb}, {&(0x7f0000000200)="b7bf7269b6fac4099ded296d875a9ffa78942f4e5bf8c37df64ae65c02cfea4511eb6a892a3f42b9f6d2ff4eb9bb8454c949d4401e4c", 0x36}, {&(0x7f0000000240)}, {&(0x7f0000000280)="d603aefa34a8cd1f1e81a26ece5a78f657b1bea64e7e5f15ac0e66c669eaf3d674536be40cae7e426f222f4717aaffcfcc2f37cfdedca1f45e93ab7b3797f801e44b3540c518323ac4219056f6b515950c820763a6ad680ec3580b81a5eb31bf4d4aecc442352f67d93604211244b0d037f9373d32b2c509f9a59d63ec887fbbbef9daf8e940c4d8", 0x88}, {&(0x7f0000000340)="c457db3a1e4dd883bc02e6d0b6", 0xd}], 0x6) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 384.724265][T21092] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 384.798517][T21095] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15238 sclass=netlink_route_socket pig=21095 comm=syz-executor.1 [ 384.812827][T21095] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 384.823819][T21095] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15238 sclass=netlink_route_socket pig=21095 comm=syz-executor.1 [ 384.837442][T21096] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:22 executing program 3: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="effd000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000e52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 384.929322][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 384.935158][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 385.169337][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 385.169779][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 385.175231][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 385.181347][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000100)=0x733b, 0x4) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000140)={'IDLETIMER\x00'}, &(0x7f0000000180)=0x1e) fsetxattr$security_selinux(r3, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:var_spool_t:s0:', 0x21, 0x2) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:00:23 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000012001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="e03f030032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:23 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000f52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 385.259404][ T26] audit: type=1400 audit(1554843623.334:156): avc: denied { mac_admin } for pid=21109 comm="syz-executor.1" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 385.270602][T21111] SELinux: Context system_u:object_r:var_spool_t:s0: is not valid (left unmapped). 21:00:23 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000013001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400001152001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 385.348695][ T26] audit: type=1400 audit(1554843623.394:157): avc: denied { associate } for pid=21109 comm="syz-executor.1" name="uhid" dev="devtmpfs" ino=17592 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 srawcon=system_u:object_r:var_spool_t:s0: 21:00:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400002032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:23 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000014001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:24 executing program 3: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400001252001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:24 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000015001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:24 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x3c, &(0x7f0000000040)=[@in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0xc}, 0x8}, @in={0x2, 0x4e21, @rand_addr=0xf042}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x7, 0x2, 0x1db, 0x8, r1}, 0x10) 21:00:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="effdffff32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:24 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x200000, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000180)={0x9, 0xffffffffffffffff, 0x1, 0x401, 0x100, 0xffffffffffffff6a}) r1 = socket(0x10, 0x3, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x404080, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) write$UHID_CREATE2(r2, &(0x7f00000001c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x89, 0x5, 0xa94000000, 0x8, 0x20, 0x4, "93e6a97d01d85baa2bddde3bf4952330656b95bcec0f672c8121d241e552889c3b74b67fadaf73c6d86d88797de071e177c0b676e4415910c6d208a3625b80538307744e447836d990f035217ae046a40e33de963924a8846c08141b1910d85140338ef9742015424b24d17d1c3f32277304ca4f8991add684458589a2f4466926b6f4dbe0501f0b05"}, 0x1a1) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x2, 0x1) write(r1, &(0x7f0000000000)="24669a2196cd293b2df9f407002c04000a00071007000100ffffffff0804000000000000", 0x25e) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:00:24 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:24 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000016001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400001352001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 386.248473][T21154] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=52630 sclass=netlink_route_socket pig=21154 comm=syz-executor.1 21:00:24 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400051452001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 386.330071][T21154] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=52630 sclass=netlink_route_socket pig=21154 comm=syz-executor.1 [ 386.343513][T21162] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pig=21162 comm=syz-executor.4 21:00:24 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0}, &(0x7f0000001140)=0x14) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001180)='/dev/dlm_plock\x00', 0x100, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x16, 0xb, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x39}, @map={0x18, 0xf, 0x1, 0x0, r0}, @jmp={0x5, 0x9, 0x4, 0x0, 0x6, 0xfffffffffffffff0, 0xfffffffffffffff0}, @ldst={0x1, 0x1, 0x1, 0x7, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff}, @jmp={0x5, 0x8, 0x7, 0xa, 0xf, 0x80, 0x4}, @jmp={0x5, 0x0, 0x6, 0x7, 0xa, 0xfffffffffffffff4, 0xfffffffffffffffc}, @ldst={0x0, 0x2, 0x2, 0xf, 0x2, 0xfffffffffffffffc, 0xffffffffffffffff}]}, &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000100)=""/4096, 0x41f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f00000011c0)={0xe075, 0x800}, 0x8, 0x10, &(0x7f0000001200)={0x5, 0xac, 0x6, 0x27}, 0x10}, 0x70) write$cgroup_type(r0, &(0x7f00000012c0)='threaded\x00', 0x9) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000001340)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f00000014c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000001380)={0xc4, r4, 0x106, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7fff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7f}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r2}, {0x8, 0x1, r0}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r2}]}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r0}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1000}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x4004010) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000001500)) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000001540)={0x4, 0x0, [{0xd, 0x0, 0x6, 0x40000000000, 0x40}, {0xc0000007, 0x9, 0x1, 0x6, 0x4}, {0x7, 0x2, 0x6e01, 0xf4, 0x6}, {0xb, 0x6, 0x7fff, 0xa06, 0xff}]}) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f00000015c0)={'ip6erspan0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) recvfrom$unix(r2, &(0x7f0000001600)=""/4096, 0x1000, 0x40, &(0x7f0000002600)=@file={0x0, './file0\x00'}, 0x6e) sendmsg(r2, &(0x7f0000002900)={&(0x7f0000002680)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f00000027c0)=[{&(0x7f0000002700)="cddacbea6dbb743b2473e4306b39250215f9c32426b9bdc28f283962fdf10755705c8a5ddbf5fef765a1ce58a0d92dd4d3e14f51c3a81a673e5d2c26f01f9910da01be443f7123c1554e8a77c0795406a00a5264e0d07430631abbea740586299345ab78", 0x64}, {&(0x7f0000002780)="d6b60e22f4db81c3bc7812f17eafc27eb64632679206ab4037f27f211bff27e2f8e544877c4501bbf14bda22433eeeb72df023e15cab47aec567bd", 0x3b}], 0x2, &(0x7f0000002800)=[{0xc0, 0x10d, 0x7, "9de5b71023752a129613e63321a484c48f95469c3b7f5af530d226967821023358ec8526e53b0dea962c1a11dd187f30cfbdce5ebb7113721c31dfb34a044f4d656cc2b7703aa271d603acbecdf69959178f9233e946b24842b0101dad43f5e8e5251c42c05dae6dc175c6556e103f9844f982543b5ffc3a5032ec879ff3795108756439449bb7f3f9bd938dd75f8c269b4fe5d07df707d5b12910e8c64ec34ad25910ed3a0ebe5060e807"}, {0x20, 0x115, 0x200, "66ce69162b74b29b9adbd5"}, {0x20, 0x10f, 0x8, "0f02c51319e986aaf8"}], 0x100}, 0x8000) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000002940)={0x9, 0x0, [{0x80000009, 0x7ff, 0x408000, 0x51, 0xc77b}, {0x40000001, 0x5, 0x8, 0xffffffffffffffff, 0x8}, {0x40000000, 0x8, 0x9, 0x7, 0x2}, {0xa, 0x6, 0x1, 0x1f, 0x7}, {0x80000000, 0x5, 0x7f, 0x401, 0x6}, {0x1, 0x9, 0x5, 0x3, 0x2}, {0xc000000f, 0x2, 0x2d2, 0xa1}, {0x4000000f, 0x4d9a6c6b, 0xffffffffffffff01, 0x39c5, 0x9}, {0x0, 0x1, 0x7, 0x8, 0xffffffffffffff80}]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000002a40)="0832c923f72538b0c64a49658b385f720ec5dee3e41465dd91a11237230f0005c911e458f8e4d96ea7c1d6883467420e3fad8840e0e38ac6cb62ea7b22444f1d48c8a19a9b1bac70e86ad34c7d4bd5c2c57a2bd9ccbc1f6fa972756f499505d960871df89cc17e", 0x67) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000002ac0)={0x0, @aes256}) r5 = syz_genetlink_get_family_id$team(&(0x7f0000002b40)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f00000036c0)={&(0x7f0000002b00)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003680)={&(0x7f0000002b80)={0xae4, r5, 0x814, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r1}, {0x248, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x9, 0x53, 0xffffffffffffffff, 0x761}, {0x3, 0x100000001, 0x100000000, 0x5}, {0x90000, 0x1a, 0x800, 0x982}, {0x3, 0xfffffffffffffff7, 0x7, 0x10000}, {0xffffffff, 0x9, 0x0, 0x7}, {0x0, 0x3, 0x8b0, 0x2}]}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r1}, {0x1cc, 0x2, [{0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0xfffffffffffffffe, 0x2, 0x1, 0x28}, {0x101, 0x200, 0x1, 0x400}, {0x60000000000000, 0x6, 0x100, 0xe85b}, {0x8, 0x0, 0x7b0f, 0x1}, {0x500a75bf, 0x8001, 0x1a45}, {0x5, 0x8, 0x4, 0x5a}, {0xa22a, 0x9, 0xa5cd, 0x4}, {0x8, 0x4, 0x8, 0x9}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r1}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x7fff, 0x80, 0x8c4d, 0xac}, {0x8, 0x7, 0x2, 0x1f}, {0x4, 0x5, 0xa6e, 0x5}, {0x1f, 0x0, 0xab6, 0xded}, {0x1, 0x0, 0x40, 0x100000001}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffeff}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r1}}}]}}, {{0x8, 0x1, r1}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}]}}, {{0x8, 0x1, r1}, {0xc0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}]}}, {{0x8}, {0xf0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x69ce}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7f}}, {0x8, 0x6, r1}}}]}}, {{0x8, 0x1, r1}, {0xb4, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r1}, {0x1ec, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r1}, {0xb0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r1}, {0x134, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x101}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfdd7}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x3, 0x4, 0x6, 0x9}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xe332}}, {0x8}}}]}}]}, 0xae4}, 0x1, 0x0, 0x0, 0x40080c1}, 0x4040001) r6 = dup2(r3, r2) lsetxattr$security_ima(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)='security.ima\x00', &(0x7f0000003780)=@v1={0x2, "9c87589ad6e8647b05f28975da70232922229e"}, 0x14, 0x1) write$P9_RWRITE(r2, &(0x7f00000037c0)={0xb, 0x77, 0x1, 0xffffffffffffff81}, 0xb) ioctl$RTC_AIE_ON(r6, 0x7001) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000003800)={0x0, 0x3}, &(0x7f0000003840)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000003880)={r7, 0x0, 0x3, [0x5, 0x9, 0x2]}, 0xe) r8 = add_key$user(&(0x7f00000038c0)='user\x00', &(0x7f0000003900)={'syz', 0x0}, &(0x7f0000003940)="dc7cc5becb214da4e9645ca1bfb56b9de107763c7b4ec96d3b43ef5e5c892da8049c56a4172d5fab72e7f1e4428705e1f0c9e25b6bfc957177230a646138d3f00fb521e1c8301a719b59", 0x4a, 0xfffffffffffffffd) r9 = add_key$keyring(&(0x7f0000003a00)='keyring\x00', &(0x7f0000003a40)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate(0xc, r8, &(0x7f00000039c0)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', 'ppp1@'}, 0x1d, r9) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000003b00)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000003ac0)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000003b40)={0x10, 0x30, 0xfa00, {&(0x7f0000003a80), 0x0, {0xa, 0x4e20, 0x80000001, @local, 0x400}, r10}}, 0x38) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000003b80)=0x1, 0x4) write$P9_RSTATFS(r0, &(0x7f0000003bc0)={0x43, 0x9, 0x2, {0xa8c, 0x1ff, 0xffff, 0x9c, 0x80, 0x8, 0x8, 0xa52, 0x4}}, 0x43) 21:00:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:24 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) ioctl$FICLONE(r0, 0x40049409, r0) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x180) 21:00:24 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400003f52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400655852001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 386.888640][T21180] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=21180 comm=syz-executor.4 [ 387.081275][T21180] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=21180 comm=syz-executor.4 21:00:25 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") getresgid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) getgroups(0x1, &(0x7f0000000140)=[r1]) r2 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000280)={'dummy0\x00', &(0x7f0000000200)=@ethtool_test={0x1a, 0x0, 0x8, 0x7, [0x0, 0x975, 0x8001, 0xaaaa, 0x8001, 0x9, 0x8]}}) connect(r2, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r2, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x0) 21:00:25 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @dev}]}) write(r0, &(0x7f0000000140)="2400000031001f0014f9f4ffffffff08000000000000005a63c410967ea7a5d8074a6e6ad24900"/51, 0x33) 21:00:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400006052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000010001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 387.313817][T21206] __nla_parse: 11 callbacks suppressed [ 387.313828][T21206] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400586552001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000011001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 387.390103][T21205] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 387.409936][T21210] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:25 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000040)) 21:00:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400008152001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 387.570700][T21220] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 387.634132][T21225] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 387.710782][T21225] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:26 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x0, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000012001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) socket$netlink(0x10, 0x3, 0x5) r1 = semget(0x1, 0x4, 0x32) semctl$GETNCNT(r1, 0x4, 0xe, &(0x7f0000000040)=""/148) 21:00:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000e052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:26 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20000, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000000080)={@empty, @loopback, @multicast1}, &(0x7f00000000c0)=0xc) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000000)) 21:00:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000020001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 388.120477][T21240] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:00:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000f052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 388.177126][T21242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000013001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 388.238424][T21242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000021001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffff, 0x119801) 21:00:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 388.395073][T21263] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 388.517611][T21273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=21273 comm=syz-executor.0 21:00:26 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x0, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:26 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x4c880, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x3d5540, 0x0) ioctl$SIOCNRDECOBS(r0, 0x89e2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl$SIOCNRDECOBS(r1, 0x89e2) sendmmsg$nfc_llcp(r1, &(0x7f0000003880)=[{&(0x7f00000000c0)={0x27, 0x1, 0x2, 0x5, 0x10100000000000, 0x9, "68a686a24cc9e34e4fd6dc41b558a603efed8e1ef38a883a8f98ce0e4208bd3dd0007ca0021913ee5c550e2e50d15f99845e507e96fc3f57de932ef50836df", 0x3b}, 0x60, &(0x7f0000000540)=[{&(0x7f0000000140)="5bc5413ebf16a38ea08554be9561592ebd4804a4d4734cc20f6be248fa8116e6adec48f1037dfac5eca40e215ab9627dc12242c41c56921436765711bc8e1d6138a8ee5f1a9e3cebaae0305a979807702dffb8917004e2b887487e21ef732976da99ce9a2708b54c850b3701b5d98fd93339a7eceea619a3282dc5701fbcfdaf26d0dae3305dae6f8540ce0020659eaf0199a208a7a73a2b21472f572a4d6c18f1822b2282eec8be3097842648d93be0db60cc2702e5f42bc863e5a5233b1be8292da395c60d3859", 0xc8}, {&(0x7f0000000240)="8a95347482ae67b57a2e38a4ff627156133202bef0dd4f8c341601d7227515e93bbcebf4c2e92c843130eac9593dbac7b149308361e1a409aee54b3e0ce5487fe3a8f92a3f87909c57adfed245aad899317703f7078f757b872af87327065c5d8200652be794bf9776d980c6031f6d959d93", 0x72}, {&(0x7f00000002c0)="279b77f9f4ec6d69a81252ffe11302f2be34e0ff21b875dfe5fd78fd424d324510709b58ec235e2cb90713e5c539c703792c0a83870c296ebf27bf9a5169ba92e55f4b899b9d8fc4102589d3475aded636448f49ad3a14a386f3e62d452308823a23123f89f94b0f", 0x68}, {&(0x7f0000000340)="44b353e5ee838340a56b1797889318ce1c5a7bcb54d2cffc10ffd2ba7afb75b43e2c6d42bc4c7317a072d75551f03e72d2b4f48abbe153301ba0a8bb", 0x3c}, {&(0x7f0000000380)="88ee9870c7ff69cf54cdda87a3d3e5508e4d649d5c2e25a981bfc2afa4a9c39254bffde59ebe3e20f5c89c4ef1c5af31116332f8d006813de9425a9dec60639e62226b079bc515d17e39c4fbf9f0c8087571715dba3a15e591f6105dde1682b66ad5", 0x62}, {&(0x7f0000000400)="d25d2fd256dfcdc02195df055b065ddb5eb80073a016c44616643abb0d5f9c7cf08e141570cc38e66d979b500d67db2074f0c11d0d0081d21613ce491953b4e67bb5272368", 0x45}, {&(0x7f0000000480)="c63b6837466165bc167e25a4a9e7ea25bf84b74d7dc54d933682f3b482446bb2d2577fc92bb7ddc9bf88521d67ae21641c94cb1983f5e954fe8d7abcebb61875e3a8c1e6d4fa2a1c698c265748fe2146da91bf3f923752a38b54835bd8c2dad4dd3111bab33c0489b88195f2d6bca245d46a6977d6279f7e378ff1d184a5b7da6d0da83778fb18cdc7ece2b6bcd5d4a8ae7021bca797a67b7f6e36b8177bff9c4ed2bab195242af87915a206943a9c1d6e05", 0xb2}], 0x7, &(0x7f00000005c0)={0xf0, 0x29, 0x3ff, "b71bd14968b40579d3277666deb7a11edaa56915c3ae55309c63ef5457219ee80af1effe6b331156a30b660a9b3f683f60eccaf51e517392c2b5348738f68dc685f184a96bdccbf71c0d172d2117554d975ad88d67195964577b4b5f25c6615dc90bbdfcb48fcbf792a3a71d4ba0a6a2976bda6b658e657ee043ec92d5a474d78f234453656bedb07c3a5dd903588846dd860931942e2ed90053ad1b6f048213c4cdce77ec84b640d4deae67c2e5d20ee9d5856e556d0621f30d3cc13a5eee532bd8ec3986d252f2f450068b02d0576031d6e3c1e764e53dd4"}, 0xf0, 0x1}, {&(0x7f00000006c0)={0x27, 0x0, 0x1, 0x2, 0x1ff, 0x46, "dd6f02bf94ffa8cfb993444de859d97186837aae26096599a43712486b2f7a0693e389d77b78f5a625371da1d896b2bf8b496d8f5120d73bad1cb9dde44460", 0x29}, 0x60, &(0x7f0000000840)=[{&(0x7f0000000740)="c67d48546cdd07a8ee7e604e11c97a3de98300e4156e2d39dde96e7635c3107bbf003b8aa8742e45780a132c47e821b7bc8d17d98c0f2f062b78cc6a85f3d00509a0d52646eea3f18d6db81fd32c31618042e3863a0c18ee4077f694ebf07f7852c457efa8d249841bf5b1d2497656d163ea075184e041544f9a0d4ad0e17b5f5a29e87f5270c0a306bd7bbba6f182cbc377b9e9cd43da97ca96", 0x9a}, {&(0x7f0000000800)="a661", 0x2}], 0x2, &(0x7f0000000880)={0x88, 0x101, 0x0, "2bc23fadb7df2e76153394141b8f6b0de44f8fa5abf73c402c8361b2da6c366b26484ef022361e6cff904cf39123e69e047d666c23f4fe28044fae4153ab93220f9c22a4a5545af012b25cda1b2741e745023327315ce4797efd57d035da3972c4f5cdd23373b1895e220c87ae5110a384da213840"}, 0x88, 0x4000010}, {&(0x7f0000000940)={0x27, 0x1, 0x2, 0x4, 0x1, 0x0, "2b53fbf6573a78da24257cec5e2d3a28573d002d9cac38724c5d6a39af3ce1435e839897301e94e4a55659d15aec673cde9e1826b4b9b38f4638aac1a964ec", 0x3d}, 0x60, &(0x7f0000002c40)=[{&(0x7f00000009c0)="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", 0x1000}, {&(0x7f00000019c0)="465b1524b00d3ec7d6a470e67c7e12d553e6c960c8b02f33de60eaf21b2f9d6764efa02e12bec8d24cd40471e6970fbde86c6b5a885c21a3c7356b3e9b6c642ec3", 0x41}, {&(0x7f0000001a40)="017c1087821b5664d7cb084a17a862def6346526265a27d5485d69a6b734bef113289d5ed1ed8ee2945e30f77bff937fe7b5987c8f3f3e63990b59ca0671d0decfe864713dad4d2e00ad73976a50de17dfd7f6a0ff5669e275819d", 0x5b}, {&(0x7f0000001ac0)="2f91e8206996701a326fab6d92eb721c9fc9ce55bfc5d42d166e9a9a216f98665badb727b0c51365f805fb084ba8c2afceaf4b63e392f675aa5f2fe904e5deeeddbfb2415c54034b18faae488ca36ccc11e7478730b2b94b8c7468885bf0158a904571cb59c8f9e20b3fafdcae7c23533db544e48730132df08bdefe4c228ba09223baf9de4f43a7dc6bbf81dd98b8c71d5bf53258b9faa9b07e8bd461145a85b4c6099e0f6944eb2bcebcb22cd8f01c15c4666fc5e7edd2368cafe68dbc749f74a65e9697c9642725a6ce53941e98e231143a5bd435f72ed60a68e3c4e8698a2898c17d8392a8151ecdce4a17277695d61752cf4f4b98cccdc102fa7a3836ae68720ef91482afd0919d33bf7b3c74ead01f26943104a38226c9427253d8c5a8ba7e901df37605bdad404818ff8885df4a222ed816566b1f71c040bed36fb13ea75a49c0546d4ee0b5666671608159b4d817295a008b2ad1f958e9f61958bedbfabbaf57e555a7ba42cc8b855e115a778dea7d2fd5af423075ffb4c254da894566be80cce150ebcf78f43bd36a47dfb749a0d38e7f37dd0b789a8b16cc3c8e3b32e8f5d0e6f252fe3c02f7ab158fdd0f44daf781b7cd2a065378f919f473330641c6d1a5369c8b5db9b20ac2bce1a33d003d568ec975294e1941d66cbaf80d381044d2032d210afca0bca177a0ac55d4e4b0f5e3204ac81453ba393278da2b6ff0d7946257d167ef30a58c0a4492e1988d5ea673203adcd6a6d9fa9d65337132dce348c3f303f23265bb277269cfd75928a133289a82b54420474ca1e306fa56be1a0b92495303b84d716db4553dbf90558731406054c4b7c22ae803618b5b8846c03893f170a65c41a5c67be18c745da5c9116e1dba83bd28dd66adf5f777b52445112ef5e8153b367008ff6b178a57f4b221645fd8c5962fa7dd3fb94836bc76fce130e38283f50526e318ba3808a0227a6f26839f3ede72a48a539c2a1a6e55b6a5514ab1b036450254a79617c671bb85aa58d54ac97ce997b156e547813661bb3635dd0d1d06bad8c2b30473c02a9305762bbc28cbba7b2b90038bfb310a9aee4f044c6436f3e2106d660b69f7403356465a4a44a49e7be08b1ac7b832553fecf53d3d8461027c752c8ebbfe15a246163e1df9eb32c83ccd9eeb5bd259fff2ea1eb7ba4397d311ee9163c8599bd06d11ea5adee220d17a506be8ec8bec2802638046c20f255554f6ea6440d5752ba86c55699794f3cc2583181a53a7352edc35e605e4237731fe70f666357ad6c2d8531d2784600886fb762fdb6f1d5531b13e7276d2adb87bfd95193ec013fd0fd4a056e2bc0d547c4eee1cfc707814035bd2d1557b2b5981abfe2ae964f6a2a858d2e57b008ce12635f9c5a9821f5d2d303b528ba8c11a4270246b1b9ec4fecad6354ab66cbb1895a045ef8ef093aef21389d65d1d0e2607bc72d7a692690a76e4926f06d2776b896bdc2961da3f6f380604fc7df7d6a25d5086a248fc6bf63293957abfb366d37b4352e1e787c83626e719196c3f03e7d285de453f97b0a73eb0e7cd3f028257eb8e4b200a3df4c88ba70273412c46d15176075ab07acd247a86a9d7a1809fe5cb2f4f934f97b208510ff12f486d8ac659874df581ea2b005dcf0f5d8087996797784a12d96c2fd095dce3e6667a881856f8692a84192eadabb9e37ed2cb96657aa5e5997bc91c9c43cf0c334752626a9522156afd89e4d6bacc6d40ef0fffe8825e12ab1fe0dbabc6ed6a00da6316c817963df931c00c7751e052a0b2646e5749e94e642564d58075c7b8652d39f0b11ebc845ea9c7f833d16c83b05afd5bed99ab47c573d1add85f2c89e3b9b783adb08cc084bf78a1b02bbeb05cd1c7c1528bf502dd87907da158eecacb58cdd16d8d530506e65b47f3ca2c5d44d6940abe63fe16e1d13ac9ba412dffec1aa438763afbfbb22b743534fbe2ed5dbe85d0e44d3102212269ac2363667ce61425e2a162405cdd4e4dad554e684d0e2934a052032626385154432bf347eec718c31e6d78850aaddb3307ff3ea6c63ec4499a5a92a66351170f0556b00f3a2941e1f0ecb9718f49da513f4745af2576cbdc462f90183a30bea5be13b3efb37225128630e7f25578e19ab79e841a0a91853b6b9dc38ec619684e153e298f52c972601de954df038c253861e454161d9a213b8d6c000dd880ce22dcfc8fa33ed82c8557dd9897d5302a6a735631321204e44699a9e3aa526906dfd5cee067113c0493e203c3b0601d7c4b8e48788d38813813e6660ed34394f6790a3a065403bb62e5bb117bd5d6bc743a443f9ed39c06bf910fc2e216255c8c6ae36d3a00de6b5494272e34d4d34b1d8d5fdfb7f9e03c9a7bf85de4b52244651784d33c6882ba4d2c1c72d8e16c65d001fb82dbda152ec99a1a0afbc4a614ebcffc93a7411a076a0b1aecd1990114cce4347fdd59e6dbaae0c7bc1b0804dfe18d59905636df6de355a3a0b6dd0dbb1aeaa61be3c34d33fabe791da832052ee5116a4c7a6800710c0e53c1952cb94a3297fcc1f80d0e249408c5978e3a797e5541d4a4b4614965ed84a5228f1578d60ab3f996c9fde32ee72b6ed93baa43f510051639439b33ed68fb0eb14020a48429135727af3307c3a073ea2bec1115858151cc040f31f366ba28c504229231ed5cefaddba689045db9bdd254bdc29b498d2113a46b28b756be423fc04ea29ae5d52d1b0e2beb5caf3315e6b32337b15bdb9b2fb8ce81c438096be885b1eabb08a0ac0a4fff9aac584f57eb7f71eec23d9f99bc3dafdbc72fd202115405f676d2882003f875949ed88d3bef681dd4bb237d790897e65a3ffa008d8129fd78e6532d8ee2a8f9a44508a283a8a6c7dd165e105e159963d18a65f7192cf2a3b2dfe061ec11a9f341a7c5baa769e668f97ed05a38eeacd032374f0685f47f091e8453cf94881a53d9d7144234b3363ac945377bc8c6ac867c7009406e5b56cc9023258fc7a39a534e2db928d498d240063a0dd23f5280b701fc7923be5c3f0bf09d3abee236211a2dcc15a14795c512fb13ff1039eb3d7fe56231e3109b6bec93f3c5b3007744d77e2d9c9d58eb236aa10ca1c4abfcfc763c2861431518aa6483542da66ae3a8460703fd4cf0d2f658f57fb282aae611a302560e3d0a69665447aa3678e4d95a114ce286c1e1c4f36b2b53033d6c8e3ef85300f26db469243cf120d9b1dd59bf91c697da76f9eb66de1fbd4c6ab2621f107b5e9235bef680873342e6600ce0f17478ff5400122328b749c7cbaf5e80b8eb0d4911d0d5933a80690d4ab58eb8cc05b60de130ce4110880dfe65e02925df503347bb6ae6d56a134885602121e4a970d4b06ac7b98c0388d1bf0837fa141e0254bf3ac77c962dfff9506ca5cf014a8ec6269182e956eb7a846ef37b9387ea826493ba99476a24db8bd11db30ad0b43a63134a5c52ead716308804cbca3abbe00a6b9697ac0a2b430f2535b41cd2ab2f7d00c9d42e4104bb7909d67f726ff3da396dbd2511f4f5888ae3dba130868d9ba8600fcc105f2629ef9038588b894583c8a3a1c901a1139506102830587bb92a5403330754678c5bee4cfb74e195274155ffa0455e7f9d519a285df8750162b9bdd4aeea203d676f4a70e2801c4990cd3ba8d2561167291e2d1c50ecb256f54d89e6d64dbf3db10f3b8c8ac4be269e2745b10e6fb2f73f896f612bf4c3d11f84953be93f128c9c4729a795be36ba477bfa39a783f4ac2fb668b121f548a4075fa9197ae13062fe277dcaaaa5947bd17cc5152d1677685f0afed83e8804addbc35979d5ef4c7da5ee20c24ce579b75630aa6c54b8b8a8b767395617cc6f648e090dc4936a2f7e4a317e1cf875079d89ac2cf62487316d4cf559b3c7b9b5948920a74f0f05bbd607f09b89f3158c6d0573fdd94420687c4cb91cb54438d0cf60c3b06540f9b4240cb4a1a7d5d32d55f1f652b646491ffecc10b01cf266588adb2f44524b911755d792d14cab07df86a5650fcc12b8538691ae1a81e9c759775adcafc269b31a05d254723159bc7af14e494d7b548ab7e37aa22f153e671d7db764be1f27075a18d65e46bbcbde57e2e19be32870a7359214cf891007a19e282ec07b4e3abaa61c63797d34617f75008f15a8bbe94f756be26734c880395d60818789a646fb5887f06c0864b967aee3fd0e0a15e3bbc4b691ed7380e36eca23272ae115340e45bc318927418d12e08d67e2c9478b0f015d7d4482eac2c776512b4fd3bd780ddd1ce8d0634c2f5a40a016eeb361e8566fdfb192c1b93dfde541a768874736960b3f927c4120800e738bb06b2e46fcec03e0681cdad75cf1a6d8856ef71b8a748a24ba451a869b65d54b64159c02785c860cdd6175aceedb8e6d224dc51f9923187aaf813f52d974509efa237f518b6a552d9ad8649b62b238341ca34d8183a8f2433e68ee2a8a20fd45bf0d635f648686f86a7187a4b441dfb99c9f6f911390e49c025f406c9024eb2ff56a684da54c21d03b9196cd2014d56a4e18fc7f09a88d267a1ef4bf8d3e60fb87c6399816f8f3971160ce34597c38cd689349f354f54860feba95083f1a28129e2164899828ba7472993b4836d5b6e8ed11fb4329bc710084fb0f2d8f564348cef06500d4f0763c26e7a8a2d533071b637067895035d415cdd2540e9fb6b43c7252d4db00ef3fc3a6ccd359ecef730195bd2fc1b12c6b4e12e639d24d638e3085b1651ba3bce2d61913f8e13f51f95f6c0b64ab0833338dfc79eb69c27b4893e11f270a40019f6433cb36838ba944b161ab88c04a408f62e23c80396e8f07292b6e5994caa2a7be54ef84e191e2aad9740460aff07cdb5e8a3bbe32ab94c8841fab6b82496716764b1ce02a33ea9b450ba42cd100c051f424adc2ef8a9a0523b49c945009c08c07c8a9333327aabc176046e6619f7111c9f6581b9912b15e1a694bbcb99a89885d3088cb9caade4257d219709e433f441deef0cd9cc7acd645fd96cce4929f275468b9c48f67edb7c4d05897acfc2c7767a92f4c610a831705296d854a4515ec65024153387c69dadb67536709e945ab714cce0d606bcc7cdbe45e05bbd0b28ae99294d1fb9ac4b5b980596ede2880d8cba77d60283c80f1104d206d4d027813e420be322966a7bcf0fc68675ea14b4032e175ecb692fe35f41d90f185ad4e20f77ebc14dc2a15688d98228ae40954c761036e752047662e0fee1107d80b7689b9c000e8ac0e3902ead2e5cb04a662e1c6f78a6eb99e848996698bf6b73c56edeccd894824a2c2cf21c7011d17f8fc04cb70b7d4bd5324f07c25c4a54be726697c3b7dfccfdbf26bfab9d9dcd0497e268abc71f45cc1950d37c13a6615eb640f80ae84beeeb09d17245df915d68d20c5a1725c7851cec7e83e8b09f0ada4efc489c77764a6de42517f997361d9408e76ea2097499252a57b78fdcbdc0031a4ba1e0b8716443521b56aecdfa22f7742b20ee4a1c26151dd0c83a9e65942ce9fbdffb24f20355b449c5580b4a9be82d68de0b775ccd1e01be32e42d144674de10ee7feb4cfd8a60600cbb24d51a2b2189c32ddb78f623fb945ee3efe3d2da0eb2be074fc50b57241c59a1a53bd0f0b3e038533ac69aa2757cde30af9ef0b0545c615922e0efa63e335eb41f14c40f7cbb8d0294dc2b7b4aaecfa902095e8ba9fbb58baf499659ffefe6580857395c7c384f4b7f9b0a764a3768aa6255b263760f572a79d9b27465ddb19dced0c67d53c59342d71744989b6c1cbc0f1", 0x1000}, {&(0x7f0000002ac0)="19278e4aa5909ffc8bde4984716b8f1eb6b9bae1e21176573d5dbaca562cfc63c8eca772eb34f47095fc4e926d6a1f4076c1a80ed923def00c67b300b9c434ce9e961ac8a931294e08a2dddb4192556f4606662fffb12ab9734ac6c306ffefd36e3b8f210aad493bbaf74a81aada2eacf8525bb50c143ba523e1e42ab70822553c012fc7afb22a26f572c547addd66ae79b7d25ed425", 0x96}, {&(0x7f0000002b80)="5113ba88a0bf871e23244466d5d052e447c94c715890564678a88b7ee4a1f999d7537b3277f98f18c3368c3d29edcc1c37851c1a059e3d8101bfc72f15e0cbcd0ded76875d7e0b507d45f4a0a6bfe1668e496f722901881927ecfd16573aabd0f344a4", 0x63}, {&(0x7f0000002c00)}], 0x7, &(0x7f0000002cc0)={0x20, 0x0, 0xfa8a, "421b9ae498461f63e4"}, 0x20, 0x40850}, {&(0x7f0000002d00)={0x27, 0x0, 0x2, 0x6, 0x10001, 0x1, "f6702dcdc7d47b0830c4ad168f51559440097740fbfff037472de7ccee374533cfcddd93a58f6d0bf3e43924df3f7e49595c276b9d00eeb632f4165eab0bd2", 0x33}, 0x60, &(0x7f00000030c0)=[{&(0x7f0000002d80)="c3cce78065084be6d08910040733781caca1f0ab056b7869227e0a80d1d2b9d2c86446239615ffdb991137b5ec35128a9a91d8a571652d765d5a568ba8f9658aa0ccd529122c4ba1ee1ca069a6120a75845a48a58a686275bb17e5872191682840349769bd0fd6b0f15e4ace16af4998425e7d2f474f2eb91a0b10ba1de1bb3436f1139d1576935173802d4ac0f85268a862c7c3e2d6f39f8cdf8403e2c252878980bf84163a7ce9ede9851790df4cde3befcd5ed770fcfa46b48e8e526597a9ab95605991dd8424e2a116508a", 0xcd}, {&(0x7f0000002e80)="b6f735266b7d238aaf08e0f88acf80cc9f525c0dedfeeeb1b0ef09fccccac6bd3a662043086af0cc475c600e95eb05c562807deb819410253606aa4256c40d8e878801b51ffb23139002b25e0caa11545d3ef75ff20cd1a769d3a8c4f41c987cd8c7531992d2a421e6465a736fe380943574bf859ec4c0e2837295fcae89dd8f41a9ef2b66145b1350a046c65e19d8522261c0f61e413bc14ae0a41beb73a522b0e1f31f88e1331b16c62f9db25e7996099aefd475bff7ba37ffad0954f5343667adeaa3b5d8ad208f9d6dfa67f77e6f83ae010445e395bacfa2bf50d0efafc90fe6ffcbd5947f718a94a8677d1f28bb50", 0xf1}, {&(0x7f0000002f80)="77fe5cf9109dee3a5e46aa3b7c50de1e1dba04429a78b822a862c4a0d0c03a51c0501569aa12eca4e692d38df65ca512961ff2268e63dc72bf04e15a6561dd9bce5c1309338f51ea8c62a98dbde6d6023b78053df3", 0x55}, {&(0x7f0000003000)="4a8789baa516d956495f059a548c01a39654d7f8204c753c93c2daaf3a0e6316d0e700d2a0b8", 0x26}, {&(0x7f0000003040)="eb2ecc8d84464929a2d796f3e08092edb522a3afd4bcf2573b57a15b292a5433b2fb2c9d61a54efad73584f3130dc66197ab5d3f556176eea4456d86f6048a3488bdcc2c4e7b1bd2c5e81427e240603aa33655148e8a5503ba7fd5033cd7fdcf00799b", 0x63}], 0x5, &(0x7f0000003140)={0x100, 0x1ff, 0xfffffffffffffffa, "fda750bddaac4571d0d462bf16c6b76b1ace9538a4a6b8770521580c1c197ae02c90edf395b10c78c2c8c3781bfbcb6d0397831c27b4efa2492e15ce67381a5c0eb6e1bc4c1309e010137a6c520be31d4932bfb50bca565abdc11da450230c55231e3f67e0c09ce7df094e65621d793fb2da3c45d36ceab4a334848c721620774a7c5a623a81738a9e440b30e096a53a39c1fb103c53b77628ee92dc352f673a1770cc0226fddb58a9591613b765cade2a5dde495056c68c2e50c0b2f80c2b93c2ea72ffd2333f1431e819559387201d35da10965cd9a9a31387c1ebff535a1e88e668de25fa86b9c7aa8a38dfe149c1"}, 0x100, 0x4000040}, {&(0x7f0000003240)={0x27, 0x0, 0x2, 0x6, 0x9b, 0x100, "37ff71141d8f5cc10609a20bf89c60ef76b22aad015050e18d1733a3cc42d29b162fc32a70996a4e1b049bc800bd6ebe44087fe6be170229430e81b750cc84", 0x39}, 0x60, &(0x7f0000003340)=[{&(0x7f00000032c0)="c467f7acfc7ceafb5f88a5013c5d22e402375f982bf6c727bd4900ec2cfd95e9d694c68fd96a1e45a417d3f08ef1822da802ee7ab7ca35c1f10a9b165dc96c4f5deb057ad91f3fdfbc2520ed73087a2b3bce57847f609a40206ff503b328a855f11b1830f35606d0", 0x68}], 0x1, &(0x7f0000003380)=ANY=[@ANYBLOB="3800000000000000040100000500000095fee93d9359a2af68434753be5c372759d1eb8ed6e94dfe097955ffffffff8e2ec7feeb52220100"], 0x38, 0x4}, {&(0x7f00000033c0)={0x27, 0x1, 0x2, 0x7, 0x5, 0x9, "e2bed67bfa605cdbf4aab31b44d906a384a4476adcae2ef2757e00082d678026531e651503a445de0fca1d44d09cdd9c341a6f900970590e40736dea611fd6", 0x16}, 0x60, &(0x7f0000003700)=[{&(0x7f0000003440)="d67891be43e7e10118732cde6cdfca8850b8189665db8c1893f5d20f2e5dc400221146f29395c1e0830953b1858b1fc3dc5e40a338a1b2cdb4acdb048b0db81569e709d518df3b3c5bcb6994c3a91bac221f29424b34e043605553c817121bd8a5e9e27d1380d24a", 0x68}, {&(0x7f00000034c0)="94920a944f9dbd656c27474fc93b9b6188363781be2dc5df80e2ce9383d14de8c73a01ce25ba36071af51001becb0ba0536fa0478fa49754473f15ac02c8f296f1b7998501eb93cafd68f72ca216712357498d379112ea8145d9b829bdcf6dd8d30a00ee7c6c9f1a9734242c6a0d268fd735e8b91f0939e70fb141a54586a3272eb8101a93c182", 0x87}, {&(0x7f0000003580)="6e00bedde15eb1d9fd41b7448240e87b9fd9f1976b6b6b2cf17555daeb95211b05eeeba4246bc93e5b557db3fdb969e64769a44c37c114e1c973f4c34c81e05ce1b1c57c4c09112044cf2842c21c57a562e4c14f6cfda8881f8271906173859d4c", 0x61}, {&(0x7f0000003600)="927fd1592ba1c7a99e0a24a2d4dae280bd7737cb4e72b3049cb10a3b5c80be762fde706b27d1232807dbab113f1b3f582c1d8e303826fc76f8fba171ec6aa9e09bb93724250648fed975e6d71b31ee31d386cc8e3ef7cc0e04329467ae0ab0b6f09bece3d2b1b6f4419a9b01b4d764c91c33d03ac3b0cc90fc27149f9b8e666942f064794127484d582df181812336e463bad7756a763dbdebae1e92562b4e8c22943485693bfc65b2bfd51f1811710f01ecd8b881f6d5a5023bdadd5e5eb06c91cbc746", 0xc4}], 0x4, 0x0, 0x0, 0x20000000}, {&(0x7f0000003740)={0x27, 0x1, 0x0, 0x7, 0x8001, 0xffffffffffff3010, "85bd632061b73d13a3e2f35fa533778cacd092e6de8758e92220b76c7f4e7be9f070ebb023b4f180c1356f002fed6dd752cca695904f94c44a8e449ffc3d03", 0x2f}, 0x60, &(0x7f0000003840)=[{&(0x7f00000037c0)="d0eb3330a99be94e8fe380cd14", 0xd}, {&(0x7f0000003800)="c575492f7de13fd22968281cc11ab75f9144849c9ddfa9169cb5f182461439f93cf93d852ef67721", 0x28}], 0x2, 0x0, 0x0, 0x4000000}], 0x7, 0x10) socket$inet6_dccp(0xa, 0x6, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000002c00), 0x4) r3 = semget$private(0x0, 0xabd5f717611d3b36, 0x1) clock_gettime(0x0, &(0x7f0000003b80)={0x0, 0x0}) semtimedop(r3, &(0x7f0000003b40)=[{0x7, 0x80, 0x1800}, {0x3, 0x3, 0x800}], 0x2, &(0x7f0000003bc0)={r4, r5+10000000}) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000003b00), 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000003a80)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000003a40)={0xffffffffffffffff}, 0x2, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000003ac0)={0xa, 0x4, 0xfa00, {r6}}, 0xc) 21:00:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000014001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000022001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000180)=@hci={0x1f, r1, 0x3}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="935e6b2d36265f916ee03755032263de6e82f5e797603b7671ac45c020de9b305023458e360ae68894bf1a342da2eb236964bfac6772070be3b24f7074a191a793bddb19e52068a71a83da25cc60f9103fe1d3af728a4393c970d80f9936ba82aaf37972baa4cc8044043b817b8c46d6f9dc00cf276811abcb7b62981a908c98e8801116f17413227320e80a2d8be791f95a9abcad32185b", 0x98}, {&(0x7f0000000300)="f8b6b71fb058d0619c4030a7a1819d156dd98c07a00500d7c6352fbc6a95ff32cc8e032ab757a9922a65a880ef7cab5ec82083677b010fbbd4e79ce56fd96aec3cce84e7e2567b5eddd708024976fdedaa7ac101052e4ce2a2d87b05811d29469e02", 0x62}, {&(0x7f0000000380)="8438b6621831249e2365a4d20d31a61a85a3c697af58f8a077c169d49077d8e28c1ef5bcc005e8b5f3521e2638e0951215927c565508128aeaef406eb734173a67e29b993c58a72985c3f9f37ea88028e1b8665f85ed3484c12b5c2c66ffeef38560f615fa965bc0b008a200829d00090b3ca14ff6ff2a5523384aa5a7318022b749fc0bd5d7ec20c6fb169c8ae0b05f97e4dc7d782c8b2571c1a4aee03dfe1f066a57d1c593df8554a2b7cd337cff9c23252221d47d1310ef14faa6d9b480f9d59591ed048bec2de9", 0xc9}], 0x4, &(0x7f00000004c0)=[{0xa8, 0x1ff, 0x10001, "55b3a9368a56b1a3f60c71e724102386a8a00dad42099dc1ed317126249ce0316485057ba3314cbea16d18c508fb07f1f2ec14bbfd2fb753a0eeb1f04188623255380577c5eab3d23df2b1f32d0eba4d4bbe59f98f0bae8eabd466ae4cd5dec08800acc91fa8077891b9d7e0b7130e0fff5eb4b203b777951fceefdf9f8778a9276bbf04dc4014874ce69c86e47fa365f9805f4e"}], 0xa8}, 0x81) 21:00:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000011001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000012001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000015001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:27 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000024001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400512d1d8e5add84be153d6d7847920000310020000100f407002c04000a00471008200100ffffff04e700000000000000c8fecb4e1d9a487f60e0341dcec61e1b4f0c3db3b9a4ff80009be8a156c4cc", 0x51) socket(0x1, 0x4, 0x5) 21:00:27 executing program 3: ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) r1 = open(&(0x7f0000000040)='./file0\x00', 0xa00, 0x20) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000080)={{0x101, 0x4, 0x1, 0x8, 0x400, 0x1}, 0x2, 0x2, 0x6, 0x4, 0x100, "bbbc68ec515d1a3967fcbea394f86f6bd8aef055c79b4a564f05bf00fe8fd63e1db8d6a12eb8f9d68d11edf54cdcfffb6c892e506c9065bbf43b4a3e337170c2c75044686e89081f07a6999c3def0fe4dc0ef71d80c15f682acbb1dca3af8444160393f917bca305e73be8af226d846f0ea9de17ef7cea61f57d387ae328ee1a"}) 21:00:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000013001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 389.057116][T21304] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=36381 sclass=netlink_route_socket pig=21304 comm=syz-executor.1 [ 389.090279][ C0] net_ratelimit: 10 callbacks suppressed [ 389.090317][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 389.102395][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 389.192966][T21304] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=36381 sclass=netlink_route_socket pig=21304 comm=syz-executor.1 [ 389.329302][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 389.329955][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 389.335438][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 389.341565][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:27 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x0, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:27 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffd) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x7, 0x2) mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000040)) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000480)='\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) 21:00:27 executing program 1: r0 = socket(0xd, 0x3, 0x7) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000014001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:27 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000025001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000016001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000015001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 389.646002][ T26] audit: type=1400 audit(1554843627.724:158): avc: denied { map } for pid=21327 comm="syz-executor.3" path="/dev/ashmem" dev="devtmpfs" ino=17596 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 21:00:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:27 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000026001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe0000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x7b, 0x0, [0x2c0010145, 0x2, 0x0, 0x8]}) 21:00:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000016001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 389.889337][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 389.895147][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:28 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 390.050419][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 390.056485][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:28 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x0, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:28 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000028001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:28 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:28 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e21, 0x10001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}}, 0x4, 0x7}, &(0x7f0000000180)=0x90) 21:00:28 executing program 3: r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) r1 = accept4$inet6(r0, 0x0, &(0x7f0000000000), 0x80000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) sync() 21:00:28 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}, 0x8000) write$binfmt_misc(r0, &(0x7f0000000100)={'z0z0'}, 0x5b4) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000200)={@loopback, r2}, 0x14) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000140)={0x8, "b4026352840dcf7b096fc654bff0bd9c79a4a1929a1e1252482bea6b6d2395f8", 0x2, 0x1}) 21:00:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:28 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000029001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:28 executing program 1: r0 = socket(0x18, 0x3, 0x1) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000040)=""/30, &(0x7f0000000080)=0x1e) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) 21:00:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:29 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:29 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:29 executing program 1: r0 = socket(0x9, 0x900000000000003, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) accept$packet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x14) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x2) 21:00:29 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:29 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:29 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:29 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:29 executing program 1: write(0xffffffffffffffff, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x501000) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80000, 0x0) 21:00:29 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:29 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000020001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'lo'}], 0xa, "a804709c2bc8d39273d797085c31849d30c375be64b754c65dadbd674287669760e5d7b92fa7182d13ec1dbb2e9b8f4c56fb5757907dc7c040668deee7a53bacc5522c24771cfb72e2fd6bd7dbd7d0f8da8411303c523dccf794d101954effabf26160c4d9abe453eb8083417bfc0a0309448fae4160024436119e702687cf64763bc0e83c52991d1e2da37bf5341ed4ff518b2973bbabde1a121a2216ffb5028ad0820e022e4a351e37df55b967"}, 0xbc) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 392.010013][T21442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=21442 comm=syz-executor.1 21:00:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000020001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000021001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000030001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 392.093725][T21442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26159 sclass=netlink_route_socket pig=21442 comm=syz-executor.1 21:00:30 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000021001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000022001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000080)={0x2, '16'}) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) 21:00:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000022001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000024001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 392.792585][T21481] __nla_parse: 13 callbacks suppressed [ 392.792595][T21481] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 392.809970][T21482] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:00:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000024001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000025001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 392.880374][T21481] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0xfffffedb) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 393.017105][T21496] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:00:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000025001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000026001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:31 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:31 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000034001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0x7, 0x4, 0x470, 0x0, 0x0, 0x120, 0x388, 0x388, 0x388, 0x4, &(0x7f0000000140), {[{{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x7, 0x2, 0x5, 0x1}}}, {{@arp={@local, @loopback, 0xffffffff, 0xffffffff, @mac=@remote, {[0xff, 0xff, 0x0, 0xff]}, @empty, {[0xff, 0x0, 0xff, 0xff, 0xff, 0xff]}, 0x6, 0xffffffffffffff1e, 0x7, 0x0, 0x4, 0xffffffffffffffe0, 'veth0_to_team\x00', 'erspan0\x00', {0xff}}, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xffffffff00000000, 'syz1\x00', 0x11}}}, {{@arp={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, @mac, {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}, @mac=@broadcast, {[0x0, 0x0, 0xff, 0xff, 0x0, 0x1a0bb57e1774fcf6]}, 0x7ff, 0x50, 0x7fff, 0x0, 0x7, 0xf8, 'ip6_vti0\x00', 'veth1_to_bridge\x00', {}, {}, 0x0, 0x240}, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7e9290b04fdf9e7c85af62c1cf7cf170d5abf474e0e68f047fdcf73cd912"}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/net/pfkey\x00', 0x2040004, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000080)='security.SMACK64IPIN\x00', &(0x7f0000000640)='ip6_vti0\x00', 0x9, 0x3) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f00000000c0)={0x5, 0x100000001, [{0x6b1c, 0x0, 0x7}, {0x3abd, 0x0, 0x800}, {0x3ff, 0x0, 0x1a}, {0x6, 0x0, 0x6}, {0x81, 0x0, 0x800}]}) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10) 21:00:31 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x0, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000026001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:31 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000028001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 393.549031][T21518] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000028001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 393.599196][T21524] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:31 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:31 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:31 executing program 1: socket(0x10, 0x3, 0x0) 21:00:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000029001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000029001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x204000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x3, 0x40}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={r2, 0x116, 0x30, 0x3}, &(0x7f0000000200)=0x18) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) [ 394.051025][T21555] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 394.072074][T21555] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:32 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x0, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000042001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:32 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:32 executing program 1: r0 = socket(0x200000010, 0x3, 0x4) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x43, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000001140)=0xa7) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000140)=""/4096) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000001500)={0x5, &(0x7f0000001180)=""/164, &(0x7f0000001480)=[{0x7, 0x47, 0x8dc2, &(0x7f0000001240)=""/71}, {0x5, 0x33, 0x8, &(0x7f0000000100)=""/51}, {0x0, 0x11, 0x5, &(0x7f00000012c0)=""/17}, {0x7f, 0xf5, 0x0, &(0x7f0000001300)=""/245}, {0x4, 0x59, 0xe9a, &(0x7f0000001400)=""/89}]}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='htcp\x00', 0x5) lseek(r1, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x200, 0x0) [ 394.279682][T21567] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=49 sclass=netlink_tcpdiag_socket pig=21567 comm=syz-executor.1 21:00:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000043001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 394.322324][T21567] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=49 sclass=netlink_tcpdiag_socket pig=21567 comm=syz-executor.1 21:00:32 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000080)=""/58) 21:00:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 394.563721][T21591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 394.661676][T21591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:32 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x0, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:32 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000048001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:32 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000030001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:32 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) r0 = socket(0x10, 0x3, 0x5) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0xffffffb1) 21:00:33 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000049001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:33 executing program 1: r0 = socket(0x10, 0x803, 0xffff) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:33 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:33 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240200004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:33 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2402000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000030001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:33 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x4202, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = fcntl$getown(r1, 0x9) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000018c0)={0xfb, 0x8000}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) sendmsg$nl_netfilter(r0, &(0x7f0000001840)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8050000}, 0xc, &(0x7f0000001800)={&(0x7f00000002c0)={0x1518, 0x0, 0xb, 0x100, 0x70bd27, 0x25dfdbfe, {0x3, 0x0, 0x7}, [@typed={0x8, 0x35, @pid=r2}, @nested={0x2cc, 0x71, [@generic="88a79df3e6a3fe8160be362d3f072a8ff6a1d7456369db0e90b64eae1a930b958dae149b4ab9ed3fc7c37d42f324874df227226bfecfdf1046dbf5ae914d285e0a8018d91abcb6c5bee52e076be695650d4d180c72a644b56e9d1f3da5265f4a492fb3abadfe7c26c60068672722a2e0eb15ee22267a458bd873a10a25b0d7150d8e580eaf5543bf42b422861bcccda6b4b3f7d1c1891bcf759d164b704b2df2ce871580cce9de5e8629e41877a9991503dc609c6fb205ca3f90a31d4283380638780521999fc163b77c7cc486de", @generic="270e26993cae0652b9408f80f3b9914677ef3f95", @typed={0x8, 0x11, @ipv4=@multicast1}, @generic="0a3f4a477bb6e6ad930274fa165b7f7b85b8ff1874830d4c3af8d74fddefd122b0882c9c71da63267d156253ab3bc71e779a959752a03815d8678684bdc2b7dab573e8cee47e90acf4aaf274ed85988c3f88c164e305f3ac743d64512c42f62bd630719f90ca47052bf415608cded39d36f1027bdaea6677070490c9d827dfd6cfff8f3f8ea1b8db3cc870332f111eb426d062b1ee99bb66ab9a026c0408dbf20e0a3c2a4a1190c1a2d30acd1b9a8787f34942c31d05e0dda43e8f3f7b71a406bccb277bcf453dbbe4d21808b92e61657c4457fc8d9c35c8ff8785ceeb75ca76e526746de5e80dbd65e73d5890a24b9a3c7c38ec8d7ec77d03f51fafba89", @generic="00f210f6d30eac3100f357c6d14f5be158a884f5e3882589f63540de735d18aa3a4d4594ec1c6b6e61d8531548e418f8304a24aaa6e776e6a312c2ea598c745c286cd222b4c6981a8b5bf0e8b775cbc4610a58b9bb49abcda4e4482788275150ff136dd34731dbb6cbb12872faca9ec9ca16149e122a053c59331c8a1cd574747b546c56e97a1cc5b51e23d56eb58d", @generic="492cce697c597fbc94ba7c0346d691cf3291ffe0965b592b4f9562135b0ae725f9e110d075f0a93ff06381a8d49fffbbe807d3737dfde2e3b69ec5bbd4b9687825f7f50c3d244bfa3a", @typed={0x8, 0x1c, @u32=0x4}]}, @typed={0xb4, 0x6e, @binary="a52bc2dfeb020a253656fe910e3dc1075cf364934e666bdcac57162710cddbee545937904a789df1dcd52cbc7ec85a89bf2218c8a638b879e4acd51eccd3ed06f7a499e833e8b62d6f5d0b261eca87d3b0f9a1b77624057c7ca003649cbd46bf52a8df87585576cb08b6800b0fa8850fa069dcad419ffba4a604ad0a4f1887f0e0946cd38e1a8e18431d7a26f66688ee0238a71b9eaddf58513a4c0f0913a70d8efe53844b39dce68c486a00d3392dc8"}, @nested={0xe0, 0x23, [@typed={0x8, 0x83, @uid=r3}, @typed={0x14, 0x9, @str='/dev/cachefiles\x00'}, @typed={0x8, 0x86, @pid=r4}, @generic="50596bfd7f1f436c76b13d81f291630c1e20db4166cd95eab91ea5adbe4948d3d15bc6e73a98a3238de1dd81b214e14f8b9d212b0f3e0aa95331cb53425170137a56f6bf8822a04d74232d445a92fc9339b9d514b40981258c7858790a99875e0a57059a2efc96d625de8e0a8f2f0456acb419ceffdae07bb01c481a6497d9b3949e6897c5f2d2e2827d6e01bfafe85794ac740d4c03ceace130d7fc5b15aa701b112ed6781f4b2d619838e4c697757bdc355bd32619df"]}, @generic="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", @nested={0x9c, 0x55, [@typed={0x8, 0x31, @fd=r1}, @generic="43c7d200b1ad533c2996ec07e9b6367acfcdaf5840d8024be53cb8eb39f535d4797d9fbe78642b5715eb8bf432c5e37934cab1f0eddf17633559bb844f56806eb49aa7b98871092aefab4c07496cc27087018a6f83303dc40b93bc2b2b18bd3e86ca4e3a1c9ec719e5ccdedd74b44d53b11ebc666fb5e6b22f403e80d65dfece32ba475a400694e220d10923d116aa"]}]}, 0x1518}, 0x1, 0x0, 0x0, 0x4000840}, 0x40) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000001880)) 21:00:33 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:33 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240300004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:33 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240400004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 395.563269][T21640] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pig=21640 comm=syz-executor.1 21:00:33 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2403000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:33 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 395.669025][T21654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pig=21654 comm=syz-executor.1 21:00:33 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240600004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:33 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240a00004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:34 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:34 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0xfffffe7a) 21:00:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2404000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:34 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240c00004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:34 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x78) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x4000000000000, 0x200140) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x400}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={r2, @in6={{0xa, 0x4e20, 0x9, @empty, 0x401}}, 0xd19, 0x2ecabf13}, &(0x7f0000000300)=0x90) r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) sendmsg$rds(r1, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000001700)=[{&(0x7f0000000340)=""/143, 0x8f}, {&(0x7f0000000400)=""/167, 0xa7}, {&(0x7f00000004c0)=""/137, 0x89}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/117, 0x75}, {&(0x7f0000001600)=""/83, 0x53}, {&(0x7f0000001680)=""/69, 0x45}], 0x7, 0x0, 0x0, 0x10}, 0x4000000) 21:00:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000034001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:34 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2405000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240e00004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2406000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:34 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:34 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x1, 0x0) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x6, 0x4, 0x8001, 0x8}, {0x1000, 0x1000000020000, 0x80000000, 0x8}]}) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000001c0)={0x5, 0x52e9, 0x8, 0x6, 0x1f, 0x7}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0x40e) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x42000, 0x0) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000140)={0xdc1, 0x3, 0x4, 0x202f000, {0x77359400}, {0x7, 0x0, 0x10000, 0x6f36611b, 0x709, 0x3361, "e3743f67"}, 0xe4a5, 0x7, @userptr=0x10000, 0x4}) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0xe) 21:00:34 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:34 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240f00004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:34 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2407000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240a000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="241000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240c000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:35 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="246000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000042001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x800) epoll_pwait(r1, &(0x7f0000000280)=[{}, {}, {}, {}], 0x4, 0x531, &(0x7f00000002c0)={0x6}, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x9c, "e2ba2c974595f7ea17f3f125f987e70749311fd3a2856e9e3ca1ddc5aadbbe00276a9ab703dc20fff64138645255a54ea84fc10c1c02fd6a3f14af73e559850dc3be72c13d8264a2bd99e19d6d9c42d9976f933e76fc6e6f482ae0010ddc797596f4573391ac0b1f86e1eb483aef25145b5672e91f90959ef9cb2635d17c0cba88008c3803394a179f2b56701627e89da8d715285d431800b718a312"}, &(0x7f0000000100)=0xa4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="000007000903000480ce9aa4041261853ae7af3eaab90b050600000004f30600"], &(0x7f0000000200)=0xfd72) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r2, 0x6, 0x1, [0xab2]}, &(0x7f0000000180)=0xa) 21:00:35 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240e000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24e000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240f000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000043001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:35 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:35 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x800, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x4, 0x200) mq_timedsend(r1, &(0x7f0000000200)="98612c52f48a196cdd8d4b6e15716f6d3fb32fe8bbe1b226cfe32db39467b05cc6dfad2a4f9ca3de90b6c25dc68bdef9c5c8d067b848a8926b89397533d29b16cf3184bc9c8739bd5b6d5a70354f0f8c8eeabeeb16c768a9a852447eca178aff9363286ae3549d0364c88d92b7e9e2fa1ae498974ccb6cf38d5fff0398ec3ae082a6423020fcc6940bbd916544", 0x8d, 0x3ff, &(0x7f00000002c0)={0x0, 0x989680}) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000140)=""/162) renameat(r1, &(0x7f0000000300)='./file0\x00', r1, &(0x7f0000000340)='./file0\x00') connect$vsock_dgram(r0, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host}, 0x10) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-control\x00', 0x2080, 0x0) 21:00:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2410000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 398.209350][ C0] net_ratelimit: 8 callbacks suppressed [ 398.209359][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 398.220758][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:36 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000048001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:36 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24f000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2448000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) write$UHID_INPUT(r1, &(0x7f0000000080)={0x8, "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", 0x1000}, 0x1006) 21:00:36 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000049001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:36 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240003004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="244c000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 398.426308][T21790] __nla_parse: 17 callbacks suppressed [ 398.426319][T21790] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:36 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2400000031001f00fdf9f407002c04000a0007104437d1ff09de6bb74108000100ffffff79c5bb6ec505c20200a84bd6c4891a84c138b9b94e19cdefb7707eb8672859dc150ecc35aabc577cc5a21225f220766cb603f506ca9e11b973e0db2661ad74295349b9b2731ac375ae54cb8182577ca558c330bfdbf78f9725c3ae7e4f3274c77e6c3bb69494f2aa72763f0282b3deb5d54ce0046a9113f7610616c1dbe54389fc0ecb2b77740432d1addc6950ee98e01c22ddcf64f99c72c898e2d1a29833c43b1a23b2274725f1cf3e2cc44ab444612e3782f7ce4e083a143128ce5ae7e6ad2d6fb798546b4c021da998f4b862d24b55b5f675ae", 0xf9) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@sha1={0x1, "40bc2ea903eeb50e841994f252300121ac981ceb"}, 0x15, 0x1) accept4$rose(r0, &(0x7f0000000100)=@full={0xb, @remote, @null, 0x0, [@null, @default, @bcast, @null, @default, @default]}, &(0x7f0000000140)=0x2a, 0x80000) [ 398.758270][T21815] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 398.770613][T21815] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:37 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:37 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240006004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2460000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:37 executing program 3: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:37 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x101000, 0x110) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000140)={0x1, r2, 0x3}) write(r0, &(0x7f0000000240)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000180)={[{0x3, 0x99, 0x7, 0x3, 0x1f, 0x2, 0x5, 0x1, 0x4, 0x8, 0x400, 0x3a1, 0x7}, {0x97e, 0x800, 0x800, 0xfffffffffffffe01, 0x4, 0x4, 0x2, 0xfffffffffffffff9, 0x3, 0x0, 0x5, 0xfffffffffffffffb, 0x7ff}, {0x0, 0x0, 0x4, 0xffffffff, 0xe7, 0x6c, 0xd4c4, 0x449, 0x800, 0xfffffffffffffffb, 0xff8e, 0x636e, 0x2}], 0x401}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x280000, 0x0) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000080)="3837c57305") 21:00:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 399.299178][T21827] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2468000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:37 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="242406004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 399.340448][T21833] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:37 executing program 3: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:37 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000a004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000050001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 399.489335][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 399.495218][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 399.729325][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 399.735133][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 399.739590][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 399.746735][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:38 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000200)=r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000040)) r3 = dup(r2) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000001280)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f00000012c0)=0x10) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000140)="2400000031011f0014f9f407010000800a000910080000000080ff0c0082c3871d35deb3a400000000000a9eea2e612874456d21a7fcab00006da63b454eecfc1d999df5e9aa0d91134ea6842d146e4a63b0a2306297540306b9c1913a99ddee757a288772f97b80186699d85c54fbe2bbf00514644d0f0d2deb66d267251f4908244d1ac9345d8793cd3c09c6e79fbc7ec0133489fd32079e", 0xfffffed4) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x1000)=nil) 21:00:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="246c000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:38 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000c004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:38 executing program 3: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000051001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:38 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendto$ax25(r0, &(0x7f0000000040)="bc79f27fafa6411afd916d2306f2faa34d3e5fc7ef409d8be20c0945cd54068da1abbd51d2344707b1316194fa3e97aaf177d7290c5dcc2413667cc8b9fb543893301fc31076e65f95b26733011f1845d782387f1939be93d2564bc894b8563dcf68c7", 0x63, 0x4, 0x0, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0xfffffffeffffffff, @ipv4={[], [], @multicast2}, 0x8}, @in6={0xa, 0x4e22, 0x3, @dev={0xfe, 0x80, [], 0x11}, 0x5c}, @in6={0xa, 0x4e21, 0x3f, @dev={0xfe, 0x80, [], 0xe}, 0x10000}], 0x54) 21:00:38 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000e004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000252001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2474000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:38 executing program 3: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 400.331472][T21879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=42671 sclass=netlink_route_socket pig=21879 comm=syz-executor.1 21:00:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000352001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 400.437355][T21883] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 400.452707][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 400.452773][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 400.536239][T21879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=42671 sclass=netlink_route_socket pig=21879 comm=syz-executor.1 [ 400.536977][T21883] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:39 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:39 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000f004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="247a000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000452001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 3: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:39 executing program 1: r0 = socket(0x9, 0x3, 0x1ff) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0x6, 0x4) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) sched_getscheduler(r1) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000140)={0x4, 0x80000000, 0x3, 0x100000001}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x803, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e73b86664c472666400003dc0f947", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',msize=0x0000000000000004,cache=none,permit_directio,\x00']) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000552001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240624004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200000, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 3: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24e0000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="246558004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 401.242588][T21921] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:39 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000652001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24f0000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:39 executing program 1: r0 = socket(0x20000f, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240060004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000852001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:40 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400030032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:40 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="245865004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000952001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 402.103993][T21956] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 402.150555][T21962] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:40 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:40 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000a52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:40 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240081004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:40 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffffa, 0x800) r1 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200) inotify_rm_watch(r0, r1) socket(0x10, 0x3, 0x0) 21:00:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400050032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400060032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:40 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400e0004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:40 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:40 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)='$\x00@\x00'/13, 0xffffffffffffff36) 21:00:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000b52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000c52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:41 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24a5060032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:41 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400f0004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:41 executing program 1: r0 = socket(0x0, 0x803, 0x80) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f00000002c0)="40aaee63273a8ef833982e86663aee89446882a7acc2eebc92642834f175e650588087c14490613c54458d9f467cbc48d29ac3bceffd2dc41c21602add93d4c43597572282dfa3b84c0b09fcf65b5af7ff96cb536fea6af71604b293fe01fa7663164399f2f142d23c8c01d98bfd572a667e58651bd97e48b1707fbf0569fefd450c6e4332589cbde9a36a5815bfa16f7a6b9af4ba3e7833a4bd6a0e34e65e6026f9b52dc2fdf9dd3b22a152e5c277") write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r2 = add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="5035957c807647f1ed64b37d8a5e087062ccc222c5126db664c6ec42f314dbd2b3e0c28055befaffae79a3d5da1b9335b917ea82cb6ade62f3b4e287c3e54deb88668f149b47aea45fbbfa2df4e8f4aabd8e1fe3b035ace2a97b6122175a", 0x5e, 0xffffffffffffffff) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000004c0)={0x1, 0x6, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @dev={[], 0xc}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @broadcast, @remote, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) recvfrom$inet(r0, &(0x7f00000003c0)=""/17, 0x11, 0x2142, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x7) keyctl$chown(0x4, r2, r3, r4) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000380)) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)='/selinux/mls\x00', 0xfffffffffffffff9) 21:00:41 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000e52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:41 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000067001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400070032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000f52001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:41 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:41 executing program 1: r0 = socket(0x10, 0x20000003, 0x1000) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 403.790925][T22032] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=22032 comm=syz-executor.5 21:00:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400001052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 403.889964][ C1] net_ratelimit: 6 callbacks suppressed [ 403.889992][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 403.899312][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 403.902332][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 403.907670][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:42 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000a0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:42 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000080)=""/104, &(0x7f0000000100)=0x68) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) bind$rose(r0, &(0x7f0000000040)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast]}, 0x40) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000140)=0x1) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:42 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240002004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:42 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400001152001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000c0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:42 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240003004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400001252001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 404.432738][T22054] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000e0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:42 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 404.522521][T22061] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 404.609299][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 404.615152][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:42 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 404.801550][T22074] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:43 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100), 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:43 executing program 1: r0 = socket(0x10, 0x1, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x111000, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000280)=0xfff, 0x4) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x7ff) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xffff}, &(0x7f0000000080)=0x8) accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x44c2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={r2, 0x4, 0x1000, 0x1, 0x2, 0x5, 0x1ff, 0x0, {r3, @in6={{0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3ff}}, 0x800, 0xd3c, 0x8, 0x5, 0x3}}, &(0x7f0000000200)=0xb0) 21:00:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400001352001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:43 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240004004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:43 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000f0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:43 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240006004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400200032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400006052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:43 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:43 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x404401, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x100) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) pipe(&(0x7f0000000180)) write(r1, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:43 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000a004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 405.449787][T22108] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 405.739959][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 405.746319][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:44 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100), 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:44 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24003f0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000e052001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:44 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000080)={0x3, 0x3}) 21:00:44 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000c004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400480032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000067001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 406.048792][T22124] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 406.087205][T22124] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:44 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000e004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:44 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:44 executing program 1: r0 = socket(0x5, 0x2001, 0xfffffffffffffffd) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="089bea00880000005e030000010000004a03000001000100000000b4ad530187ab93f18eb01b4f5b4e923600000000005401fe11ae3be9e9b91777ceb1c7e1692459738d03a2f3f8f881bdf534742d"], 0xfffffc38) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000008c0)=0xff, 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x8a, "2e7fe1c6337b6db4e1c1da7f8d7ba95648f4c09bffb7f47460c69f4fad6a95a8c7e921503b50bfdc2e74b825de9e4ba535e26c37876270fdb9ff20bee1d3f89c77d7c33e9828fb0e981ef4de9eadf5e9710eb4621fd207d35f8f3160e02433b9a1e6caf78c9b372859f9ec86047137a516365c0c99ee9bc26f2e79cc3f8a96c48a1a57dff8577af99a99"}, &(0x7f00000001c0)=0x92) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000200)={r1, 0x100000000}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000007c0)={0x0, 0x6}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x100}, &(0x7f0000000880)=0x8) 21:00:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24004c0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 406.285437][T22145] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=22145 comm=syz-executor.0 [ 406.529317][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 406.535149][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:44 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100), 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:44 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000f004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:44 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:44 executing program 1: r0 = socket(0x10, 0x3, 0x0) fcntl$setlease(r0, 0x400, 0x1) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2465580032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:44 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240010004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 406.838085][T22163] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 406.844629][T22164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=22164 comm=syz-executor.0 21:00:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400600032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:45 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:45 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = socket(0x10, 0x6, 0x5f) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x101, @mcast2, 0x8}}, 0xba, 0x380000000000000, 0x80000000, 0x80000000, 0x4}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000280)={r2, 0x3d, "01600ee99b5065d14176d9fae0db50c68611a39d944030a29683d17b9c6de32d59d5be9110ae39177910ceb59f62983d418d0624e04e24e1b4bf5ac754"}, &(0x7f0000000300)=0x45) write(r0, &(0x7f0000000100)="24000000e1d7baa50fe9fa3674a56d3bc631001f00f9499d2b000100ffff4fd4060000000000000083bac173e72f671a84c54b92bd9dbb29a3aba8ed8ec1dc4aea7020629d09bbc0ead75ee328c18d57131573315fec26a9c758b47fd0e9782f3a4af6e4e29d414208d171a2e92dd4f431ec5062c2382a31770613160724e46658e538ae4237ded78a4c00"/148, 0x94) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) 21:00:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000010001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:45 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240060004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 407.138329][T22185] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 407.153084][ T26] audit: type=1400 audit(1554843645.204:159): avc: denied { write } for pid=22182 comm="syz-executor.1" path="socket:[78748]" dev="sockfs" ino=78748 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 407.304967][ T26] audit: type=1400 audit(1554843645.274:160): avc: denied { getattr } for pid=22182 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 21:00:45 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:45 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400e0004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2458650032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:45 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000011001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000080)) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 407.707144][T22198] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 21:00:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400680032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 407.747892][T22200] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000012001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:45 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400f0004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:45 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000022c0)={0x2, 0x0, &(0x7f0000000200)=""/4096, &(0x7f0000001200)=""/132, &(0x7f00000012c0)=""/4096, 0x3000}) r1 = socket(0x10, 0x3, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000002340)={0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0, 0x7, 0x1ff, 0x800, 0x5f, 0xfffffffffffffff7, 0x1f, 0x2a, 0x0, 0x1000, 0x9, 0x50d9, 0x4f, 0x2, 0x8}) write(r1, &(0x7f0000002400)="240000003b0cf4bb14f9f451dc4c831183cd21b3637f4e3ff407002c04000a00071008ec46d7e92814fdeabf000000000000006600000000000000", 0x3b) sendto$llc(r1, &(0x7f0000000040)="94ce92e04fbb8484cdb49f8fca4c28d7c1cea72035693e16699097c8cc82e91b5e5f172458fc384b66a3486805089911871e7839c4790fb3a60f109ff9a21d6d937510c091bafef5f076f2932ff9135a68076b1e1880e9a1929f3ea3455dd56f2cae40b592d77c32fb384f9445395de5e0c1d22ffadc82d28dc54ba2457a0769031043faf6ac1f9f32946c3ae64b508aa1f3b0ce12fb2595204c9680615b2d73ac897be8d7e75d1bc5c08b744c595c94f48f36e2516c1643e2e144314ff688ae4e86749339c7c7fe74c724ef86fb5eea18d2dc2dc5b8ae", 0xd7, 0x24004001, &(0x7f0000000140)={0x1a, 0x338, 0x80000000, 0x5f, 0x1000, 0x8, @remote}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000002300)={'syz_tun\x00', {0x2, 0x4e21, @multicast1}}) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000180)) 21:00:46 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000034a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 408.048021][T22221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3131 sclass=netlink_route_socket pig=22221 comm=syz-executor.1 [ 408.138650][T22224] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3131 sclass=netlink_route_socket pig=22224 comm=syz-executor.1 21:00:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000013001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24006c0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:46 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:46 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000064a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:46 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:46 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x40, 0x0) write$selinux_load(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9210000005345204c696e757827da9f9354dfd581c0630d7a4f31eb335a0240642d9fcfe6c0fbccf0e10296d8261d8c24599d9b6814502bb7eb4205d8e76bda169f38bbeadb4499958192a885e9133e671f564433926b623d93afa6b30c5cbd2a1739d0a90846b41ea57c89bb2e789ac95c1e1fdf0a8bb4d5cbd7924409ff2dd8798ba17091bc6f68aee3869379ebc1c763118148f5567d5306371b65ff3dc3284d8b46a0ff293cd079ddd8e210e6e45716fce95e5cc55d2a135aa464d3925df7778c46d7f2bbf2a9729ddcc637bbd5a06b1b27530817b621338c2654bd345ada04c91c3a33078dbc2a0d7648b0b177daf13107cbc6569bf9554ba6e69f838eb1e4cb1f8e244963b1b8ee26025302000000fd923f9cdb06f023ba008a45932598e35711a0a8fc76bcc2ba7dae138c68aea522de27c7256b2d9e8cf22149ad3c07f2d0225f9b27f4b598760463d5a020198c"], 0x83) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x702, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x402, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_loose='cache=loose'}], [{@fsmagic={'fsmagic'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) 21:00:46 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240024064a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400740032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000014001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:46 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:46 executing program 1: write(0xffffffffffffffff, &(0x7f0000000040)="2400000031001f9b51f9f407002c44000a0007100800ffffffff08000000002600000000", 0x24) readv(0xffffffffffffffff, &(0x7f00000003c0), 0x10000000000000fa) r0 = getpid() sched_getscheduler(r0) syz_open_procfs(r0, &(0x7f0000000000)='oom_score\x00') 21:00:46 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000a4a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:46 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000015001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24007a0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:47 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000c4a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:47 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:47 executing program 1: socket(0x11, 0x3, 0x1) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x30000, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000040)) 21:00:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000016001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400810032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:47 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000e4a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:47 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:47 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000f4a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2406a50032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:47 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:47 executing program 1: r0 = socket(0x2, 0xa, 0xff7ffffffffffff7) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:47 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240006244a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 409.889310][ C0] net_ratelimit: 6 callbacks suppressed [ 409.889318][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 409.901021][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 410.129312][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 410.135189][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 410.140253][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 410.147494][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:48 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400e00032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:48 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:48 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000040)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x800, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f00000000c0)=0x2) 21:00:48 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240065584a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400f00032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:48 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 410.332397][T22319] __nla_parse: 6 callbacks suppressed [ 410.332407][T22319] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:48 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000604a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:48 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x1}}, 0x1, 0x1, 0x0, 0x1, 0x8}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000140)={r1, 0x70, "dc443fc1a4fd841bd72efd52893cebc46b8558de37f6e36a96d5c7f3f4325759c05a46452114150493f4ba709dddfa0be123634a5955bd211a48edc9be23172f883758a7d0c6c6351ae44474ace8b21e653c16e33a0e33630c329550f0c96db9becb2330f499c838fba278fc29f1ae68"}, &(0x7f00000001c0)=0x78) 21:00:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000067001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 410.683710][T22345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=22345 comm=syz-executor.4 [ 410.696887][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 410.696933][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 410.733683][T22346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 410.772076][T22346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 410.849331][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 410.855131][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:49 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:49 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:49 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240058654a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="f5cf062effb0463f0ff803b8ca7ab834daafdc85664f4ca59e6b8dc3f32d8c821e403d7e79b9b88c1adcf6845e50f73271a080a47106e4f6102454f55656cff890986600aba11f9270090779378cdbe257df4c34c58b88dc6d41fe75d685") write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400020032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000814a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400030032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 411.169131][T22360] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 411.237955][T22365] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:49 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:49 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400040032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 411.465546][T22383] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:49 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:49 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000e04a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400050032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000800)='/dev/hwrng\x00', 0x2000, 0x0) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) write$binfmt_misc(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x18b) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000000c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6c8, 0x138, 0x340, 0x138, 0x498, 0x0, 0x5f8, 0x5f8, 0x5f8, 0x5f8, 0x5f8, 0x6, &(0x7f0000000040), {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @remote, [0xffffff00, 0x0, 0xffffff00, 0xff000000], [0xff, 0xffffffff, 0x0, 0xffffff00], 'caif0\x00', 'nlmon0\x00', {0xff}, {}, 0x7f, 0x401, 0x0, 0x24}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@dev={0xfe, 0x80, [], 0x11}, @ipv6=@rand_addr="b72601947182b0e60029932e7f2f43f2", 0xd, 0x6, 0x4}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, [0xffffffff, 0xffffff00, 0xffffffff, 0xffffffff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 'gre0\x00', 'dummy0\x00', {0xff}, {0xff}, 0x7d, 0x7fffffff, 0x6, 0x4}, 0x0, 0xc8, 0xf0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x11}}}, {{@uncond, 0x0, 0xf0, 0x118, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x2}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @broadcast}, [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], [0xff, 0xff, 0xffffff00, 0xff000000], 'ip_vti0\x00', 'ip6gretap0\x00', {}, {}, 0x0, 0x10001, 0x2, 0x4}, 0x0, 0x118, 0x158, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x69, 0x0, 0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x7f, 0x8, "8fa7ac9fb4ccf1fa5f2ad799e2781c928f3a1c9e6e96b0828202ef3561e7"}}}, {{@ipv6={@ipv4={[], [], @empty}, @mcast2, [0x0, 0xff, 0xff, 0xff], [0xffffff00, 0xff0000ff, 0xffffff00, 0xffffffff], 'netdevsim0\x00', 'tunl0\x00', {0xff}, {0xff}, 0xaf, 0x80, 0x4, 0x1}, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x796389cdf37eb829}}, @common=@mh={0x28, 'mh\x00', 0x0, {0x2, 0xfffffffffffffff9, 0x1}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast2, @ipv6=@remote, 0x1e, 0x12, 0x10000}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x728) 21:00:49 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000f04a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b0") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400060032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000021001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 411.765417][T22405] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400070032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:49 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) [ 411.827183][T22412] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:50 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x0, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000022001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x80000, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 411.991120][T22423] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=22423 comm=syz-executor.5 21:00:50 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000011001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x0, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:50 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000a0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000024001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 412.094947][T22431] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:00:50 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000040)) [ 412.190775][T22440] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:00:50 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000c0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000012001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000025001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:50 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x0, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:50 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000e0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000013001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000026001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:50 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000f0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000014001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:50 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:50 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000028001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000015001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400100032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:51 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 21:00:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000029001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000016001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400480032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 21:00:51 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24004c0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:51 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 21:00:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400600032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400680032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 21:00:51 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:00:51 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24006c0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:51 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) 21:00:52 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:00:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) 21:00:52 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400740032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000030001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) 21:00:52 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24007a0032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) 21:00:52 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400e00032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000020001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:52 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 21:00:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:52 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:52 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400f00032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000021001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000332001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000022001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000034001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 415.009312][ C1] net_ratelimit: 10 callbacks suppressed [ 415.009319][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 415.020807][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:53 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 21:00:53 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000532001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:53 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000024001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:53 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:53 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000025001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:53 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000632001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x5}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:53 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000026001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 416.129378][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 416.135305][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:00:54 executing program 3: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 21:00:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000042001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:54 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400a50632001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x5}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:54 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000028001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:54 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:54 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000732001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000043001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:54 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000029001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x5}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:54 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x0, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:54 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000a32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 416.929379][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 416.935230][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 417.089442][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 417.095290][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:00:55 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:55 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000048001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x0, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:55 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000c32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 21:00:55 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000e32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000049001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:55 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x0, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20400040c2, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x1c8) sendfile(r1, r2, 0x0, 0x10000) 21:00:55 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000f32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:56 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x401c7012, &(0x7f0000000000)={0x80000000000001e}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000025c0)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 21:00:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400002032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:56 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000030001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400003f32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) [ 418.165252][T22783] __nla_parse: 10 callbacks suppressed [ 418.165262][T22783] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:00:56 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f000000bc00)=ANY=[@ANYRES64=0x0], 0xfffffd98) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x29000, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:00:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:56 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000050001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400004832001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x0, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000051001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 418.498704][T22808] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:00:56 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400004c32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x0, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 418.710967][T22822] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:00:56 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000034001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:57 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f000000bc00)=ANY=[@ANYRES64=0x0], 0xfffffd98) unlink(&(0x7f00000000c0)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000080)='./file0\x00', 0x0, 0x29000, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 21:00:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400655832001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000067001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x0, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:57 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:57 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 419.217533][T22846] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=22846 comm=syz-executor.0 21:00:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005200060014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400006032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:57 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:57 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:57 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0x0) 21:00:57 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400586532001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:57 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000042001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052000b0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:00:57 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400006832001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:58 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000043001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052021f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x0, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) [ 420.154923][T22900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=594 sclass=netlink_route_socket pig=22900 comm=syz-executor.0 21:00:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:58 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x2000001) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000100)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 21:00:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400006c32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000048001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052031f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400007432001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000049001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x0, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) [ 420.445662][T22921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=850 sclass=netlink_route_socket pig=22921 comm=syz-executor.0 21:00:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052041f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 3: 21:00:58 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000024a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400007a32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:58 executing program 3: [ 420.690968][T22939] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1106 sclass=netlink_route_socket pig=22939 comm=syz-executor.0 21:00:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052051f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:00:58 executing program 3: 21:00:58 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400008132001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x0, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:59 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000034a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 420.880369][T22952] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1362 sclass=netlink_route_socket pig=22952 comm=syz-executor.0 21:00:59 executing program 3: 21:00:59 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000044a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052061f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240006a532001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 21:00:59 executing program 3: 21:00:59 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:59 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000064a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 421.175879][T22977] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1618 sclass=netlink_route_socket pig=22977 comm=syz-executor.0 21:00:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 21:00:59 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000e032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052081f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 21:00:59 executing program 3: 21:00:59 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000a4a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 421.374783][T22992] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2130 sclass=netlink_route_socket pig=22992 comm=syz-executor.0 21:00:59 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000f032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 3: 21:00:59 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:59 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 1: 21:00:59 executing program 3: 21:00:59 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000c4a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052091f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 3: 21:00:59 executing program 1: [ 421.722013][T23019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pig=23019 comm=syz-executor.4 [ 421.746823][T23022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2386 sclass=netlink_route_socket pig=23022 comm=syz-executor.0 21:00:59 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:00:59 executing program 3: 21:00:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000000520a1f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:00:59 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000e4a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 1: 21:01:00 executing program 3: [ 421.928517][T23037] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=23037 comm=syz-executor.4 21:01:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000000520b1f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000f4a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000011001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 1: 21:01:00 executing program 3: 21:01:00 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, 0x0, 0x0, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) [ 422.143733][T23048] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000000520c1f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000104a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 3: 21:01:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000012001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 1: 21:01:00 executing program 3: 21:01:00 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, 0x0, 0x0, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:00 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000604a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 422.346283][T23069] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000000520e1f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 3: 21:01:00 executing program 1: 21:01:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000013001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 3: 21:01:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000014001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="24000000520f1f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 422.548315][T23087] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:00 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000e04a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 1: 21:01:00 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, 0x0, 0x0, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) [ 422.654074][T23093] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:00 executing program 1: 21:01:00 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000015001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052101f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000067001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:00 executing program 3: 21:01:01 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:01 executing program 1: [ 422.881547][T23109] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:01 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000016001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052111f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 3: 21:01:01 executing program 1: 21:01:01 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000010001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052121f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 3: 21:01:01 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 423.335109][T23138] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:01:01 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:01 executing program 1: 21:01:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052131f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 3: 21:01:01 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000011001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 3: [ 423.607274][T23158] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:01:01 executing program 1: 21:01:01 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052601f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:01 executing program 3: 21:01:01 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000012001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 423.888503][T23174] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:01:02 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:02 executing program 1: 21:01:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052e01f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:02 executing program 3: 21:01:02 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000013001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:02 executing program 3: 21:01:02 executing program 1: 21:01:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005200200014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 424.249655][T23189] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 424.305175][T23189] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:01:02 executing program 3: 21:01:02 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000014001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 424.525659][T23208] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 21:01:02 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, 0x0, 0x0) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:02 executing program 1: 21:01:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005200220014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000020001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:02 executing program 3: 21:01:02 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000015001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005200250014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:02 executing program 1: [ 424.791652][T23217] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 21:01:02 executing program 3: 21:01:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000021001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000016001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005200350014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:03 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, 0x0, 0x0) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:03 executing program 3: 21:01:03 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) r0 = dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r1 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r1, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) syslog(0x1, &(0x7f0000000280)=""/14, 0xe) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000004c0)=ANY=[]) 21:01:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000022001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005200060014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 425.328663][ T26] audit: type=1804 audit(1554843663.404:161): pid=23245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/654/bus" dev="sda1" ino=17265 res=1 21:01:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), &(0x7f00000003c0)=0x4) 21:01:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000024001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052000b0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000025001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 425.654277][ T26] audit: type=1804 audit(1554843663.734:162): pid=23267 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/654/bus" dev="sda1" ino=17265 res=1 21:01:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 425.707530][ T26] audit: type=1804 audit(1554843663.774:163): pid=23245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/654/bus" dev="sda1" ino=17265 res=1 [ 425.792007][ T26] audit: type=1804 audit(1554843663.774:164): pid=23245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/654/bus" dev="sda1" ino=17265 res=1 21:01:03 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, 0x0, 0x0) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:03 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) r0 = dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r1 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r1, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) syslog(0x1, &(0x7f0000000280)=""/14, 0xe) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000004c0)=ANY=[]) 21:01:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005200220014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:03 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, 0x0, 0x0) 21:01:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 425.863692][ T26] audit: type=1804 audit(1554843663.784:165): pid=23245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/654/bus" dev="sda1" ino=17265 res=1 21:01:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000026001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:04 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 425.939441][ T26] audit: type=1804 audit(1554843663.834:166): pid=23264 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/654/bus" dev="sda1" ino=17265 res=1 [ 426.042326][ T26] audit: type=1804 audit(1554843663.994:167): pid=23278 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/655/bus" dev="sda1" ino=16753 res=1 21:01:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005200250014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000028001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 426.110746][ T26] audit: type=1804 audit(1554843664.094:168): pid=23281 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/655/bus" dev="sda1" ino=16753 res=1 21:01:04 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) r0 = dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r1 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r1, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) syslog(0x1, &(0x7f0000000280)=""/14, 0xe) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000004c0)=ANY=[]) 21:01:04 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, 0x0) 21:01:04 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 426.416805][ T26] audit: type=1804 audit(1554843664.494:169): pid=23307 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/656/bus" dev="sda1" ino=17521 res=1 [ 426.634133][ T26] audit: type=1804 audit(1554843664.714:170): pid=23315 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/656/bus" dev="sda1" ino=17521 res=1 21:01:04 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000029001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000005200350014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:04 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000021001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:04 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) connect$unix(r0, 0x0, 0x0) 21:01:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000022001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0214f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000024001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) r0 = dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r1 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r1, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) syslog(0x1, &(0x7f0000000280)=""/14, 0xe) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000004c0)=ANY=[]) 21:01:05 executing program 3: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000025001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0314f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000026001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0414f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000028001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0514f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:06 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) syslog(0x1, &(0x7f0000000280)=""/14, 0xe) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x2) 21:01:06 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:06 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000029001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:06 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000030001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:06 executing program 3: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0614f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:06 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 428.476824][T23399] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:06 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0814f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:06 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) syslog(0x1, &(0x7f0000000280)=""/14, 0xe) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 428.616914][T23408] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:06 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000232001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 428.849520][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 428.849658][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 428.855385][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 428.861507][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:01:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0914f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:07 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:07 executing program 3 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:07 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) syslog(0x1, &(0x7f0000000280)=""/14, 0xe) 21:01:07 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000332001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:07 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0a14f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:07 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) [ 429.495451][T23443] FAULT_INJECTION: forcing a failure. [ 429.495451][T23443] name failslab, interval 1, probability 0, space 0, times 0 [ 429.522637][T23443] CPU: 0 PID: 23443 Comm: syz-executor.3 Not tainted 5.1.0-rc4+ #60 [ 429.530772][T23443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.542106][T23443] Call Trace: [ 429.545535][T23443] dump_stack+0x172/0x1f0 [ 429.550675][T23443] should_fail.cold+0xa/0x15 [ 429.555551][T23443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 429.562945][T23443] ? ___might_sleep+0x163/0x280 [ 429.568251][T23443] __should_failslab+0x121/0x190 [ 429.573568][T23443] should_failslab+0x9/0x14 [ 429.578085][T23443] kmem_cache_alloc_node_trace+0x270/0x720 [ 429.584784][T23443] __get_vm_area_node+0x12b/0x3a0 [ 429.590974][T23443] __vmalloc_node_range+0xd4/0x790 [ 429.598468][T23443] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 429.604132][T23443] ? find_held_lock+0x35/0x130 [ 429.609384][T23443] __vmalloc+0x44/0x50 [ 429.613577][T23443] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 429.619945][T23443] bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 429.627019][T23443] bpf_prog_alloc+0x31/0x230 [ 429.631707][T23443] ? ns_capable_common+0x93/0x100 [ 429.636756][T23443] bpf_prog_load+0x4fc/0x14a0 [ 429.641447][T23443] ? bpf_prog_new_fd+0x60/0x60 [ 429.646249][T23443] ? lock_downgrade+0x880/0x880 [ 429.651129][T23443] ? selinux_bpf+0xe7/0x130 [ 429.655654][T23443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.661920][T23443] ? security_bpf+0x91/0xc0 [ 429.666608][T23443] __do_sys_bpf+0xba2/0x3f60 [ 429.671388][T23443] ? bpf_prog_load+0x14a0/0x14a0 [ 429.676341][T23443] ? wait_for_completion+0x440/0x440 [ 429.681645][T23443] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 429.687903][T23443] ? fput_many+0x12c/0x1a0 [ 429.692514][T23443] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 429.697986][T23443] ? do_syscall_64+0x26/0x610 [ 429.702669][T23443] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.708869][T23443] ? do_syscall_64+0x26/0x610 [ 429.713558][T23443] __x64_sys_bpf+0x73/0xb0 [ 429.717985][T23443] do_syscall_64+0x103/0x610 [ 429.722633][T23443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.730026][T23443] RIP: 0033:0x4582b9 [ 429.734023][T23443] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 429.756519][T23443] RSP: 002b:00007f204f9fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 429.767377][T23443] RAX: ffffffffffffffda RBX: 00007f204f9fdc90 RCX: 00000000004582b9 [ 429.777395][T23443] RDX: 0000000000000048 RSI: 00000000200ba000 RDI: 0000000000000005 [ 429.785466][T23443] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 429.793538][T23443] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f204f9fe6d4 [ 429.801724][T23443] R13: 00000000004be54f R14: 00000000004cefa0 R15: 0000000000000003 21:01:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0b14f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 429.910298][T23443] syz-executor.3: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0-1 [ 429.987486][T23443] CPU: 1 PID: 23443 Comm: syz-executor.3 Not tainted 5.1.0-rc4+ #60 [ 429.995522][T23443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.005618][T23443] Call Trace: [ 430.008923][T23443] dump_stack+0x172/0x1f0 [ 430.013267][T23443] warn_alloc.cold+0x87/0x17f [ 430.017965][T23443] ? zone_watermark_ok_safe+0x260/0x260 [ 430.023527][T23443] ? rcu_read_lock_sched_held+0x110/0x130 [ 430.029292][T23443] ? __get_vm_area_node+0x2df/0x3a0 21:01:08 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0c14f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:08 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) syslog(0x1, &(0x7f0000000280)=""/14, 0xe) 21:01:08 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000432001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 430.034514][T23443] __vmalloc_node_range+0x48a/0x790 [ 430.039728][T23443] ? find_held_lock+0x35/0x130 [ 430.044514][T23443] __vmalloc+0x44/0x50 [ 430.048605][T23443] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 430.054526][T23443] bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 430.060013][T23443] bpf_prog_alloc+0x31/0x230 [ 430.066816][T23443] ? ns_capable_common+0x93/0x100 [ 430.073866][T23443] bpf_prog_load+0x4fc/0x14a0 [ 430.078555][T23443] ? bpf_prog_new_fd+0x60/0x60 [ 430.083353][T23443] ? lock_downgrade+0x880/0x880 [ 430.088244][T23443] ? selinux_bpf+0xe7/0x130 [ 430.094783][T23443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.103565][T23443] ? security_bpf+0x91/0xc0 [ 430.108468][T23443] __do_sys_bpf+0xba2/0x3f60 [ 430.113079][T23443] ? bpf_prog_load+0x14a0/0x14a0 [ 430.118036][T23443] ? wait_for_completion+0x440/0x440 [ 430.123364][T23443] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 430.130860][T23443] ? fput_many+0x12c/0x1a0 [ 430.135616][T23443] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 430.141797][T23443] ? do_syscall_64+0x26/0x610 [ 430.146486][T23443] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.152561][T23443] ? do_syscall_64+0x26/0x610 [ 430.157252][T23443] __x64_sys_bpf+0x73/0xb0 [ 430.161679][T23443] do_syscall_64+0x103/0x610 [ 430.166380][T23443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.172718][T23443] RIP: 0033:0x4582b9 [ 430.176800][T23443] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.197023][T23443] RSP: 002b:00007f204f9fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 430.205447][T23443] RAX: ffffffffffffffda RBX: 00007f204f9fdc90 RCX: 00000000004582b9 [ 430.214114][T23443] RDX: 0000000000000048 RSI: 00000000200ba000 RDI: 0000000000000005 [ 430.222285][T23443] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 430.230269][T23443] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f204f9fe6d4 [ 430.240175][T23443] R13: 00000000004be54f R14: 00000000004cefa0 R15: 0000000000000003 [ 430.354632][ T26] kauditd_printk_skb: 9 callbacks suppressed [ 430.354649][ T26] audit: type=1804 audit(1554843668.434:180): pid=23465 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/661/bus" dev="sda1" ino=17009 res=1 21:01:08 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000030001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 430.592995][T23469] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 430.646672][T23443] Mem-Info: [ 430.652633][T23443] active_anon:109749 inactive_anon:194 isolated_anon:0 [ 430.652633][T23443] active_file:8288 inactive_file:38351 isolated_file:0 [ 430.652633][T23443] unevictable:0 dirty:219 writeback:0 unstable:0 [ 430.652633][T23443] slab_reclaimable:15414 slab_unreclaimable:107982 [ 430.652633][T23443] mapped:58813 shmem:253 pagetables:1169 bounce:0 [ 430.652633][T23443] free:1251861 free_pcp:437 free_cma:0 [ 430.699488][T23443] Node 0 active_anon:438996kB inactive_anon:776kB active_file:33020kB inactive_file:153404kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235252kB dirty:876kB writeback:0kB shmem:1012kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 366592kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 430.736980][T23443] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 430.772106][T23443] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 430.805671][T23443] lowmem_reserve[]: 0 2553 2555 2555 [ 430.812042][T23443] Node 0 DMA32 free:1206352kB min:36232kB low:45288kB high:54344kB active_anon:438996kB inactive_anon:776kB active_file:33020kB inactive_file:153404kB unevictable:0kB writepending:876kB present:3129332kB managed:2617996kB mlocked:0kB kernel_stack:7648kB pagetables:4676kB bounce:0kB free_pcp:1620kB local_pcp:1260kB free_cma:0kB [ 430.854111][T23443] lowmem_reserve[]: 0 0 2 2 [ 430.862901][T23443] Node 0 Normal free:8kB min:28kB low:32kB high:36kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 430.919643][T23443] lowmem_reserve[]: 0 0 0 0 [ 430.924217][T23443] Node 1 Normal free:3785176kB min:53624kB low:67028kB high:80432kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 430.958925][T23443] lowmem_reserve[]: 0 0 0 0 [ 430.963816][T23443] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 430.984866][T23443] Node 0 DMA32: 6905*4kB (UM) 367*8kB (UME) 977*16kB (UME) 1067*32kB (UME) 463*64kB (UME) 67*128kB (UM) 19*256kB (UME) 13*512kB (UME) 5*1024kB (UE) 3*2048kB (UM) 261*4096kB (M) = 1210380kB [ 431.004184][T23443] Node 0 Normal: 0*4kB 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 431.016354][T23443] Node 1 Normal: 68*4kB (UE) 247*8kB (UME) 241*16kB (UE) 56*32kB (UME) 20*64kB (UME) 12*128kB (UE) 10*256kB (UME) 3*512kB (UM) 4*1024kB (UME) 1*2048kB (U) 919*4096kB (M) = 3785176kB [ 431.034731][T23443] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 431.049018][T23443] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 431.058724][T23443] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 21:01:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000532001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0e14f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:09 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:09 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:09 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) syslog(0x1, &(0x7f0000000280)=""/14, 0xe) [ 431.068511][T23443] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 431.077953][T23443] 46900 total pagecache pages [ 431.083751][T23443] 0 pages in swap cache [ 431.088620][T23443] Swap cache stats: add 0, delete 0, find 0/0 [ 431.094757][T23443] Free swap = 0kB [ 431.098505][T23443] Total swap = 0kB [ 431.102399][T23443] 1965979 pages RAM [ 431.106200][T23443] 0 pages HighMem/MovableOnly [ 431.111236][T23443] 339406 pages reserved [ 431.115958][T23443] 0 pages cma reserved [ 431.181811][T23478] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 431.217485][ T26] audit: type=1804 audit(1554843669.294:181): pid=23482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/662/bus" dev="sda1" ino=17889 res=1 21:01:09 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000632001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0f14f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 431.489351][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 431.496264][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:01:09 executing program 3: bpf$PROG_LOAD(0x2, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 431.508388][ T26] audit: type=1804 audit(1554843669.564:182): pid=23495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/662/bus" dev="sda1" ino=17889 res=1 21:01:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000732001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 431.599875][T23492] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 21:01:09 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f1014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:09 executing program 3: bpf$PROG_LOAD(0x3, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:09 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000034001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000a32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 431.839326][ T26] audit: type=1804 audit(1554843669.904:183): pid=23506 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/663/bus" dev="sda1" ino=16577 res=1 [ 431.889963][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 431.896848][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 432.121772][ T26] audit: type=1804 audit(1554843670.204:184): pid=23519 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/663/bus" dev="sda1" ino=16577 res=1 21:01:10 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f1114f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:10 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000c32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:10 executing program 3: bpf$PROG_LOAD(0x4, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:10 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:10 executing program 3: bpf$PROG_LOAD(0x6, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:10 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f1214f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 432.318992][ T26] audit: type=1804 audit(1554843670.394:185): pid=23529 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/664/bus" dev="sda1" ino=18081 res=1 21:01:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000e32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 432.459421][ T26] audit: type=1804 audit(1554843670.534:186): pid=23541 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/664/bus" dev="sda1" ino=18081 res=1 21:01:10 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000042001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f1314f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:10 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:10 executing program 3: bpf$PROG_LOAD(0x7, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:10 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) 21:01:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000f32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:10 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000043001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f6014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:11 executing program 3: bpf$PROG_LOAD(0x8, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001fe014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 433.019138][ T26] audit: type=1804 audit(1554843671.094:187): pid=23570 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/665/bus" dev="sda1" ino=16673 res=1 21:01:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400001032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000048001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0035f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:11 executing program 3: bpf$PROG_LOAD(0x9, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 433.569374][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 433.575535][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:01:11 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400004832001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000049001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0052f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:11 executing program 3: bpf$PROG_LOAD(0xa, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:11 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) [ 433.959109][ T26] audit: type=1804 audit(1554843672.034:188): pid=23606 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/666/bus" dev="sda1" ino=18097 res=1 21:01:12 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000067001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:12 executing program 3: bpf$PROG_LOAD(0xb, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f00c0f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400004c32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:12 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400006032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0035f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:12 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a00060014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:12 executing program 3: bpf$PROG_LOAD(0xc, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:12 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400006832001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:12 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a000b0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:12 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) io_destroy(0x0) 21:01:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0052f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:12 executing program 3: bpf$PROG_LOAD(0xd, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 434.866612][ T26] audit: type=1804 audit(1554843672.944:189): pid=23645 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/667/bus" dev="sda1" ino=18085 res=1 21:01:13 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a021f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:13 executing program 3: bpf$PROG_LOAD(0xe, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 435.033186][T23657] selinux_nlmsg_perm: 13 callbacks suppressed [ 435.033692][T23657] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=586 sclass=netlink_route_socket pig=23657 comm=syz-executor.5 21:01:13 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x0, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f00c0f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:13 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a031f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400006c32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:13 executing program 3: bpf$PROG_LOAD(0xf, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 435.405712][T23670] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=842 sclass=netlink_route_socket pig=23670 comm=syz-executor.5 21:01:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f410002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400007432001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:13 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:13 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a041f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 435.659575][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 435.666642][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:01:13 executing program 3: bpf$PROG_LOAD(0x10, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f435002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 435.831587][T23685] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1098 sclass=netlink_route_socket pig=23685 comm=syz-executor.5 [ 435.917277][ T26] audit: type=1804 audit(1554843673.994:190): pid=23688 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/668/bus" dev="sda1" ino=18086 res=1 21:01:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400007a32001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:14 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x0, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:14 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a061f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:14 executing program 3: bpf$PROG_LOAD(0x11, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:14 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) [ 436.176672][ T26] audit: type=1804 audit(1554843674.134:191): pid=23691 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/668/bus" dev="sda1" ino=18086 res=1 21:01:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000e032001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407022c04000a00071008000100ffffffff0800000000000000", 0x24) [ 436.237875][T23702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1610 sclass=netlink_route_socket pig=23702 comm=syz-executor.5 21:01:14 executing program 3: bpf$PROG_LOAD(0x12, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 436.343992][T23702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1610 sclass=netlink_route_socket pig=23702 comm=syz-executor.5 21:01:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000067001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 436.446062][ T26] audit: type=1804 audit(1554843674.364:192): pid=23707 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/669/bus" dev="sda1" ino=16737 res=1 21:01:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407032c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:14 executing program 3: bpf$PROG_LOAD(0x13, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:14 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a0a1f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 436.577297][ T26] audit: type=1804 audit(1554843674.604:193): pid=23719 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/669/bus" dev="sda1" ino=16737 res=1 21:01:14 executing program 3: bpf$PROG_LOAD(0x14, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 436.665043][T23727] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=23727 comm=syz-executor.4 [ 436.703934][T23732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2634 sclass=netlink_route_socket pig=23732 comm=syz-executor.5 21:01:15 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x0, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:15 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:15 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a0c1f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407042c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:15 executing program 3: bpf$PROG_LOAD(0x15, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 437.023498][ T26] audit: type=1804 audit(1554843675.104:194): pid=23741 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/670/bus" dev="sda1" ino=18117 res=1 [ 437.077365][T23750] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3146 sclass=netlink_route_socket pig=23750 comm=syz-executor.5 21:01:15 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a0e1f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407052c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:15 executing program 3: bpf$PROG_LOAD(0x25, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000000f001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 437.253944][ T26] audit: type=1804 audit(1554843675.334:195): pid=23757 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/670/bus" dev="sda1" ino=18117 res=1 [ 437.322515][T23758] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3658 sclass=netlink_route_socket pig=23758 comm=syz-executor.5 21:01:15 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407062c04000a00071008000100ffffffff0800000000000000", 0x24) [ 437.435842][T23758] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3658 sclass=netlink_route_socket pig=23758 comm=syz-executor.5 [ 437.575944][ T26] audit: type=1804 audit(1554843675.654:196): pid=23771 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/671/bus" dev="sda1" ino=18107 res=1 21:01:15 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x0, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000010001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407082c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:15 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a0f1f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 437.799137][T23782] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000011001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:16 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a101f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 437.864176][ T26] audit: type=1804 audit(1554843675.944:197): pid=23789 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/671/bus" dev="sda1" ino=18107 res=1 21:01:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:16 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:16 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a601f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407092c04000a00071008000100ffffffff0800000000000000", 0x24) [ 438.075533][T23798] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000012001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 438.129307][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 438.135584][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 438.198554][ T26] audit: type=1804 audit(1554843676.274:198): pid=23806 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/672/bus" dev="sda1" ino=18100 res=1 [ 438.323431][T23811] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 438.341057][ T26] audit: type=1804 audit(1554843676.414:199): pid=23812 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/672/bus" dev="sda1" ino=18100 res=1 21:01:16 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x0, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f4070a2c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:16 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004ae01f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:16 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000013001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 438.536028][T23826] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f4070b2c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:16 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a00200014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000014001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f4070c2c04000a00071008000100ffffffff0800000000000000", 0x24) [ 439.081464][T23841] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:17 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a00220014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 439.169326][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 439.175282][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 439.249865][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 439.256141][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 439.259300][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 439.267907][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:01:17 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x0, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x12, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000015001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f4070e2c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:17 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a00250014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:17 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) [ 439.492587][T23859] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000016001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:17 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a00350014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:17 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xc0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000018001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f4070f2c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:17 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:17 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:17 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a00060014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x2, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407102c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000019001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:18 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a000b0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x5, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407112c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:18 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:18 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:18 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a00220014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x8, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407122c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:19 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0xa, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:19 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a00250014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407132c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0xb, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:19 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) [ 441.249792][ C0] net_ratelimit: 2 callbacks suppressed [ 441.249820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 441.261494][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 441.329308][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 441.329670][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 441.335185][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 441.341582][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:01:19 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x82) 21:01:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x14, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000021001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:19 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:19 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a00350014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407602c04000a00071008000100ffffffff0800000000000000", 0x24) [ 441.491669][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 441.491685][ T26] audit: type=1804 audit(1554843679.574:206): pid=23965 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/679/bus" dev="sda1" ino=16801 res=1 21:01:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407e02c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:19 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0214f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0xc0, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000022001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407005204000a00071008000100ffffffff0800000000000000", 0x24) [ 441.656765][ T26] audit: type=1804 audit(1554843679.734:207): pid=23970 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/679/bus" dev="sda1" ino=16801 res=1 21:01:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000024001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 441.889349][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 441.895521][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:01:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000025001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:20 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:20 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(0x0, 0x6, 0x82) 21:01:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f40700c004000a00071008000100ffffffff0800000000000000", 0x24) 21:01:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x104, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:20 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0314f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 442.093568][ T26] audit: type=1804 audit(1554843680.174:208): pid=24000 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/680/bus" dev="sda1" ino=16961 res=1 21:01:20 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0414f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x500, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000026001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407005204000a00071008000100ffffffff0800000000000000", 0x24) 21:01:20 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:20 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0614f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 442.413411][ T26] audit: type=1804 audit(1554843680.474:209): pid=24015 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/680/bus" dev="sda1" ino=16961 res=1 21:01:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x2400, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000028001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 442.683205][ T26] audit: type=1804 audit(1554843680.764:210): pid=24029 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/681/bus" dev="sda1" ino=16961 res=1 [ 442.975893][ T26] audit: type=1804 audit(1554843681.054:211): pid=24033 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/681/bus" dev="sda1" ino=16961 res=1 21:01:21 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(0x0, 0x6, 0x82) 21:01:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f40700c004000a00071008000100ffffffff0800000000000000", 0x24) 21:01:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0a14f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:21 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000029001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4000, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:21 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0c14f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 443.204121][ T26] audit: type=1804 audit(1554843681.284:212): pid=24047 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/682/bus" dev="sda1" ino=17185 res=1 21:01:21 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002a001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c35000a00071008000100ffffffff0800000000000000", 0x24) [ 443.409320][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 443.409348][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 443.423597][ T26] audit: type=1804 audit(1554843681.504:213): pid=24052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/682/bus" dev="sda1" ino=17185 res=1 21:01:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4001, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0e14f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:21 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002c001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:21 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(0x0, 0x6, 0x82) 21:01:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04020a00071008000100ffffffff0800000000000000", 0x24) 21:01:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4002, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:21 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0f14f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4003, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:22 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002d001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04030a00071008000100ffffffff0800000000000000", 0x24) 21:01:22 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f1014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002e001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 444.260182][ T26] audit: type=1804 audit(1554843682.344:214): pid=24090 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/683/bus" dev="sda1" ino=16817 res=1 21:01:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x8002, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04040a00071008000100ffffffff0800000000000000", 0x24) [ 444.760225][ T26] audit: type=1804 audit(1554843682.414:215): pid=24093 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/683/bus" dev="sda1" ino=16817 res=1 21:01:22 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x82) 21:01:22 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f6014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x8003, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000030001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04050a00071008000100ffffffff0800000000000000", 0x24) 21:01:23 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0xc000, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 445.018590][T24113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04060a00071008000100ffffffff0800000000000000", 0x24) 21:01:23 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001fe014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:23 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0035f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04080a00071008000100ffffffff0800000000000000", 0x24) 21:01:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000031001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 445.505927][T24138] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 21:01:23 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x82) 21:01:23 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f004af9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0xc001, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04090a00071008000100ffffffff0800000000000000", 0x24) 21:01:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000067001f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 445.926638][T24152] selinux_nlmsg_perm: 5 callbacks suppressed [ 445.926654][T24152] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=24152 comm=syz-executor.4 21:01:24 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0xc002, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:24 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0035f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c040a0a00071008000100ffffffff0800000000000000", 0x24) 21:01:24 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f004af9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c040b0a00071008000100ffffffff0800000000000000", 0x24) 21:01:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0xc003, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:24 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) 21:01:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000003200060014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:24 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:24 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f435002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c040c0a00071008000100ffffffff0800000000000000", 0x24) 21:01:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x4, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c040e0a00071008000100ffffffff0800000000000000", 0x24) [ 446.557695][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 446.557711][ T26] audit: type=1804 audit(1554843684.634:220): pid=24188 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/686/bus" dev="sda1" ino=17681 res=1 21:01:24 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407022c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x5, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032000b0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:24 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:24 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x7, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 446.778358][ T26] audit: type=1804 audit(1554843684.684:221): pid=24188 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/686/bus" dev="sda1" ino=17681 res=1 [ 446.800991][T24203] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 446.846472][ T26] audit: type=1804 audit(1554843684.924:222): pid=24204 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/687/bus" dev="sda1" ino=17265 res=1 [ 446.973010][ T26] audit: type=1804 audit(1554843684.934:223): pid=24204 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/687/bus" dev="sda1" ino=17265 res=1 21:01:25 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) 21:01:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407032c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:25 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c040f0a00071008000100ffffffff0800000000000000", 0x24) 21:01:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032021f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0xc, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 447.220535][ T26] audit: type=1804 audit(1554843685.294:224): pid=24218 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/688/bus" dev="sda1" ino=17697 res=1 [ 447.257899][T24220] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=562 sclass=netlink_route_socket pig=24220 comm=syz-executor.4 21:01:25 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0xf, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407042c04000a00071008000100ffffffff0800000000000000", 0x24) [ 447.321745][ T26] audit: type=1804 audit(1554843685.334:225): pid=24218 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/688/bus" dev="sda1" ino=17697 res=1 21:01:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04100a00071008000100ffffffff0800000000000000", 0x24) 21:01:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032031f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f407062c04000a00071008000100ffffffff0800000000000000", 0x24) [ 447.500618][ T26] audit: type=1804 audit(1554843685.574:226): pid=24234 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/689/bus" dev="sda1" ino=17441 res=1 [ 447.551704][T24239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=818 sclass=netlink_route_socket pig=24239 comm=syz-executor.4 [ 447.621847][ T26] audit: type=1804 audit(1554843685.614:227): pid=24234 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/689/bus" dev="sda1" ino=17441 res=1 21:01:25 executing program 2: setuid(0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @dev, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) 21:01:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04110a00071008000100ffffffff0800000000000000", 0x24) 21:01:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x14, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:25 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032041f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:25 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f4070a2c04000a00071008000100ffffffff0800000000000000", 0x24) [ 447.753622][T24253] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1074 sclass=netlink_route_socket pig=24253 comm=syz-executor.4 21:01:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x15, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 447.776216][ T26] audit: type=1804 audit(1554843685.854:228): pid=24251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/690/bus" dev="sda1" ino=17729 res=1 21:01:25 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032051f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) [ 447.842482][ T26] audit: type=1804 audit(1554843685.864:229): pid=24251 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir204214669/syzkaller.OJw0rx/690/bus" dev="sda1" ino=17729 res=1 21:01:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04120a00071008000100ffffffff0800000000000000", 0x24) 21:01:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f4070c2c04000a00071008000100ffffffff0800000000000000", 0x24) [ 448.020612][T24268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1330 sclass=netlink_route_socket pig=24268 comm=syz-executor.4 [ 448.139678][ C0] net_ratelimit: 6 callbacks suppressed [ 448.139720][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 448.151895][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:01:26 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x16, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 448.529879][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 448.536232][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:01:27 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000004a001f0014f9f4070e2c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000052001f0014f9f407002c04130a00071008000100ffffffff0800000000000000", 0x24) 21:01:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2400000032061f0014f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 21:01:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x17, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) 21:01:27 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000580)={0x0, 0xfb, 0xe7, 0x4, 0x10000, "15a619f9c79290e86e6ebefde9d3d101", "5564b32c5a6811b9d9dfac8cf3472a2a1fc273f7cd30273b2555f9d6b8e18146eedc8205d60e3d014e50f11a3ebdd6d3ca3631d353fc23b97ab1bc92f6e3d0c12ec50a1524217eae620d824dbd0f5972fb9f91a10a985c1a29c88584e573d5b9e589d49d5dbfe98bac8d047fa1179d372836fd87a7294beefd08959176c7d6582408b73cac2fbf48d10b3e8c4412c2a0f50a68c9f03abc900481fd84f20cbe460c9bf430cc7c28792a3cf1a4273f6e0fca0bc7313609ccf7b39031d50bf35fa127fb94f7d7a98a9757ce2031f56c6bbad74c"}, 0xe7, 0x2) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:27 executing program 2: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) fstat(0xffffffffffffff9c, 0x0) setgid(0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) dup(0xffffffffffffffff) creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000003c0)='./bus\x00', 0xd1) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) syz_genetlink_get_family_id$tipc(0x0) creat(&(0x7f0000000540)='./bus\x00', 0x0) 21:01:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{0x1c, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x50}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x48) [ 449.088832][T24290] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1586 sclass=netlink_route_socket pig=24290 comm=syz-executor.4 [ 554.209222][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 554.216241][ C1] rcu: (detected by 1, t=10502 jiffies, g=54461, q=31) [ 554.223195][ C1] rcu: All QSes seen, last rcu_preempt kthread activity 10501 (4294992529-4294982028), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 554.236551][ C1] syz-executor.1 R running task 26808 24292 8096 0x00000000 [ 554.244458][ C1] Call Trace: [ 554.247738][ C1] [ 554.250685][ C1] sched_show_task.cold+0x291/0x2fc [ 554.255910][ C1] rcu_sched_clock_irq.cold+0xa10/0xa4a [ 554.261497][ C1] update_process_times+0x32/0x80 [ 554.266530][ C1] tick_sched_handle+0xa2/0x190 [ 554.272957][ C1] tick_sched_timer+0x47/0x130 [ 554.277843][ C1] __hrtimer_run_queues+0x33e/0xde0 [ 554.283057][ C1] ? tick_sched_do_timer+0x1b0/0x1b0 [ 554.288360][ C1] ? hrtimer_start_range_ns+0xc80/0xc80 [ 554.293923][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 554.299664][ C1] ? ktime_get_update_offsets_now+0x2d9/0x440 [ 554.305758][ C1] hrtimer_interrupt+0x314/0x770 [ 554.310738][ C1] smp_apic_timer_interrupt+0x120/0x570 [ 554.316301][ C1] apic_timer_interrupt+0xf/0x20 [ 554.321350][ C1] [ 554.324295][ C1] RIP: 0010:avc_has_perm+0x0/0x610 [ 554.329411][ C1] Code: ba fe e9 5d fd ff ff e8 de c9 ba fe e9 df fb ff ff 48 89 df e8 d1 c9 ba fe e9 22 fc ff ff e8 a7 67 55 fe 0f 1f 80 00 00 00 00 <55> 48 89 e5 41 57 48 8d 85 f8 fe ff ff 41 56 48 c1 e8 03 41 55 41 [ 554.349020][ C1] RSP: 0018:ffff888055987680 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 554.357444][ C1] RAX: 0000000000000007 RBX: ffff888096d5af30 RCX: 0000000000000007 [ 554.365420][ C1] RDX: 0000000000000126 RSI: 00000000000000e0 RDI: ffffffff8a6a2780 [ 554.373392][ C1] RBP: ffff8880559876b8 R08: 0000000000000004 R09: ffff888055987710 [ 554.381363][ C1] R10: ffffed1015d25bc7 R11: ffff8880ae92de3b R12: 00000000000000e0 [ 554.389331][ C1] R13: 0000000000000004 R14: ffff888055987710 R15: 0000000000000000 [ 554.397416][ C1] ? inode_has_perm+0x1a8/0x230 [ 554.402271][ C1] file_has_perm+0x2ef/0x3a0 [ 554.406893][ C1] ? selinux_file_open+0x4e0/0x4e0 [ 554.412009][ C1] ? __might_sleep+0x95/0x190 [ 554.416694][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 554.422942][ C1] selinux_file_permission+0x3ee/0x570 [ 554.428668][ C1] security_file_permission+0x7e/0x380 [ 554.434138][ C1] rw_verify_area+0x110/0x360 [ 554.447952][ C1] do_iter_write+0x100/0x610 [ 554.452558][ C1] ? rcu_read_lock_sched_held+0x110/0x130 [ 554.458279][ C1] ? __kmalloc+0x5d5/0x740 [ 554.462700][ C1] vfs_iter_write+0x77/0xb0 [ 554.476345][ C1] iter_file_splice_write+0x662/0xbe0 [ 554.481721][ C1] ? atime_needs_update+0x5f0/0x5f0 [ 554.486934][ C1] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 554.492939][ C1] ? rw_verify_area+0x118/0x360 [ 554.497998][ C1] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 554.503988][ C1] direct_splice_actor+0x126/0x1a0 [ 554.509291][ C1] splice_direct_to_actor+0x369/0x970 [ 554.514675][ C1] ? generic_pipe_buf_nosteal+0x10/0x10 [ 554.520230][ C1] ? do_splice_to+0x190/0x190 [ 554.525091][ C1] ? rw_verify_area+0x118/0x360 [ 554.529953][ C1] do_splice_direct+0x1da/0x2a0 [ 554.534813][ C1] ? splice_direct_to_actor+0x970/0x970 [ 554.540365][ C1] ? rcu_read_lock_sched_held+0x110/0x130 [ 554.546092][ C1] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 554.551552][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 554.557811][ C1] ? __sb_start_write+0x1ac/0x360 [ 554.562844][ C1] do_sendfile+0x597/0xd00 [ 554.567279][ C1] ? do_compat_pwritev64+0x1c0/0x1c0 [ 554.572568][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 554.578817][ C1] ? put_timespec64+0xda/0x140 [ 554.583596][ C1] __x64_sys_sendfile64+0x1dd/0x220 [ 554.588804][ C1] ? __ia32_sys_sendfile+0x230/0x230 [ 554.594603][ C1] ? do_syscall_64+0x26/0x610 [ 554.599594][ C1] ? lockdep_hardirqs_on+0x418/0x5d0 [ 554.605976][ C1] ? trace_hardirqs_on+0x67/0x230 [ 554.612542][ C1] do_syscall_64+0x103/0x610 [ 554.617142][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.623045][ C1] RIP: 0033:0x4582b9 [ 554.626943][ C1] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 554.646548][ C1] RSP: 002b:00007fdbcc412c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 554.654980][ C1] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004582b9 [ 554.663048][ C1] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000003 [ 554.671019][ C1] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 554.678997][ C1] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007fdbcc4136d4 [ 554.687000][ C1] R13: 00000000004c5227 R14: 00000000004d9368 R15: 00000000ffffffff [ 554.695011][ C1] rcu: rcu_preempt kthread starved for 10548 jiffies! g54461 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 554.706191][ C1] rcu: RCU grace-period kthread stack dump: [ 554.712080][ C1] rcu_preempt R running task 28920 10 2 0x80000000 [ 554.720206][ C1] Call Trace: [ 554.723514][ C1] __schedule+0x817/0x1cc0 [ 554.727940][ C1] ? __sched_text_start+0x8/0x8 [ 554.732965][ C1] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 554.738775][ C1] ? lockdep_hardirqs_on+0x418/0x5d0 [ 554.744073][ C1] ? trace_hardirqs_on+0x67/0x230 [ 554.749105][ C1] schedule+0x92/0x180 [ 554.753207][ C1] schedule_timeout+0x4db/0xfd0 [ 554.758189][ C1] ? usleep_range+0x170/0x170 [ 554.763222][ C1] ? trace_hardirqs_on+0x67/0x230 [ 554.768387][ C1] ? kasan_check_read+0x11/0x20 [ 554.773436][ C1] ? __next_timer_interrupt+0x1a0/0x1a0 [ 554.778996][ C1] ? prepare_to_swait_exclusive+0x120/0x120 [ 554.784998][ C1] rcu_gp_kthread+0x962/0x17b0 [ 554.789953][ C1] ? kasan_check_write+0x14/0x20 [ 554.794913][ C1] ? wait_rcu_exp_gp+0x50/0x50 [ 554.799688][ C1] ? trace_hardirqs_on+0x67/0x230 [ 554.804815][ C1] ? kasan_check_read+0x11/0x20 [ 554.809860][ C1] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 554.815700][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 554.821962][ C1] ? __kthread_parkme+0xfb/0x1b0 [ 554.827622][ C1] kthread+0x357/0x430 [ 554.831704][ C1] ? wait_rcu_exp_gp+0x50/0x50 [ 554.836475][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 554.842723][ C1] ret_from_fork+0x3a/0x50