0x0, 0xffffffffffffff06) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x29d912f5e24f2f79}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(r1, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) [ 566.565956] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 566.736351] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:35:56 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r0, 0x0, 0x0, 0x0) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000000)=@default) syz_emit_ethernet(0x56, &(0x7f0000000180)={@random="c36501790383", @dev, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x20, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [0x29c, 0x58, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, [], @local, [{0x2, 0x1, "e6c035329c27"}]}}}}}}, 0x0) 03:35:56 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0xfffffffffffffffb, 0x10102) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xf17) unshare(0x40040400) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYRES16], 0x1}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000004c0)) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r2 = semget$private(0x0, 0x8, 0x0) semctl$GETZCNT(r2, 0x1, 0xf, &(0x7f0000000600)=""/4096) socket$inet6_sctp(0xa, 0x0, 0x84) creat(0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)) sendmsg$nl_netfilter(r3, &(0x7f00000014c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1020080c}, 0xc, &(0x7f0000001480)={&(0x7f0000000380)=ANY=[@ANYBLOB="16372f5e13f7591d6b8b000000000000"], 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) lsetxattr$security_capability(&(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000200)=@v3={0x3000000, [{0x9}, {0x101}]}, 0x18, 0x2) r4 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r4, 0x1, 0x0) pread64(r4, &(0x7f00000000c0)=""/59, 0x3b, 0x8) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 03:35:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:56 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @mss={0x2, 0x200}], 0x2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x403001, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f0000000000)=0x1) 03:35:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x48, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:56 executing program 1: write(0xffffffffffffffff, 0x0, 0x0) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0x10000000000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xa9be, 0x4}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0x0, 0x0) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x200000, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0x30f) setregid(r10, 0x0) write$P9_RGETATTR(r8, &(0x7f0000000040)={0xa0, 0x19, 0x2, {0x110, {0x8, 0x0, 0x6}, 0x94, 0x0, r10, 0x0, 0x566, 0xff, 0x7c0, 0x6, 0x2, 0x80, 0xf8e3, 0x6, 0x7, 0x8000, 0x8, 0x2, 0x8}}, 0xa0) r11 = syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r8, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1001090}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="010025bd7000fedbdf2501000000080001007063690014000200303030303a30000000100001006e657464657673696d000000100002006e657464657673696d300000"], 0x50}, 0x1, 0x0, 0x0, 0x8020100}, 0x10000001) sendmsg$DEVLINK_CMD_PORT_SET(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100800120}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x184, r11, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x4, 0x2}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0x4, 0x3}}]}, 0x184}, 0x1, 0x0, 0x0, 0x4048040}, 0x8012) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 568.807182] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:35:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 568.869966] net_ratelimit: 24 callbacks suppressed [ 568.869982] ICMPv6: NA: aa:aa:aa:aa:aa:00 advertised our address fe80::aa on syz_tun! 03:35:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4c, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:56 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @mss={0x2, 0x200}], 0x2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x403001, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f0000000000)=0x1) [ 568.981266] protocol 88fb is buggy, dev hsr_slave_0 [ 568.986444] protocol 88fb is buggy, dev hsr_slave_1 [ 568.991624] protocol 88fb is buggy, dev hsr_slave_0 [ 568.996710] protocol 88fb is buggy, dev hsr_slave_1 03:35:56 executing program 1: mknod(&(0x7f0000000540)='./file0\x00', 0x1041, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x3) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) ioctl$TCSETXF(r2, 0x5434, &(0x7f0000000000)={0x5, 0x4, [0x2ceb, 0xfffa, 0x7fff, 0x5, 0x1000], 0x42}) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x3) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000200)={0xa10000, 0x3566, 0xdb3, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x990afa, 0x8, [], @ptr=0xfc4c}}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000002c0)=""/61) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f0000000240)) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000280)={0x485, 0x7f, 0xf1, 0x1, 0x1000, 0xfffffff9}) write$binfmt_script(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB='\x00'], 0x1) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) 03:35:56 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @mss={0x2, 0x200}], 0x2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x403001, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) [ 569.096622] IPVS: ftp: loaded support on port[0] = 21 03:35:56 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:56 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x101006, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$VIDIOC_STREAMOFF(r4, 0x40045613, &(0x7f0000000040)=0x134) r8 = memfd_create(&(0x7f00000001c0)=')\\\x10\x90]\xd7\xdf\x943\xd8\xad\x12W\x9fd~\x9e\xf3\x84/\xe4\x19\xe5=\x16\xcfe\xb2`q\xc6Z\x88\xde\x8e\x91\xd3D\x99\x90\xf6U\xfe\x87\xe7\xf9\xccN<\xc6\xbb\x93\xb1\xf7\xcb7\xb7\t\xf4p #U\xf9:\x8c\xa1F\xd2\xa6p5\x804Y~\xc9\x19\x03R\xb8L\xef\xd0\x84|\xbe\x06\x00\x00\x00\x00\x00\x00\x00)\xcc?7\xe9\xad\x16\xa0a\xab\xfb)\x0e\x10\xcb\n{\"\xecD\xfa\xdeuC\x86\x92\xad\xef\"3H\x89\x94\xcc\x106\xfd\xd1\xcfq\x02\xfe?R46g\xee\xa4\xb6\xa9w\xe9\x15c6\xac\xa6\xe8\x8fV\xa2V\xba\x7fa\xb2\xc9$V\xcd\x81\x1aI\xd8\xc4\x0e\xad\x9f\\\x1c\xf9\x92\xf8j\x1b\x00'/193, 0x0) write$binfmt_aout(r8, &(0x7f00000000c0)=ANY=[@ANYBLOB="b20200000374cf484add976705e264107971981f53"], 0xf5bb) clone(0x41000, &(0x7f0000000300)="a8bae7409c9d7dc802681fd8924b8b8486c24cd46abb7af14b3082e585ad603bf1ff7065931f35b995245415ae6afdf788b7bb5a973032674e49dc52ca68ed0ff8b07b12120a04892c561814acb61237c645aaa536ba06424439ccdc8a968ee49eb968d4c4c0f9528437cb174835cb20c851682372ea35fb1e8dc2e03ea16936c515915174b711b60577985136fe9cf75a6bdf0b13bdef3874c3fe3341cb6cf5f1a16f7af2cdb3", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000540)="86ab7f932397bdf04b45221b4553f3416b39f28c7fb32692f7b0a795bc8a537605daf603f81944d91a50e6b0ff195e58c0ece9c0b32769c0f6022bd40687f183aceaa753a97951033a752bc1099784c344c5e4490d091371") sendfile(r0, r8, &(0x7f0000000000), 0x7fffffffffffffff) r9 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ocfs2_control\x00', 0x8000, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r9, 0x6, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x6) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@remote, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000080)=0x749) [ 569.138518] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 569.471279] protocol 88fb is buggy, dev hsr_slave_0 [ 569.476415] protocol 88fb is buggy, dev hsr_slave_1 [ 569.481540] IPVS: ftp: loaded support on port[0] = 21 03:35:57 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @mss={0x2, 0x200}], 0x2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x403001, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000100)) 03:35:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x60, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:57 executing program 1: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x20008579, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000100)=0x54) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r2, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], 0x4ae) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x4}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000000)={@multicast1=0xe0000306, @dev={0xac, 0x14, 0x14, 0xc}, @multicast1}, 0xc) 03:35:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 569.621324] protocol 88fb is buggy, dev hsr_slave_0 [ 569.626458] protocol 88fb is buggy, dev hsr_slave_1 03:35:57 executing program 5: write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000040)={0xa3, 0x7, 0x2, {{0x96, 'EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x49a0}}, 0xa3) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) sendto$isdn(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="e60a00007b0000009b20027331d17935ffb584bd41d20483f4020371fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a7297262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b3299b4cfe252472bf8cdc375dec5618193d0e442a5f6f907bd55ce1ac4b9d36c79d2b37120793d1fe183e0774f2ce90bde44de9f3fe38e3324f4450162837b926640bbadb533fb72328d"], 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x46db719761130834, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={0x0, r7, 0x13}, 0x10) r8 = open(&(0x7f00000001c0)='./file0\x00', 0x800, 0x40) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r9, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000440)={0x9d0000, 0x1, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x9909c8, 0xb955, [], @ptr=0xfffffffffffffffa}}) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x4, 0x5, &(0x7f0000000180)=@raw=[@map_val={0x18, 0x6, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0xf28}, @generic={0x2, 0x2, 0x8, 0x54c4, 0x80000000}, @map_val={0x18, 0x7, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x1ff}], &(0x7f0000000240)='GPL\x00', 0x1, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, [0x42], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x1, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x78) 03:35:57 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$sock_netrom_SIOCADDRT(r4, 0x890b, &(0x7f0000000440)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x1000, 'syz1\x00', @bcast, 0x4, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast, @default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./bus\x00', 0x1, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000140)="0949e1b7acf00db72c5b7cb40c0156ed4a354c5a0cf5860f607ed88022829fe77795978b12f16320ae4a2e7976d0c1a3bfa0f487293a393f6c512a18bff187ca5b6a8e23a0e80428b3a0b37b27bc518fc958799360b9d982172497bee6f06a21d293ad92fb5dc3bc39609ef4808fdb7045b709a0d069a05155bdf53e8d4361ffb7e6884a220629c844d8b74a4cc925885cc72dbc9acd3698b17a35bb5ed5f2bbf48bf9134f68a2b71d8ce323b1f2", 0xae, 0x5}, {&(0x7f0000000200)="c848eebff4553491ef620579f510b28462eb99ed581b7422c226143691d305a2537284dd96a3ca47d4439e3bcc7e7f6d18ee296c4323cb71ce57ce039c48ac27ed9c76eb8c73d1b54602450818b47a704e77637ce58f9f4224c2d469", 0x5c, 0x401}, {&(0x7f00000000c0)="930f74e4f3c9e3758be1b96132cb1eac40d365a3ab0ef8a0378529d777274f461fbde758a809c9165e887ac6b9c330d35e4c9389", 0x34, 0x6}, {&(0x7f0000000280)="fb7b14d85d72acac2010280e7030fc7994bf710d8118be6c71ed5f56d85d7b37949da76f92cb3e9fb65d46740210dcf27f1c5dc8318f538b1cca206c54f7f9e25480199f520c88b1a35c7279f7cabecc92d4f073b9fd140a5a78156bf02f3920e5085fef95bf4eaaffd2cd91b7e79a70a008ff7f16d91e8bbefb99a94c251462efc79a1fe920d3008990783e72c35e687847773b825e3d44751ad45eabd767bf87aee2e4dc3374cbb3a6e2fdc60b72ee95f33a9fc6cfc6a3e4", 0xb9, 0x6}, {&(0x7f0000000340)="6f8c37cd2d18306a1fe2cf6eba9792336c15281488806759be470754fa4209944d66e8fc095f93af273603304cd2722374f19f29f0e6eb40008e393ea6cd705a7bce2500572336c18b38b3eb07881bb8c6b2a77055127fae020d5b5d5aca3cf2ffa31fefe6013b410c58", 0x6a, 0x7}], 0x41020, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') r9 = eventfd(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r9, &(0x7f0000000000)) r10 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r10, r8, 0x0, 0x209) [ 569.739644] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 569.762321] sd 0:0:1:0: [sg0] tag#3108 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 569.771244] sd 0:0:1:0: [sg0] tag#3108 CDB: Test Unit Ready [ 569.777166] sd 0:0:1:0: [sg0] tag#3108 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.781261] protocol 88fb is buggy, dev hsr_slave_0 [ 569.787095] sd 0:0:1:0: [sg0] tag#3108 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.801004] sd 0:0:1:0: [sg0] tag#3108 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.810051] sd 0:0:1:0: [sg0] tag#3108 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.819010] sd 0:0:1:0: [sg0] tag#3108 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.827971] sd 0:0:1:0: [sg0] tag#3108 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:35:57 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @mss={0x2, 0x200}], 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x403001, 0x0) 03:35:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 569.836908] sd 0:0:1:0: [sg0] tag#3108 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.845851] sd 0:0:1:0: [sg0] tag#3108 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.854841] sd 0:0:1:0: [sg0] tag#3108 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.863790] sd 0:0:1:0: [sg0] tag#3108 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.872728] sd 0:0:1:0: [sg0] tag#3108 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.881657] sd 0:0:1:0: [sg0] tag#3108 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03:35:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x201c1042, 0x148) write$UHID_INPUT(r2, &(0x7f0000001cc0), 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 569.890547] sd 0:0:1:0: [sg0] tag#3108 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.899506] sd 0:0:1:0: [sg0] tag#3108 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 569.908448] sd 0:0:1:0: [sg0] tag#3108 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 03:35:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x68, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:57 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @mss={0x2, 0x200}], 0x2) [ 570.077922] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:35:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x6c, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000180)='btrT8\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffd, 0x5, &(0x7f0000002200)=[{&(0x7f0000000200)="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", 0x1000, 0x3}, {&(0x7f0000000040)="dcf65fab738470582c9be3144ea26337038878e573d5f1e509d34ca55f41cf3b4f7bee2247b79dd8486837f6370062c162d1213a27fee510468d67d753b8dc61eb7770183cc5ddeab7614a0fa3d1a404b9d25e205cd756482b3c4d35935e0f75769fee8ec99a2b146e214be11cc13816cbdcda89026b78ddf44fab65fb0640bafac254d43436c476f7ade61cdea62bac5426d0dbbcee26c0e22622a3454f29bce3bfe62bb6efd451852ba297c30c5a9b7b41bfee94194cc79cf385", 0xbb, 0x8}, {&(0x7f0000000100)="7ba4396dbfc8b3f61e58b2fd5c8fc438b69245f093b69f65cdcccd", 0x1b, 0x8}, {&(0x7f0000001200)="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", 0x1000, 0x4}, {&(0x7f0000000140)="3a4d283275458a5ae89a4fb17c450a3cd328", 0x12, 0x400}], 0xa18015, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x4, 0x4010c0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f00000023c0)={0x0, 0x0, 0x2, 0x1, {0x20003, 0x80, 0x7fffffff, 0x80}}) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r0) recvfrom(r2, &(0x7f0000002280)=""/168, 0xa8, 0x40, &(0x7f0000002340)=@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80) [ 570.294163] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:35:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0xd, &(0x7f00000001c0)=0x0) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, 0x0}]) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x7, &(0x7f0000000840)=[{&(0x7f00000000c0)="e2f93906dbb3c571136eef5ba8fff3a076879c2b430e007bd4b68fd5caa8cfe9f25a28f8a11d4e78a0c6eca2b3791841ec25c8ae48de52d6b067ca579a73ffc5d6c7a851080218d2297328d1b308c393c2b3599e3c321c3bd7db9fe16299a112bfd892678f36a60b4275c632171faececd290974a5fbb767e7c5dc6b1ea69aab9a3a407149c20c7ea2628f5a4b2f7b90efe21a5ba9e13e5727", 0x99, 0x101}, {&(0x7f0000000440)="2b1c6cf75565c979ac7bc7db80f7db997520642135110f6a2a9c632dedbbbd1087fc71461522779611b22a2f32f256ce9b8565cddca0202c47c3c94b51adf27cf6059c4af6da09a93cbcca28603607de749dfb7ca6f3e0823d03033089407f607fb44818dbd6949f1a74f4fe58519cdacaad6a960358a42497d806729b977f65091f39cbcb98f5b3fdfe889b4888b6a9977f723dd6366496b2844b91ed7693cb46569153d3c93dfac0b24f3543be0a2107201ec5892e8fc30001037e15fa780a07998bb2e8f4df68e3414a6defddd3a7cb945a4b0707809b4229f8049afa7949b9e11779676e639e17cbfae47a807f928378f2acc92718e321ef6e", 0xfb, 0x70d}, {&(0x7f00000001c0)="86d9ea21a2dc4e89692cedd7bb690ba163583ee88bcb0e51fa29b7ba8768ac99f83072e68f757de69e532fd32ed09974fe0398c26a74b7ddda0255c0e0a42e026f9bf71954", 0x45, 0x9}, {&(0x7f0000000540)="6b4114739d40a98cda22198c98dc139c2d3a10ea706bbf4218613bc264e75828ccc4809d426a227e278cde3bbcae41f868ad8ae3c6c0328d2f77e24b22e4ea732f04b5b4df7e4ca6c94a41178de6854bedbe72eb35b04005f826cd77f45818a42f52e6ab61391144c17b67cf25b74428e2d3e3369d9c7e1ea801f71e8c8115364aa78c2dbdab6e3eaeea1a57e138fb9f6db1a9c3a8ce6c3ef5a21145871f42f701bf6a5018d52df6b23ef9a9514727e38c7a0a7ef39b40b4d5f832035f7aa64cfdf26d461d6178cc833c7d", 0xcb, 0x4}, {&(0x7f0000000640)="1017e4d91e70ffaa7adc1e23322b60821f1481bd0cde04350f2880d893a01df1dc18176192f20e9af048cdbc1cb06ac1e2852953943f07a517d6f08d28f43862977a3d16ec2454b5a21167325134004e7021f9da955ba6454ef67f756f559a13d9a215d87bd4a957bfd1928b4ac65d35892a03f307f5567ac88f3d9edbf01079fa8fbe89ba0970f2ab781f6b5a2246696565ccb7ee430929b00ef755d8cdec482dbc4000548538c0d4b96b0082f19278d73cdac23457251a9d8e9ef28a34701572242371a86cc64932a30e8bd07b11aa88e0273e81f18a878f87d9526699885593348e1296e045e882b7b4734f47025104", 0xf1, 0x1}, {&(0x7f0000000300)="0d2c7b6a8140d7b0db62258545ba16f12b5b35f00c53afb2f91797801c48690445745667dd1443d9ea8e7720d5d7d8e9b090a7125c0c93c9ba0430fa8282617e37b7957b7ddd017507685f1474361c562f8003", 0x53, 0xffffffffffffff81}, {&(0x7f0000000740)="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", 0xff, 0x6}], 0x201000, &(0x7f0000000380)='-securitycpusetmd5sumeth0)eth0:-*.\'posix_acl_accesseth1\x00') r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, 0x0}], 0x1, 0x7c, 0x0, 0x0) r10 = epoll_create1(0x0) r11 = socket$inet_udp(0x2, 0x2, 0x0) r12 = socket(0x1000000010, 0x80002, 0x0) r13 = fcntl$dupfd(r12, 0x0, r11) r14 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, r13, &(0x7f000086fff4)) r15 = getpid() r16 = gettid() kcmp$KCMP_EPOLL_TFD(r15, r16, 0x7, r10, &(0x7f0000000000)={r14, r13}) sendto$isdn(r13, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$VIDIOC_TRY_EXT_CTRLS(r9, 0xc0205649, &(0x7f0000000980)={0xf000000, 0x401, 0x401, r13, 0x0, &(0x7f0000000940)={0x0, 0x4, [], @string=&(0x7f0000000900)=0x3}}) sendmsg$nl_generic(r17, &(0x7f0000001fc0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x10000008}, 0xc, &(0x7f0000001f80)={&(0x7f0000000a00)={0x156c, 0x33, 0x20, 0x70bd2d, 0x25dfdbfd, {0x1a}, [@nested={0x130c, 0x29, [@generic="c1289ab948adfd4e98f6bcc830c644961b599d897d683c2f2520d32fbaf81c8c068ecae2a3f5dbf099b9ad383fc40860703c49f9d60366804cb817fc2dc1b1f7d13b3b6b73a46b66fed6798c7d8dff3edae964d3a861c4d358413651d15d1b4f87c266401aa9ada7ac45ca1e84a8d2ad5fdaf22a9a7f86060b5b02f8b1709b3e742d1d5d", @generic="a7c91819ee88763e27bff23e44eb329a54770f0955bd2291e1bfd07b62c00bce348a724c7f48256b9c483182f7ab05c60c89bf5cda2d9eefcf529871b731ba3ba350d54cfbcf6528a4acb00b580a893f907e0af266766e26fed12b6364a4af8226109197f34cc5e976803067fad6e412e4f9320c4247e53cf1f4153fcaeda1a5f60ad26dfb153f8a236513ed8aba925a17b529724359d90f7047b3e3e635dc68f3995d17b6e1887c9e99af57f8ef7c2657b99cd901e613726b317b355eee8caf949758c987a970cdf5aa011efb7efc6055d8269566201e37a4061d8e7380f816", @generic="fbc2982ea31aa335e7270371407caef53126da6e7c2504619df70458faa29db5b423bc30054ba7f938b15f2ac885e044c31b7556d98f6c7b24c145faf4bcb9b72d288a2704bbecb15ef09b194efea0a695a4c70be6228f98d7853df3ce5d47f1b6ce315194c277cce30cd4f2318b11d13af73d50a1225391a820087941c36dc07e69091fdabfeb4a69ba5152d43e545c69d4bb9f3df64b4633522fc855a7b96680bd8f799969870f53", @typed={0xf8, 0x1, @binary="f28d9e6f42c2c3ae60ad93bacc2bb047d3f24117a3a382a81b0331de9013f71412d0eb460d8559dcb5cccb66297e069e834f5e00dccfa371b7a493317d69f58f1e44bb67a87b4bf84b95efc62d64b552fea3a60cdcbd273b98ecd8b5bab5bba9a96d178b1cde61da355c2d70ebe2ceed614d5a74fa6bd8465ab4b1e1e56d28d687e365ac56ca91c65b5ad140a97594b479d14fcc2309ce4dfdef09ff85a5768b7e52f2799a49c1fb446bc41a4c99b945fd82c37105c4fadab94aea683fcd9008ef942a2d7db59afaa32abfc26e7c78601591d69353a2cdb8d377153b8b9a019a9067ac29c620875eb0a0dcb2fa273b8528"}, @generic="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"]}, @generic="af00e9323d3e59d55668281c82c9e030156fba33a38e", @nested={0xe8, 0x47, [@generic="d63e650e42b1bd3af2bef8c4a2d2e9efd9931e127bc70c6656541f3b38dd50c73e69d7fa0ca691af39cfd39f47ae6d49176f509bafe410cc5d4c9d5e6b8b65bccef3", @generic="5ed06b57470c4f101366b7a3e65615c89111c9065fe306b5eebe9b9a65c01058880ec492476e9e83df576b37b1e87f1776ce0986dee9819215f6d054bd4cef6519f92585a59c2f7b88764f418e2afd39bd05c4da0ba1ce2b995b7a3caacb4165df33c9caedf758160e9087f05e3325e77979c888ef2cbab984f3d3093ef98f18ec3074aad86b31869f0576c54b27ef1083fb4d031dc7ea24d6b42dc39281091061c5"]}, @nested={0xe8, 0x19, [@typed={0x8, 0x79, @uid}, @typed={0x10, 0x1c, @str='/dev/kvm\x00'}, @generic="1db1ae5003fe9c12e74e6fc103bcd3370978a3b0af15f74dd4d64e5b0d8f6e64c14e6be4d05be130819cd0efd351bf59b44807bbd8b9b8b46e0e1bc0ed49fcb9545e1a3ae70fe3e009b3cf3ec1c43fc314b033e3b0152ebc42fb5f18b9d2b027e8c61bd5275320694670016a87e61a3a7dba4219c21210d2cc87f8d95e077db5508d4e28de0d23bf6f8e37677f35de8c3edb7bf1d7f490b8917d865fcae370baed6d93c2e67d118d377f7dbd3067aaad3dccce713aafc4f520e2070eaa3fde5b8b13060aec767ddef47e"]}, @generic="85988f381ff0e97b879bc04864fd8006cb2131235d55608c7a61ef4fa5e380f6638a74145fb7bf68b188", @nested={0x14, 0x13, [@typed={0xc, 0x63, @u64=0xa89b}, @generic, @typed={0x4, 0x24}]}, @nested={0x8, 0x6a, [@typed={0x4, 0x73}]}, @generic="9ad004672f13e7ec96db0f7ee158e6c461017ab8140a46a0f0784d1d2592c7"]}, 0x156c}, 0x1, 0x0, 0x0, 0x14}, 0xc01c) ioctl$KVM_RUN(r6, 0xae80, 0x0) 03:35:57 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) 03:35:57 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:57 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x1, 'q'}, &(0x7f00000003c0)=0x9) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendfile(r3, r4, &(0x7f00000000c0)=0x500, 0xfffffffffffffff8) 03:35:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x74, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockopt$ax25_int(r3, 0x101, 0x9, &(0x7f00000002c0), &(0x7f0000000380)=0x4) flock(r0, 0xf) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r7, 0x0, 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r7, 0x5201) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000006491bdad00"/64], 0x58}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x186d3d3b29695227, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) [ 570.582404] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:35:58 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x1000000010, 0x80002, 0x0) 03:35:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x7a, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 570.829693] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:35:58 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) 03:35:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:58 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100686866000c000200080003"], 0x3}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r5) setfsuid(r5) mount$9p_rdma(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x10000, &(0x7f00000002c0)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0x3ff}}, {@sq={'sq', 0x3d, 0x1}}, {@common=@access_uid={'access', 0x3d, r5}}], [{@subj_type={'subj_type'}}]}}) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 03:35:58 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000400)=""/245, 0xf5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0xc0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) 03:35:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:58 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket(0x10, 0x3, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}], 0x2, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) r3 = dup(r2) ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f0000000040)=""/58) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00\x00\x00\x00\xff\xff\xff\xff\x00', @ifru_flags}) [ 571.115144] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 571.153999] selinux_nlmsg_perm: 3 callbacks suppressed 03:35:58 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) [ 571.154017] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23520 comm=syz-executor.5 03:35:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x1a0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:58 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 571.282014] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23520 comm=syz-executor.5 [ 571.320701] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23520 comm=syz-executor.5 [ 571.340428] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:35:58 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r1, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000100)={{0x63a, 0x9, 0x6, 0x9}, 'syz0\x00', 0x26}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000040)={0x2, 0x8, 0x7a70, 0xffffffbe, 0x4}, 0x14) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, 0x0) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:35:58 executing program 4: close(0xffffffffffffffff) [ 571.399862] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23520 comm=syz-executor.5 03:35:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000640)={'team0\x00', 0x0}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0x0, 0x0) ioctl$PIO_SCRNMAP(r5, 0x4b41, &(0x7f0000000040)="2afae02c1e14d442593b135ee99264d52c85bdf3b723a95ae668f5255f51841a652a5cd770d9f367ab2c54f9a23e553a19e8b9bcad47b5ab65aa833d940e88d8c91d961a618b143b50d6c2e01ddfdcebba29aeeaba6187a17abc36e3c8915eecfa43e3bb15c12117d118af225485602b34774b1303ceb898723ae6baa05d22dc80274b919fadd9c8") sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r4}, @IFLA_LINKINFO={0x20, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r2}]]}}}]}, 0x48}}, 0x0) ioctl$FBIO_WAITFORVSYNC(r5, 0x40044620, 0x0) [ 571.441768] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23520 comm=syz-executor.5 03:35:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x300, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 571.580652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23520 comm=syz-executor.5 [ 571.649750] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 571.657846] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23520 comm=syz-executor.5 [ 571.678456] batman_adv: Cannot find parent device [ 571.709776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23520 comm=syz-executor.5 [ 571.747809] team0: Port device ip6gretap1 added [ 571.770114] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23520 comm=syz-executor.5 [ 571.861887] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23520 comm=syz-executor.5 [ 571.935250] batman_adv: Cannot find parent device [ 571.960609] team0: Port device ip6gretap2 added 03:35:59 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x408000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(&(0x7f0000000600)='user\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x18c) fcntl$setstatus(r3, 0x4, 0x6100) r4 = creat(&(0x7f0000000180)='./bus\x00', 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100)=0x2, 0x4) fallocate(r4, 0x0, 0x0, 0x1000f3) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000003200)=[{{&(0x7f00000000c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000001280)=[{0x0}], 0x1}}], 0x400000000000262, 0x0) ftruncate(r3, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x294ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 03:35:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:59 executing program 4: close(0xffffffffffffffff) 03:35:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x500, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:59 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x53, &(0x7f0000002a80)=ANY=[@ANYBLOB="1c0000000000000000000000000000009500fa0000000000b3d6fbdaef9f7d4e1a5b276570dd9934843e3cfc6b3282d976ef3190ed183edd9f8f456a870ca7555cbc7fd526dbd9e8f3860bf492a8e4afc28ac1f48f4c4bbb4301000080b67474e56a20ddb70311ad550db6bd9f561574901163080600836830e6d293f4d9d1fa470fd23e9c9282eadac0b0dcc2f39ca2f02c19ee61748e1db2740a6b7109dbcb87212b861303286dd6b455d54509792ce29d6f7189ebd9ab73c3c4a780ea140f2e8780d8281d2d6010ac5c2bc3af73954abd5a6616591783410393ec5d28da5fb2689dc07129bf3bca7b35d937221a739396bbf8e00ac47c463a6ec8bad33a89c8c020148e0e9522fe0e4dcdb8a4c2a5dffe42896d2bed45040a513dbf05f30165ec0e879bfd4c3c92c37d697551a80e37c13ee9d77b15e19515c5685d2c77ce89ee99c8ea74f28d8a085db78dab969934ee9b8909ae91b287a39149ef8217baebce4e5108c232858edcabec8e7ab062b1fa81a47463a38fa0f147fda1a8a0a5513c47a0e31c82730dfff52d5039d41ef8e253723055c34299079fa387ba400ec9432fa638292892374f87a2805e98f34b179ea01aad9a991d102b6351f8af25183d753e22d94369dec1416b3661632681b0f66b11a3fc18f7967aba0ff9fa901c12ec55d3f5b3c68bd2e507a35a4e43f64bb49d0b6c52fe49308e5ecdb03d5cad40b9999d4eae7176cea5c643815bdf6cfef3562cced066cad487543e6fad1347e78915e204db795164bc0f1955de204510b49b139503082dafb7a032cde4f95d354d2cfc08f6585f81bbd23be69479e999a2c3683058bcc341271ba1e9540499669c403199a8d7dab9be5a777d60b41ec4073231db3895249ad9e1f5c14aeab82df3a736673724261e6fae02242ad78e55853ad57f111a5eb2"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = gettid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={r0, r1, 0x0, 0x15, &(0x7f0000000a00)='\x80+@cpuset.nodevppp1)\x00'}, 0x30) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000500)={0x3, 0x2, 0x4, 0x0, 0x81, {0x0, 0x7530}, {0x2, 0x8, 0x1f, 0x5, 0x1, 0x1, '9+`A'}, 0x9, 0x4, @planes=&(0x7f00000004c0)={0x2d2ae84c, 0x9, @userptr=0x9600000, 0x400}, 0x1ff, 0x0, 0xffffffffffffffff}) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r6}}, 0x128) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000580)={0x8, 0x120, 0xfa00, {0x0, {0x7ff, 0x8, "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", 0x7, 0x8, 0x20, 0x1, 0x0, 0xe2, 0x4, 0x1}, r6}}, 0x128) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x0, 0x5, 0x80, 0x0, 0x401, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xf4, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x6, 0x0, 0x5, 0x0, 0x7fff, 0x5}, r0, 0x8, 0xffffffffffffffff, 0x7e6218d8d0260ff6) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000800)=ANY=[@ANYBLOB="9fe3fb00000000000c0000000c000000030800002000"], 0x0, 0x1b}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) r7 = socket$kcm(0x2, 0x5, 0x84) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={0xffffffffffffffff, r3, 0xd, 0x1}, 0xffffffffffffff97) r8 = socket$inet_udp(0x2, 0x2, 0x0) r9 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r9, 0x0, r8) setsockopt$bt_BT_SNDMTU(r9, 0x112, 0xc, &(0x7f0000000340)=0x7, 0x2) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000380), 0x4) socket$kcm(0x29, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r4, &(0x7f00000006c0)={0x33, 0x6, 0x0, {0x2, 0x4, 0xa, 0x0, 'syzkaller\x00'}}, 0x33) [ 572.103960] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:35:59 executing program 4: close(0xffffffffffffffff) 03:35:59 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:35:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x600, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:35:59 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) [ 572.377684] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x649, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$VT_OPENQRY(r4, 0x5600, &(0x7f0000000080)) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@polexpire={0x233, 0x1b, 0x221, 0x0, 0x0, {{{@in6=@mcast1, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xc0}, 0x8}, 0x0) r5 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r5, 0x1, 0x0) r6 = epoll_create1(0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket(0x1000000010, 0x80002, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r9, &(0x7f000086fff4)) r11 = getpid() r12 = gettid() kcmp$KCMP_EPOLL_TFD(r11, r12, 0x7, r6, &(0x7f0000000000)={r10, r9}) r13 = epoll_create1(0x0) r14 = socket$inet_udp(0x2, 0x2, 0x0) r15 = socket(0x1000000010, 0x80002, 0x0) r16 = fcntl$dupfd(r15, 0x0, r14) r17 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r17, 0x1, r16, &(0x7f000086fff4)) r18 = getpid() r19 = gettid() kcmp$KCMP_EPOLL_TFD(r18, r19, 0x7, r13, &(0x7f0000000000)={r17, r16}) r20 = epoll_create1(0x0) r21 = socket$inet_udp(0x2, 0x2, 0x0) r22 = socket(0x1000000010, 0x80002, 0x0) r23 = fcntl$dupfd(r22, 0x0, r21) r24 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r24, 0x1, r23, &(0x7f000086fff4)) r25 = getpid() r26 = gettid() kcmp$KCMP_EPOLL_TFD(r25, r26, 0x7, r20, &(0x7f0000000000)={r24, r23}) r27 = getuid() stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000006c0)=[0xffffffffffffffff, r28]) r29 = socket$vsock_stream(0x28, 0x1, 0x0) r30 = epoll_create1(0x0) r31 = socket$inet_udp(0x2, 0x2, 0x0) r32 = socket(0x1000000010, 0x80002, 0x0) r33 = fcntl$dupfd(r32, 0x0, r31) r34 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r34, 0x1, r33, &(0x7f000086fff4)) r35 = getpid() r36 = gettid() kcmp$KCMP_EPOLL_TFD(r35, r36, 0x7, r30, &(0x7f0000000000)={r34, r33}) sendto$isdn(r33, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r37 = socket$inet_udp(0x2, 0x2, 0x0) r38 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r38, 0x0, r37) r39 = socket(0x1, 0x2, 0x1) r40 = gettid() r41 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r41, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000003140)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000600)=0xe8) r43 = socket$inet_udp(0x2, 0x2, 0x0) r44 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r44, 0x0, r43) getsockopt$sock_cred(r44, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) r46 = epoll_create1(0x0) r47 = socket$inet_udp(0x2, 0x2, 0x0) r48 = socket(0x1000000010, 0x80002, 0x0) r49 = fcntl$dupfd(r48, 0x0, r47) r50 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r50, 0x1, r49, &(0x7f000086fff4)) r51 = getpid() r52 = gettid() kcmp$KCMP_EPOLL_TFD(r51, r52, 0x7, r46, &(0x7f0000000000)={r50, r49}) sendto$isdn(r49, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r53 = accept$ax25(r49, 0x0, &(0x7f0000003240)) r54 = epoll_create1(0x0) r55 = socket$inet_udp(0x2, 0x2, 0x0) r56 = socket(0x1000000010, 0x80002, 0x0) r57 = fcntl$dupfd(r56, 0x0, r55) r58 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r58, 0x1, r57, &(0x7f000086fff4)) r59 = getpid() r60 = gettid() kcmp$KCMP_EPOLL_TFD(r59, r60, 0x7, r54, &(0x7f0000000000)={r58, r57}) sendto$isdn(r57, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r61 = epoll_create1(0x0) r62 = socket$inet_udp(0x2, 0x2, 0x0) r63 = socket(0x1000000010, 0x80002, 0x0) r64 = fcntl$dupfd(r63, 0x0, r62) r65 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r65, 0x1, r64, &(0x7f000086fff4)) r66 = getpid() r67 = gettid() kcmp$KCMP_EPOLL_TFD(r66, r67, 0x7, r61, &(0x7f0000000000)={r65, r64}) r68 = epoll_create1(0x0) r69 = socket$inet_udp(0x2, 0x2, 0x0) r70 = socket(0x1000000010, 0x80002, 0x0) r71 = fcntl$dupfd(r70, 0x0, r69) r72 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r72, 0x1, r71, &(0x7f000086fff4)) r73 = getpid() r74 = gettid() kcmp$KCMP_EPOLL_TFD(r73, r74, 0x7, r68, &(0x7f0000000000)={r72, r71}) r75 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r75, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r76) setfsuid(r76) r77 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000003280)='/dev/video36\x00', 0x2, 0x0) r78 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000032c0)='/selinux/status\x00', 0x0, 0x0) r79 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r79, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) r80 = socket$inet_udp(0x2, 0x2, 0x0) r81 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r81, 0x0, r80) r82 = gettid() sendmsg$netlink(r5, &(0x7f0000003440)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfb, 0x24042002}, 0xc, &(0x7f0000000580)=[{&(0x7f0000000200)={0x2c, 0x35, 0x800, 0x70bd28, 0x25dfdbfd, "", [@generic="ad62c7a5aaa96c50059e78ac1b59488bce45171ca1cd8bff45"]}, 0x2c}, {&(0x7f0000003e00)={0x258, 0x2d, 0x100, 0x70bd2a, 0x25dfdbfd, "", [@nested={0x248, 0x51, [@generic="5baa1a283f663b20faeaf9d27f44c36db810f7f5e1cb1b3f76f479b4008a9fb47ece812a5fd11f0c80817096ff8a15b7a8bca8859755a082c1b2319ecbfbfe2fb18cc6425e3a8342a9fca51b28b251fc3f20b50a11233d4744a9b9347c29a45ed5b4f14919771c06102ffaf632fcc522cc99173563cf69f1a296504c71896df93ac3453eb0f0c653766ec675e16d3f4f83f3050f1c553e5fc9369016b5a293a04865ff42b4b085ca56067fb4c892c2047bc558a55df91ca97a2ea1faa4864e9a570e8773b6bc141408", @typed={0x8, 0x57, @pid=r12}, @generic="f3b16e53960fbbf638104eb23538396d5c89b714c05ea091d84388518bc6c9e86e1a554705e3e8f4101b28632266da8a3637fbfd38565a95232a5fa712b0c8647b168f4e8015f496dc5971a94ef38589df516059014f34a4a8ca06c67e802a1aefb404738a57e31a6bdf35d482c551b2eeafc530cf05e7dbf030a0d176c5af00633c9e07f2e03d1b757f491f2505379e545d8df09584eb9a2b975bdee03946ee732e8a826798118c", @typed={0xa4, 0x18, @binary="67169794e50a514ad7e18b1f313d4fa4ffd7cb36b49030741d64d0dff7e4e34c58a9821f54ff151c5351376255c8f3027a2aa11b457fc7689bfef4ad94407108b41857adf18d94416743aff132c09f2fa1abc59e5d6c68f222a28269a72aac7b4d50b3c7fce387df09c9efe329c9f9681e0af56edaba05cdd332f7adb8689edd581e50b098d111a47b8780d5c21cddc1f9f54f8ed9f63c1ebc968f37106b"}, @typed={0x24, 0x44, @binary="6b82f4c309250c692297565ab3f2b14abb5ff695a8b7b66abbf5f34f1f4b"}]}]}, 0x258}, {&(0x7f00000038c0)={0x10, 0x14, 0x20, 0x70bd26, 0x25dfdbfd}, 0x10}, {&(0x7f0000000b80)={0x1364, 0x1d, 0x20, 0x70bd26, 0x25dfdbfb, "", [@generic="4c68ff7e27157cb2013f56f1e6feac9b5f073dcf108457630a", @typed={0x4, 0x40}, @generic="5503b9f232f53057e918a72438a5f66e227637e21c7265d647e5f147fd20", @nested={0xbc, 0x20, [@generic="d99509ae16818fd3d127981f042c48eb3d76563da475b48ebd548248072a4770d319f96fc30927f1027071040fa57aa641d5d7884cf8f99fadc97bf5dc5261071db64e1df27ed7a3f0b5e8d84dbe9b5364d437cf9036d4d8d6bd69fcaa1ad648787cdd90a0905960bf407d223a27da5d834ee6fca51c9ff679a830563ac44bf6f5d09ddad48393de66b0fa7b2c273d8d29289d29392f708248e2d1cab609dde33423d8fa0e35472e0dbe4ca5b228350da5ecb9ca7053"]}, @nested={0x117c, 0x93, [@generic="e13637a4d94ec5aeee958d7e93a9de8f985c46bf0313aba723e7dbf928f78e6380fbed0f6899f73a6a978b08cfb6ac7de3b12f6028ee8629fe85e73cbcc9c6a3b4a40ea406d4f277366f40cd01dc0b5c7d045e4f52ee2c7128f9e27e7856f8c53aa052987cb80f5ed36133b3b19d348c8bbba9a4bb52e917b5e56e6bda7464d6a877263dc0f6305adb1da41f2990b7d15b1a65379c239adeb44da9a6b04c", @generic="e859e0a6f4516d0ac15d24fd15ade1c70c8448906c4e008535d832279d686dcf7c45998ede2e228503e0bc1e010a964c6634dd759039dab6fa541d9e75fdab408a3b00", @typed={0x8, 0x30, @pid=r82}, @generic="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", @generic="1e96b16a86784b87a7c74d3f0503a133fa1f4154ccad7181b05e4d65314a3304af", @generic="5478d4ffb0b307f30c74ad292ce17ad9ff833aefc477160f43e1345c32b5ea0adab54498247f0aea52e80153453f7bf51898b92e08cf5de5a0907e143a8420b18e0526302c5fb30e4f4a32bb4204c6188910c970913cab3e057e152400632a5c9ed11e86928a66f7599cddd28806"]}, @generic="babd679ce221404367531626620f3e12c8f45d9bd729a0536753b2622e233b34e21a8378cae2f47b915abd5e305ac029a1efb40e76306e16639a26e1950ae0997cdfc39e5a9c578e153cebb22109d6007de3f92653c66b7bd73c7a8d30d3ab9f195cada36d02abe563308c6e916d062b22ba6309f68fc9b04d7f9377d1a0651af8e8cea18ea41296adc8978f1d19f62bda682b591bc09326e06294358a84eb55a6f4b7c20cafb9a48ebb892c49757984ed3b784e33c11581167f61c3d45b7b13ec3b4d1c3a6f021d71e8e428e8de7fd75561fcd2f57150f603852568f0212940"]}, 0x1364}, {&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x108}, {&(0x7f0000001f40)={0x11f0, 0x41, 0x400, 0x70bd26, 0x25dfdbfc, "", [@generic="7eb47c84fb266f4366530f4a7c747aa4acbb180eca6859d4026ae1d9f6fef9a9e5ae4e89897dc9136f3cf37f351caa304ca4fe614689d71baf01e0f5298a3fc7e39d1e9aea212608f3f0aec49281af2684b44b477bed365043d03ff164326ee88f6910e85c0c2d79116708", @typed={0x14, 0x92, @ipv6=@remote}, @typed={0x4, 0x9b6}, @generic="11437b1e66b25fb0439780aaf286741fdd29ebb25c6afd6109bcb06e98da59dadb2d1571ba7c1022cd5633ff1d5f69859473312d1ab28283fdbe3dbf7f4eb51b96cd0dbf2a089cac56b6acfaa5accbcb1b53d26dab65f4f9141d2aa1a2087605466c3398202d9a74232ba6bc22687965e7d400", @nested={0x10e8, 0x84, [@typed={0x8, 0x88, @pid=r19}, @typed={0x4, 0x1b}, @generic="bf945fa5ebabe1271838c83856aa877b46bbc2619e05b01f772a32f5242c7460af37077a6b953e4da5c2b1b0d0405f59bfc8094ef86093080fd6d0ae357da1447eada1973109580873df4742ecb47fbb58540f8019e1b52149377e30406017605f0b169fce250be65b53aa88aeeabf2d8f87ce73f111fcda07db52c3e518572f165aae59333a2f0eadd48df5f77c49f08c1675d5a7e06af6943b1ecb0e598d9716714d2cb90ed1eef7eca31c99e8a9", @generic="4db0459d08ec7bd2c0d375d077dd236a029f7eae33fd9cc5dd4e14786aa84f", @generic="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", @typed={0x8, 0x34, @uid}, @generic]}]}, 0x11f0}], 0x6, &(0x7f0000003300)=[@cred={{0x1c, 0x1, 0x2, {r25, r27, r28}}}, @rights={{0x28, 0x1, 0x1, [r29, r4, r0, r33, r38, r39]}}, @cred={{0x1c, 0x1, 0x2, {r40, r42, r45}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x24, 0x1, 0x1, [r53, r57, r61, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r74, r76}}}, @rights={{0x24, 0x1, 0x1, [r77, r3, r0, r78, r4]}}, @rights={{0x20, 0x1, 0x1, [r79, r1, r0, r81]}}], 0x110, 0x24008905}, 0x800) [ 572.728325] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:00 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 03:36:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:00 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r0) 03:36:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x700, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 573.121097] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000107100, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000001400)="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", 0x465) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getegid() ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, 0x0) mount$fuse(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000107ff8), 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="d500000003000000414f29db8707000000337e5733de"], 0x8) fcntl$dupfd(0xffffffffffffffff, 0xc0a, 0xffffffffffffffff) ftruncate(r0, 0x200004) chdir(&(0x7f0000000080)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x2000, 0x0) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x16, 0xff, 0x4}], 0x18) 03:36:00 executing program 2: creat(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x2000, 0x0, 0xfffffffd, 0x3, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x20, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) ptrace$getregs(0xc, r6, 0x0, &(0x7f0000000100)=""/95) 03:36:00 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(0xffffffffffffffff) 03:36:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xa00, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 573.314673] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xe00, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:00 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(0xffffffffffffffff) 03:36:00 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 573.559801] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf00, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 573.708438] overlayfs: overlapping lowerdir path 03:36:01 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(0xffffffffffffffff) 03:36:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:01 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) [ 573.897971] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:01 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'vcan0\x00'}) connect(0xffffffffffffffff, 0x0, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000007c0)={'vcan0\x00'}) connect(0xffffffffffffffff, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40c1081}, 0x0) sendmsg$can_bcm(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x185) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x8) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f3) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r6, 0x0, r5) sendmmsg$inet(r6, &(0x7f0000003200)=[{{&(0x7f00000012c0)={0x2, 0x0, @loopback}, 0xfe62, 0x0, 0x0, 0x0, 0x2ed}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget$private(0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setxattr$security_smack_transmute(0x0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x20080, 0x0) io_setup(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100)=0x3, 0x0) eventfd2(0x9c, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x81, 0x20}, &(0x7f0000000280)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ftruncate(r1, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 03:36:01 executing program 2: socket$kcm(0x2b, 0x0, 0x0) socketpair(0x9, 0x80000, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1fe, 0x1000, 0x668dc8c58d453fb7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x8, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) prctl$PR_GET_NO_NEW_PRIVS(0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000300)={0x7}, 0x1) openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') r3 = gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000500)={0x5, 0x70, 0xa3, 0x3, 0x1f, 0x2, 0x0, 0x0, 0x1000c, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffff7, 0x0, @perf_config_ext={0x80, 0x7ff}, 0x8000, 0x7f, 0x3, 0x3, 0x800, 0x5, 0x17}, r3, 0xf, 0xffffffffffffffff, 0xc) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000240)=@nat={'nat\x00', 0x19, 0x4, 0x0, [0x20000900, 0x0, 0x0, 0x20000ac6, 0x20000af6], 0x0, &(0x7f0000000180), 0x0}, 0x568) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffffffffffddb) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) [ 573.941230] net_ratelimit: 27 callbacks suppressed [ 573.941238] protocol 88fb is buggy, dev hsr_slave_0 [ 573.951391] protocol 88fb is buggy, dev hsr_slave_1 [ 573.956636] protocol 88fb is buggy, dev hsr_slave_0 [ 573.961776] protocol 88fb is buggy, dev hsr_slave_1 03:36:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\xff', 0x0, 0x0) 03:36:01 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) 03:36:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 574.101236] protocol 88fb is buggy, dev hsr_slave_0 [ 574.107514] protocol 88fb is buggy, dev hsr_slave_1 [ 574.185238] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:01 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dew/mISDdtimer\x00', 0x800, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000)={0x1}, 0x8) close(r0) 03:36:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x3f00, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\xf6', 0x0, 0x0) 03:36:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\xff', 0x0, 0x0) [ 574.447437] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000700)='/dev/ful\xbb.\xddq\xafb\xd3\x91\x85\xa0\xc1l\x00', 0x0) ftruncate(r0, 0x800799e) prctl$PR_MCE_KILL(0x21, 0x0, 0x2) r1 = creat(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2a2) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) memfd_create(&(0x7f0000000140)='\x00', 0x9) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, &(0x7f00000001c0)='system_u:object_r:locale_t:s0\x00', 0x1e, 0x0) 03:36:02 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dr\x00', 0x8c0400, 0x0) close(r0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) fstat(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getegid() write$FUSE_DIRENTPLUS(r7, &(0x7f0000000700)={0xb0, 0x0, 0x2, [{{0x1, 0x2, 0x800, 0x1, 0x8000, 0x698, {0x2, 0x1, 0x9, 0x73, 0x101, 0x7, 0x0, 0x7, 0xff, 0x3, 0x800, r8, r9, 0x8, 0x3}}, {0x0, 0x18, 0x8, 0x2, '&$:wlan0'}}]}, 0xb0) ioctl$FBIOGET_VSCREENINFO(r1, 0x4600, &(0x7f0000000280)) r10 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r10, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f00000004c0)={0x4, 0x101, 0x4, 0xffffffffffffffff, 0x0, &(0x7f0000000480)={0x980906, 0xd7, [], @p_u8=&(0x7f0000000440)=0x6}}) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r11, &(0x7f00000006c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400040}, 0xc, &(0x7f0000000680)={&(0x7f0000000040)=ANY=[@ANYBLOB="fc00080036e27f3474620a33d67b435363dee9fe5229c27e32a83b30ae9d44c28b27c71352fee90a3a8b3cccce72e2e763399db8d40f13796c0d4ea0d229d44cdf8405960e716838f6e92c11d86a4ef58a1ae888b07a4bd151b9044bfc1265c96e987fb62c527a4e2a801d24b56800"/151, @ANYRES16=r12, @ANYBLOB="010027bd7000fbdbdf25110000001c0007000c00040008000000000000000c0004003a0c000000000000cc0004000c0007000800030004000000440007000800010003000000080003006c71000008000300070000000800020081000000080001001c0000000800010016000000080003000700000008000400050000001400010062726f6164636173742d6c696e6b0000240007000800030070000000080004001f00000008000300f506000008000100150000001400010062726f6164636173742d6c696e6b00002c0007000800030007000000080001000a000000080001001d00000008000200800000000800020004000000"], 0xfc}, 0x1, 0x0, 0x0, 0x8000}, 0x40) r13 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$X25_QBITINCL(r13, 0x106, 0x1, &(0x7f0000000580), 0x4) 03:36:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4800, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 575.231225] protocol 88fb is buggy, dev hsr_slave_0 [ 575.236385] protocol 88fb is buggy, dev hsr_slave_1 [ 575.241558] protocol 88fb is buggy, dev hsr_slave_0 [ 575.246623] protocol 88fb is buggy, dev hsr_slave_1 03:36:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4906, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:04 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000300), 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0xfffffff, 0x2, 0x6, r0, 0x0, &(0x7f0000000000)={0x980912, 0xffffffff, [], @ptr=0xfffffffffffffffc}}) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000080)={0xffffffffffffff41, 0x4}) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r2) 03:36:04 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r1, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r2, &(0x7f0000000000)={r6, r5}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000c80)={0x2, 0x0, 0x4, 0x100000, 0xff, {}, {0x0, 0x1, 0x6, 0x5, 0x7f, 0x8, "661b310b"}, 0x9, 0xbf065ae84e1eead2, @userptr=0x9, 0xffffffff, 0x0, r6}) write$P9_RREAD(r9, &(0x7f0000001140)=ANY=[@ANYBLOB="770000007502006c000000a0bba7852c80f4e58790428d4cef98c4449c7cc11d7b4dda8796370ee04e8aef8063d0a79c66fcf988362d625daf005fd283ce0c02cbc972324d630424761ee8aef743fd400fb8a10537a91bfc7166785b7897c6259d8917b1d7b3df6a8ff7439f42aba69a5d043aaacdeac34b77e746d3c7021a95b0b2d74014bccb13b60902787e1a9b3468b498043d4f685436a4b985e2414df72ad92c78b2e3717586ef49e2c295dccfb1d2bae9f8d3c89d6be6f61c216d51975ddcfec8a700bf3fef3ee9cbf080a2e62b0ce38e4c2a283cca944bbc68915f4bccc6f98d721fc67b007f4c83033fb966723a569c70509bb9af29ff00df802d4a9aa2839e9521aa42dff55b73fe9241ccb133fee72e0a3152e817902e32a88031569dae2380aa62cf12df8c732f2a8a5849b6718397aedfe29c3d1a958ca1079188e7e153a3cdf879236340bec6b35bf6f84fbc016a89cfe71483694871a006ea67ec36d585b2d309babaf03c0e94f7669e284febfe15cff5f67aa1ba2d0b09fe923887b3bf43c33773f0edda3e1af8ec0a439bb8d1f3c6d0e1a0818c8754fa95a3581f018bc5567c0d2df10f06d59bbdfce3e1762ef8069b25019de8ee487e69454b842002d616b4d7f55a92eaa1fe232e9f2998333f748c1888d88b9c75de5e8f14f95d4bdac3f879561d0994ffa8b9c9b72c5268972b19494d4dcfc3a9fe0ebb530511cd280c1d7ae66fdf60ae8f8ed634ae14d9210670f8aadc3efd3b"], 0x77) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/54], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB="4d00100000000000", @ANYPTR=&(0x7f0000000440)=ANY=[], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYRES32=r1], @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00`\x00'/24], 0x48, 0x1}, 0x0) syz_mount_image$xfs(&(0x7f0000000680)='xfs\x00', &(0x7f0000000800)='./file0\x00', 0x5, 0xc48, &(0x7f0000000c00)=[{&(0x7f0000000880)="487e78d91c2fb1c93b1bada1c911c80e2d675d391bfbe6cdf9f10f83065a2ff1d0f3e233e6953361cdb9111fe174e2114808426d0b416629fc55ba03444842aa1640581a6706927d7f24d0063fbfef52434e39cd8d8fc0fbbc363114c10da481187f4355a373edc92e65379505e15166094384c58f70c97260173fc22fc3e8dc6850297fdc32821b8de13ba306e3510e68d431ffe99a22926e2278e10f0cda629f170b096ab06a29ae52759dfa0a8fcc9b014aadb3fe38dfa0a4125f3ec56dc5339504baabfafad5dff5797df216f2a4c499ea7071258618d11bd46fe99185d43d52bbb389a872c24c2e8027ddc679", 0xef}, {&(0x7f0000000980)="853013f0caf558a8f1adcd36142200469225b3990113569e279aa68ee2d6030117bf6f3c89fddac3a1e594825063b94ba9e9741c7d9dc6d7ee41b18c3efe5e1572c4bb9daf49b2db7c14a5def580fea06e4977859acf7513159e08bd5c890d1d0890090a24507b1b608d1c44ddb6620025503de90922f7301361fbabcd6f0047ef7bd81f4d935bf5eb151b24eebb4235383e", 0x92, 0xffffffffffffffe1}, {&(0x7f0000000a40)="517de589a6c032ab8c22f940fea02866fd4337a3b7a2fafb1204c879a3744f24013001e46f4bbb859d50ae6bd35502c60710c04d717af64851a15fb5970d352dc182e870d42b11ec60a4857ab84ce7a60993b6e357d25462b487bc7f97fdc9e06a1641f8631c57162acabc67a9c8298803e62689072ed168a7002ae878d23989bd3e9d", 0x83, 0xecc5}, {&(0x7f0000000b00)="5a4c3b2f019c7138c9fa6bfd9fb8123dc84f0837ad6fc35907bc401c02288f1f2ae3c2cc945c49f7a1dfb657330bbf986afe88cfcc35dca183217b3b28a2025e1d809678", 0x44, 0x3f}, {&(0x7f0000000b80)="43298ef5797ef8b148cd1e414c6d0f7c2722e354dddeb30533a8bd34ea3f2e073e06341e5d91f9fca85e3494e451f8ff2a130f74099eb984780625e403b2cbe1e89341ee62348bd3f89e74d82c10d4126cfbbbf3927aa5a3eead9eb1f31aa33200", 0x61, 0xd9ac}], 0x10000, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaa2d4ae5523a9f31fc070000ff33aae1aaaa52b61b66548a3b726634f6bfa2b499223345b8f6aaaaaaaaaa0091000500810043000800450000240000000000219078ac345593638e99d9570801820ad61bf704c7ca0103a804ba871af9c4942721bcdca846cb28c828811c67215d52a18fe713da73eac72b9557b16700f9a488b5c249fd18819100000000000000000000000074a245d068ad00000000"], 0x0) epoll_create1(0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r11, 0x0, r10) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() sched_setscheduler(0x0, 0x5, 0x0) 03:36:04 executing program 5: r0 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$tun(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1) write$ppp(0xffffffffffffffff, &(0x7f0000000080)="160d08d26269c3d1b6731457fcee0bbee1b095ad2312dde9caa854a3388c69d339a300d98f835825a8825f56e2ca9cb5dd46", 0x32) dup3(r0, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x44000) read$usbmon(0xffffffffffffffff, &(0x7f0000000000)=""/82, 0x52) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) 03:36:04 executing program 1: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000240)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000540)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @link_local, [{[], {0x8100, 0x1}}], {@ipv6={0x86dd, {0x0, 0x6, "008000", 0x1c, 0x0, 0x0, @remote, @ipv4={[], [], @multicast1}, {[], @tcp={{0x4e21, 0x4e22, r1, 0x41424344, 0x0, 0x0, 0x7, 0x0, 0x8001, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x4}, @mss={0x2, 0x4, 0x8}]}}}}}}}}, 0x0) syz_emit_ethernet(0x41, &(0x7f0000000740)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0xb, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x3, 0x6, 0x0, @remote, @remote, {[@generic={0x89, 0xc, "a6d6ae7f82f6bd258771"}, @cipso={0x86, 0x0, 0x4554}, @ssrr={0x89, 0x3, 0x80}]}}, @tcp={{0x0, 0x4e20, r1, 0x42424242, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}}}}}}, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local, {[@rr={0x7, 0x3, 0x5}]}}, @tcp={{0x0, 0x4e20, r1, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x100, 0x0) ioctl$MON_IOCG_STATS(r7, 0x80089203, &(0x7f00000003c0)) r8 = getpid() r9 = gettid() kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r2, &(0x7f0000000000)={r6, r5}) r10 = syz_open_procfs(r9, &(0x7f0000000000)='fdinfo/4\x00') pread64(r10, 0x0, 0x0, 0x0) r11 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r12, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r12, 0x29, 0x44, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000240)=0x1e) ioctl$sock_FIOGETOWN(r11, 0x8903, &(0x7f0000000140)) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r13, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r14, @ANYBLOB="010000000000000000000300000004000400"], 0x18}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r10, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x110000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x2c, r14, 0x4, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x0, 0x2, [@TIPC_NLA_PROP_WIN={0x0, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x0, 0x4, 0x931}]}, @TIPC_NLA_BEARER_NAME={0x0, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x0, 0x2, [@TIPC_NLA_PROP_WIN={0x0, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0xcaef}, @TIPC_NLA_PROP_WIN={0x0, 0x3, 0x3}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x0, 0x4, {{0x0, 0x1, @in6={0xa, 0x4e20, 0x2, @ipv4={[], [], @multicast2}, 0xa1}}, {0x0, 0x2, @in={0x2, 0x4e22, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x0, 0x2, [@TIPC_NLA_PROP_PRIO={0x0, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x0, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x0, 0x2, 0x9a40}]}]}]}, 0x3d9}, 0x1, 0x0, 0x0, 0x4}, 0x10004) 03:36:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 577.382381] validate_nla: 1 callbacks suppressed [ 577.382391] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 577.393897] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:36:04 executing program 4: r0 = request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f0000000140)="44c5037ab260b8a2", 0x8) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r1) r2 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000040)={0x1, 0x0, {0x8, 0x0, 0x20, 0x6}}) 03:36:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4c00, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3, 0xf}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe77}, 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000300000004000400"], 0x18}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000300)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, r3, 0x400, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 03:36:05 executing program 1: clone(0x100000, &(0x7f0000000140)="3904ed70358d269b0b3b6321475545fba5e7cb55c4fa69d496b0f1e03863ff0b99d3", &(0x7f0000000180), &(0x7f0000001400), &(0x7f0000001640)="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") r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000001440)={&(0x7f0000001480)=""/16, 0x20000, 0x1000, 0x0, 0x1}, 0x20) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000080), 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x420000, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000000)=0xa2ea) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000300), 0x12) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x800000, 0x0) preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000340)={0x0}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000014c0)={r5, 0x9403, 0x3, [0x7, 0x4, 0x6]}, &(0x7f0000001500)=0xe) syz_open_dev$usbmon(0x0, 0x0, 0x0) [ 577.639567] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:05 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\xff', 0x0, 0x0) 03:36:05 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) lseek(r0, 0xa4, 0x5) close(r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x432000, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000280)={0x1000, ""/4096}) [ 577.736717] selinux_nlmsg_perm: 5 callbacks suppressed [ 577.736733] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=23760 comm=syz-executor.5 03:36:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x6000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:05 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) [ 577.970561] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000200)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_GETTRIGGER(0xffffffffffffffff, 0x80045010, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='hybla\x00', 0x10d6ffa4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) shutdown(r1, 0x1) r4 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x3d000000) r5 = open(&(0x7f0000000000)='./file0\x00', 0x1000, 0x40) ioctl$MON_IOCX_GET(r5, 0x40189206, &(0x7f0000001080)={&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000080)=""/4096, 0x1000}) 03:36:06 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x6800, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:06 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$FBIOGETCMAP(r4, 0x4604, &(0x7f0000000100)={0x80000001, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0]}) 03:36:06 executing program 2: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r1, 0x0, 0x0, 0x0) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r2, &(0x7f0000000000)={r6, r5}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000c80)={0x2, 0x0, 0x4, 0x100000, 0xff, {}, {0x0, 0x1, 0x6, 0x5, 0x7f, 0x8, "661b310b"}, 0x9, 0xbf065ae84e1eead2, @userptr=0x9, 0xffffffff, 0x0, r6}) write$P9_RREAD(r9, &(0x7f0000001140)=ANY=[@ANYBLOB="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"], 0x77) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00'/54], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB="4d00100000000000", @ANYPTR=&(0x7f0000000440)=ANY=[], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYRES32=r1], @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00`\x00'/24], 0x48, 0x1}, 0x0) syz_mount_image$xfs(&(0x7f0000000680)='xfs\x00', &(0x7f0000000800)='./file0\x00', 0x5, 0xc48, &(0x7f0000000c00)=[{&(0x7f0000000880)="487e78d91c2fb1c93b1bada1c911c80e2d675d391bfbe6cdf9f10f83065a2ff1d0f3e233e6953361cdb9111fe174e2114808426d0b416629fc55ba03444842aa1640581a6706927d7f24d0063fbfef52434e39cd8d8fc0fbbc363114c10da481187f4355a373edc92e65379505e15166094384c58f70c97260173fc22fc3e8dc6850297fdc32821b8de13ba306e3510e68d431ffe99a22926e2278e10f0cda629f170b096ab06a29ae52759dfa0a8fcc9b014aadb3fe38dfa0a4125f3ec56dc5339504baabfafad5dff5797df216f2a4c499ea7071258618d11bd46fe99185d43d52bbb389a872c24c2e8027ddc679", 0xef}, {&(0x7f0000000980)="853013f0caf558a8f1adcd36142200469225b3990113569e279aa68ee2d6030117bf6f3c89fddac3a1e594825063b94ba9e9741c7d9dc6d7ee41b18c3efe5e1572c4bb9daf49b2db7c14a5def580fea06e4977859acf7513159e08bd5c890d1d0890090a24507b1b608d1c44ddb6620025503de90922f7301361fbabcd6f0047ef7bd81f4d935bf5eb151b24eebb4235383e", 0x92, 0xffffffffffffffe1}, {&(0x7f0000000a40)="517de589a6c032ab8c22f940fea02866fd4337a3b7a2fafb1204c879a3744f24013001e46f4bbb859d50ae6bd35502c60710c04d717af64851a15fb5970d352dc182e870d42b11ec60a4857ab84ce7a60993b6e357d25462b487bc7f97fdc9e06a1641f8631c57162acabc67a9c8298803e62689072ed168a7002ae878d23989bd3e9d", 0x83, 0xecc5}, {&(0x7f0000000b00)="5a4c3b2f019c7138c9fa6bfd9fb8123dc84f0837ad6fc35907bc401c02288f1f2ae3c2cc945c49f7a1dfb657330bbf986afe88cfcc35dca183217b3b28a2025e1d809678", 0x44, 0x3f}, {&(0x7f0000000b80)="43298ef5797ef8b148cd1e414c6d0f7c2722e354dddeb30533a8bd34ea3f2e073e06341e5d91f9fca85e3494e451f8ff2a130f74099eb984780625e403b2cbe1e89341ee62348bd3f89e74d82c10d4126cfbbbf3927aa5a3eead9eb1f31aa33200", 0x61, 0xd9ac}], 0x10000, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"]) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaa2d4ae5523a9f31fc070000ff33aae1aaaa52b61b66548a3b726634f6bfa2b499223345b8f6aaaaaaaaaa0091000500810043000800450000240000000000219078ac345593638e99d9570801820ad61bf704c7ca0103a804ba871af9c4942721bcdca846cb28c828811c67215d52a18fe713da73eac72b9557b16700f9a488b5c249fd18819100000000000000000000000074a245d068ad00000000"], 0x0) epoll_create1(0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r11, 0x0, r10) epoll_create1(0x0) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() sched_setscheduler(0x0, 0x5, 0x0) [ 578.697726] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:06 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:06 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) sendto$isdn(r3, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000000)) r7 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r7) 03:36:06 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x6c00, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:06 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TCSBRKP(r0, 0x5425, 0x200) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) read$midi(r1, &(0x7f0000000000)=""/146, 0x92) 03:36:06 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x1, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockname(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1ff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x400}, 0x0, 0x0, 0x101, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x2106, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 03:36:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = semget$private(0x0, 0x7, 0x0) semop(r3, &(0x7f0000000100)=[{0x0, 0x10001}], 0x2aaaaac5) semop(r3, &(0x7f00000005c0), 0x3) semctl$IPC_RMID(r3, 0x0, 0x0) semget(0x1, 0x1, 0xc0) socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) lookup_dcookie(0xfffffffffffffffd, 0x0, 0xffffffffffffff24) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r4, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000002c0)='veno\x00', 0x5) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYRES32=r4], 0x100000530) [ 579.381231] net_ratelimit: 25 callbacks suppressed [ 579.381238] protocol 88fb is buggy, dev hsr_slave_0 [ 579.391428] protocol 88fb is buggy, dev hsr_slave_1 [ 579.396568] protocol 88fb is buggy, dev hsr_slave_0 [ 579.401705] protocol 88fb is buggy, dev hsr_slave_1 [ 579.478295] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:07 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r0, 0x1, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8, 0x20000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f00000000c0)=0x5, 0x8) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xffffffffffffff50, 0x161a00) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xfffffffffffffffb) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffdc8, 0x40, 0x0, 0xfffffd87) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r4, &(0x7f0000000040), 0x10) setsockopt(r4, 0x65, 0x1, &(0x7f0000000080), 0x1d0) close(r4) 03:36:07 executing program 2: getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x3, 0x0) timerfd_create(0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r1, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r2, 0x0, 0x0, 0x0) accept4$inet(r2, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000140)=0x10, 0x80000) socketpair$tipc(0x1e, 0x6, 0x0, &(0x7f0000000200)) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f000086fff4)) r8 = getpid() r9 = gettid() kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r3, &(0x7f0000000000)={r7, r6}) sendto$isdn(r6, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) close(r6) r10 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ftruncate(r10, 0x8200) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x4}}, 0x20) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r12, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000000000)={0x20, r13, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fff}]}]}, 0x20}}, 0x0) 03:36:07 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$KDENABIO(r4, 0x4b36) close(r0) 03:36:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x7400, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 579.712736] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x7a00, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:07 executing program 4: r0 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r0, 0x1, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, &(0x7f0000000000)) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r1) [ 579.861241] protocol 88fb is buggy, dev hsr_slave_0 [ 579.866399] protocol 88fb is buggy, dev hsr_slave_1 [ 579.872588] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:07 executing program 4: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xe9, 0x200400) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000080)) 03:36:07 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r2, &(0x7f0000000000)={r6, r5}) sendto$isdn(r5, &(0x7f0000000600)=ANY=[@ANYBLOB="e60a00007b0000009b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910299ce4f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"], 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r9 = epoll_create1(0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x80002, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) r13 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r12, &(0x7f000086fff4)) r14 = getpid() r15 = gettid() kcmp$KCMP_EPOLL_TFD(r14, r15, 0x7, r9, &(0x7f0000000000)={r13, r12}) sendto$isdn(r12, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r12, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0xa4, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x7, @empty, 0x6}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e21, @rand_addr=0x80000000}, @in6={0xa, 0x4e22, 0x7, @remote, 0x330}, @in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x2, @remote, 0x5}]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f0000000300)={r16, 0x0, 0x800}, 0x8) write$cgroup_pid(r1, &(0x7f00000002c0), 0x12) r17 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r17, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r17, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r17, 0x1, 0x12, &(0x7f0000000400)=0x8001, 0x4) recvmsg(r17, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000002540)=[{0x0}, {0x0}, {&(0x7f0000003800)=""/4100, 0xffffff5f}], 0x3, 0x0, 0x17b, 0x3e8}, 0x180) write$binfmt_elf64(r17, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 580.021258] protocol 88fb is buggy, dev hsr_slave_0 [ 580.026520] protocol 88fb is buggy, dev hsr_slave_1 [ 580.080985] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 580.181231] protocol 88fb is buggy, dev hsr_slave_0 [ 580.186411] protocol 88fb is buggy, dev hsr_slave_1 03:36:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='jfs\x00', 0x0, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') 03:36:07 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x80) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_u='version=;p2300\x05u'}]}}) 03:36:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x34000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:07 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r1, 0x1, 0x0) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0x6, 0xf08988069cd92789}, 0x6) 03:36:07 executing program 4: ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) [ 580.401502] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 580.426740] 9pnet: Unknown protocol version ;p2300u 03:36:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:07 executing program 5: getpid() ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f00000000c0)={{0x0, 0xf3}, 'port0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf7\xff\xff\xff\x00', 0x10, 0x0, 0x0, 0x0, 0x4}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637", 0x78, 0xfffffffffffffffe) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpgid(0xffffffffffffffff) pipe2(0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000100)={r2, 0x22}) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') r4 = semget$private(0x0, 0x4, 0x188) semop(r4, &(0x7f00000004c0)=[{0x3, 0x6, 0x466c69bab61ff16f}, {0x3, 0x0, 0x1000}, {0x2, 0x3b, 0x800}], 0x3) preadv(r3, &(0x7f0000000340), 0x3dc20aaff0f32f72, 0x0) write$P9_RWRITE(r3, &(0x7f00000002c0)={0xb, 0x77, 0x1}, 0xb) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000500)={0x6, 0x10, 0x1, r3}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/205}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0xdffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x2) write$cgroup_pid(r5, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x660c, 0x409d020000000000) [ 580.449133] block nbd1: Attempted send on invalid socket [ 580.455324] print_req_error: I/O error, dev nbd1, sector 64 [ 580.467204] block nbd1: Attempted send on invalid socket [ 580.472976] print_req_error: I/O error, dev nbd1, sector 120 03:36:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x400300, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:08 executing program 1: dup(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x2de, 0x0, 0x0, 0xffffffffffffff5e) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x4cd, 0x6, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:36:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 580.853663] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x8000a0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:08 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x87a29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6}, r6, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f0000000340)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x5]}}) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x40000}) socket$packet(0x11, 0x0, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, 0x0, 0x0) setreuid(0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) r9 = socket(0x10, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x24008080) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) geteuid() stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r10, 0x0) stat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)) stat(&(0x7f0000000e00)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r11, 0x0) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r12, 0x0) r13 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$chown(0xc, 0x0, 0xffffffffffffffff, r14) socket$inet_tcp(0x2, 0x1, 0x0) keyctl$chown(0xc, 0x0, 0xffffffffffffffff, 0x0) setresgid(0x0, r14, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0) 03:36:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf0ffff, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000001a130fede2beb47f9a5dfe590554b2a52a19047507042e29890a072f98307821595223133ac2f9037081e447e99ca8b94d0bcded22d685b90600fcf72844520df2c50322e71d8f0d2ca2d484cb671f4b2a98279498479e440e8b2cef928d8243361a859ac28b62dbcf9ef8080f98a04c44aea0980cade952230db1f2f3945d25f710eaeb0818a87b529a2444da2a4492987d5c03cfcf40219d995691bb3660e07286f7cddc1383c359302e8ef3a6a89419780b931cc8fa653570f2453a17a511fb984b188a6c73f70772971d7d6d056c5ea3f8d5e565019912b15a25317b616765569815013daa2b2a895d71961244292fe2131a27c57a184f00000000000008cf77857ebaa98b773d5e3c5e5b3057409013cb33c1ba54905dbc09b08eaf850a242cc60c0eef05022464ee25e88b47dddb850926d16a00"/345], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) write$binfmt_elf32(r2, &(0x7f0000000140)=ANY=[], 0x90000) 03:36:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x1000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:08 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x420000, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x7f, 0x8000, 0x4005, 0x84, 0x80000001, 0x9, 0x7fffffff, 0x2, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000000c0)={r2, 0x410b, 0x200}, 0x8) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001480)='/dev/fuse\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r4, 0x1, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000340), &(0x7f0000000380)=0x4) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r6 = epoll_create1(0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket(0x1000000010, 0x80002, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r9, &(0x7f000086fff4)) r11 = getpid() r12 = gettid() kcmp$KCMP_EPOLL_TFD(r11, r12, 0x7, r6, &(0x7f0000000000)={r10, r9}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\a', @ANYRESHEX=r3, @ANYRESHEX, @ANYRESDEC=r5, @ANYRESHEX=r10, @ANYRESDEC=0x0]) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x28) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xba6dec5f6aebd87e) memfd_create(&(0x7f0000000180)='\x00', 0x1) setresuid(0x0, 0x0, r14) r15 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r16) setfsuid(r16) r17 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r18) setfsuid(r18) r19 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r20) setfsuid(r20) r21 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r21, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r21, 0x0, 0x11, &(0x7f0000000500)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) setfsuid(r22) setuid(r14) dup(r3) 03:36:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:09 executing program 1: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa6971619b12258f7, 0x8031, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) sendto$isdn(r3, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) accept4$rose(r3, 0x0, 0x0, 0x80000) r7 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0xfd943a010da95d10) write$P9_RREMOVE(r7, &(0x7f00000000c0)={0x7, 0x7b, 0x200}, 0x7) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r10, 0x0, r9) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r15}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r15, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000002800160500"/20, @ANYRES32=r15, @ANYBLOB="0000ffff0000ffff000000000cb4010067726564bee55b3075379f2d01eea6fca2030000006b15300004"], 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'netpci0\x00', r15}) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, @mcast1, 0x1, 0x6, 0x8000, 0x100, 0x59945378, 0x4200124, r16}) getsockopt$IPT_SO_GET_INFO(r8, 0x0, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000100)=0x54) 03:36:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:09 executing program 2: socket$inet6(0xa, 0x1, 0xb4) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x19) listen(r0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x640000, 0x0) ioctl$SNDCTL_DSP_SYNC(r1, 0x5001, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00180600fe8000001700000000000d00000080000040000000b695dfaee47e2bb500004e20000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="600200009078000003037400"], 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000140)='eql\x00') sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000002800070500"/20, @ANYRES32=r6, @ANYBLOB="0000ffff0000ffff000000000cb4010067726564bee55b3075379f2d01eea6fca2030000006b15300004"], 0x34}}, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={r6, @multicast1, @remote}, 0xc) 03:36:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x3000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 581.752680] IPVS: ftp: loaded support on port[0] = 21 03:36:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 581.918361] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x5000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 582.031028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23998 comm=syz-executor.2 [ 582.061081] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 03:36:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:09 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0b0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x4d, 0x1}, 0x7) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r4, r4}, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r5, r5, r5}, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) r6 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="0cd5f2bff2233b428be81888c1f9b014397e554055df7371c9c75582e911c76ffd9197aaf46d230832f8f7bd4dad78ec80b11dec193972ce6fcd56718cdcff9011d4c477", 0x44, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000280)={r4, r5, r6}, &(0x7f00000002c0)=""/84, 0x54, &(0x7f0000000480)={&(0x7f0000000340)={'blake2b-384-generic\x00'}, &(0x7f0000000380)="b719a43324130a8165af406df6ff32e634e0aa22d3e05846cd93974521ad83f6bf1fe760c9407f302cc50c707d2803bf5399f4f57a9fdc803c433d62db7ec7b41d3a639ee08c60dc1b09e92afccf344564624fff5af54d40bf33acc0fef3e07bcb71aad17f9835d53075ee0fd410dc7d086787e813b799950ae1a3c16b45cd0b5883909935bc324812a30d9c406ce6343cc3bfd318642fbcb09f19a476714b82fb5a507014b12303e4c900e9bf5085150feccaafd98dbd34a9e5c957930cc5229b31ca716713f445560925f97614758e7b0bff35e9d89e0bcd4a8cf65ca4c594bbfa8964d46c1b8e3a6bb89c1404bc1f3c", 0xf1}) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x64e000, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r7, 0x5) sendto$inet(r3, 0x0, 0xfffffffffffffed4, 0x4000000, &(0x7f0000000100)={0x2, 0x10004e23, @empty}, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SG_GET_SG_TABLESIZE(r8, 0x227f, &(0x7f00000000c0)) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r9, 0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(r9, 0xc0585611, &(0x7f0000000500)={0x434037e9, 0x1, 0x4, 0x20000000, 0xb1, {0x0, 0x2710}, {0x5, 0x2, 0x20, 0xff, 0x7, 0x9, "4144cc2e"}, 0x5, 0x4, @planes=&(0x7f00000004c0)={0x3, 0x10001, @mem_offset=0x2, 0x8}, 0xfffffffb, 0x0, 0xffffffffffffffff}) read$FUSE(r10, &(0x7f0000000580), 0x1000) r11 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r11, r11, r11}, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000001580)={r6, r11, r6}, &(0x7f00000015c0)=""/42, 0x2a, 0x0) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000140)) 03:36:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x6000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:09 executing program 2: bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) shmget(0x0, 0x12000, 0x0, &(0x7f0000fee000/0x12000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000540)=""/88) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0D\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90x0}, &(0x7f0000000040)=0x14) sendmsg$kcm(r2, &(0x7f0000002780)={&(0x7f0000000080)=@ll={0x11, 0xf8, r3, 0x1, 0x8c, 0x6, @dev={[], 0x10}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)="e0992c7f6ce53465e3c660323d1b69430d42f5aaf328821a3d19e7d4a6735ecd1e0a7ca1536377040369f2fa42400da122143b6e1964fc45d85f30e34b76ceea34109f97a31edf02041d348b2022b5ca007abb4bc684255eafe25947c0943b609f4eede0ba5b1848f74aa2bddcb9fa5eddac4ce7d473bec665452388cff98953ad696984e1a474260e98e1a95a190f20c23e0ff602aa635a6f7684e42d813660deeb573375a8d4a70106d72ed0a40312949a", 0xb2}, {&(0x7f00000001c0)="e4fd2b279839e739ddf261d3d20f43d08bf2fd16ac1199aa0e79cbfbca14932a238bda530c8893c3800484c02815b297f014efad7dcd92fa5cd4149d2b9afff756d0f55bd8ea3b46d00e3a2a85c3d9", 0x4f}, {&(0x7f0000000240)="7068c3429b6015eeb427255e38880935b0c6b964cff8bc42b9a782d428bf4580ecbf26bf1b85bf4564e7eb67e57b90c35253818bbceef7", 0x37}, {&(0x7f0000000280)="9fc3282f170a74c8aadf3853a9287bbf66c0b451a6a93e44b96c12a3f7a8ac0ae79ece52a02053c29a0eda00fcf68ddc7cc046ffb4afce0c25561b4420e1ad652785b982520ccec42c3c5062ba1baddf6128513d6b0e062d09e835a2c65c3b956e7b32e9e7a4cc33d99d608862fc8ad35bfd3a65e8f1c777772d120d14a492f7184fbd53d4dc18721f823bba7f1a48b78768c1ba327a6baebb5fd11795882d7e720fc51dc79d263a88d9686032730f8d3e0cbbe007416f5254d43dca98cd81576ae544c8", 0xc4}], 0x4, &(0x7f00000003c0)=[{0x1010, 0x1, 0xf594, "7692add1fab49413a52414abc45ed1765ef32ee5d49497479ce06f4322d3d465166177beb97ebf7af0e5c782c01bae6b8d5b0e478a4b9332a04c51a136cbbdea6e7bf930b945717a5b0814ece62c99850b8c05a5eca92d0d3bb5efff9192f7d4bb5d6da96fb54d5fc91497581e14a977b9b337ff20995c52c203c1a0969e1e7f98e42ef40f87c631a54fbd7ff8cc6f1c6d12246295095757915cb651b942b60f4553af8d205df5c4c39cd9c03bb7957e31e9111a340acc0772823f43ff2430129b415e96a7513443d3c8b1210c4a662f5988038f65baea27b64a6c8e69117080210d9cbe6d06e9969251fbe5718164b4af42762983a4e1ceaa621c6a093429c50933ee248d7127bbd3dc5fff35b725fea98c3fbe6aa4c30edea0ef293fef815c50b2ffb77898159ccb5c0985f6b9c4e855c4de4451b3db948f8d116182b7727e61e833f983d01ba16dcad1147b719ff45bd73e3ccb195b602e832d72246f36cf36d1466974e4656fc7e338c32851d778c17b842cc5f57493c4b1ffff3e9aa56cca0d34c3bb0e91e4b686a285c9c6b628f4618e0d2c6331efad65b67e334a72195bb1cc9074380000049c44551f0ce3d76207eebe672159eb519f1899063a6b454c3d0f6736792aadb4d7a9c5fd82763ce05f6e9ae60a0c50f1b329da7349b574358692ecc5078046634bb9e8c152f8144d54e6391ef569e52166acf81fd769567b26baa33c90b88560a17a6c275d0905de7c53715f47f141048a64c8c1f0eaa06a58489e90823a4b3b5d12feee5cb61f828a3bd81fd9ca88ab599b1540d6c10558a719b2811b4ca815e6f8f6a64a967ed54b8e6b434c42242e5dbcb8ae871d168708a838f1602c0085432ff2d1f5e694c264b71afe0c2b015037265a97fcb7eed938393daa847065788b33c01bec0632c7d854be0e4e4132310728d95186b025a4ee9148529edd8df8c1519dabccd07da56057b839a2463bb6f39bd6e717e09e34cfb15e74b58123ffe9f836adb0b125f8843c2f0192cbecb176773f641b020f210e547e22ad3cb19fae3221a6e26623875ae827f51d5e11a3199c722a78613d68fde2069613ba2c81fa27e7afb5569a3f8d40efae08982a08a0e57a905870a5473d12fbc2948bc509b6ac7112271f43286ee8ad597baaf096a8eb7b0f5fdcd82c1f49a8df086f5dd9a63e0d96a48b7048ced19c5762e9f60b3151022bcf109fb1c4701bdd6a0815018d5df16fd486c7a3c6c713ddb46e0ba1746c6ee253523646c21c2fb213a8f75e59bc1d145be50cb2b77d8bf18518fff289edb6788d6b671afbd2d78e29f0affc021ca34af07a0bfce22a5c62aefe0c102634760de19c064febcacc9d9f120d1eeeb6c427bf90a219b9fb7753e94845d4ffe937d0531d7b322c47f83d9277817353fc40061a44f670b01c81e1539de916562d656b19fcc2d554ea5d60f61d62ade86ebc7e0d4fc34557bb4a27f0fe0ccc9a942e211bfaa3d74ef47668d8b64d02b165e2fd07955004b5d8f805cee47c7833901fbac89c54c9ba5badb5dac10d3c4f90adce08732a2d1358679e48ee91c3859f5de400fa079703710d2d10e84a98859d785f34d5ef1b0535cf63cfac0ca065561ee15974f01feb6557951700aa68b3725bca9972d5c1819a3b087c9b5450f96ffdf4d6613db4cc6afea73d2e2ee5eb7f94010e0b41b3a8671624d14d1f0db8bbcb2b67070214a51a1cbd8eae834f4019066cf3765e6b0606c8d8c8a1624445484dc1dfad69da53f7a6fcc34ec1d108bf0424d785e55487eb55477fc4a8899b2c4dc6b63fe8e401f86f1fbee195ab68f3d8323c97a1232c0d24ffa632d35649be56d45fac8493f6b52fffa814fef5c5d042ded341f327147df60934c467c479f1c9fdff16b65f5834fba64280842baa54370221ec24aeb2e250ca13ec6527d9c2ba252f45dc270f19ef7b58756f8bea6c4f133b9a3a94d8f31f16c63af1eb7d002ed1cfda1c2d2e00f764ee94b6c24dd66946009c9d5f0799bed23f089652542f82baa7719ff40a297a4478d975fa8e0606a17f46aa0b8569c2619133396036edab6312aebd0523c444802de74fad6aa92a9fb12eaac8dbb8f7d02b9a4ff8bcaefb59be29bc218736b8db81bfffbc01625da9a6eb602157dfe82b14c2414bbebe3792903ea0e0275f797f372fc1aba53f773e41c13bca0f5e5a1d1ecbf2bce0de00bace42e68dedf9aac311b450c10c0ee6156401c63d8e6d081948eee8fddffda195fc4f731f6f0cbb8880b537bac0baf7e341f686677cd9154f432b97da580fc050fee3c17999104347e8769a4d969641c874f38b33e25941e07a6441091f188e6a0ede7289894e5bf8cc133da2505ffd356620ded2052706c6486b0ce9536c9131e3556657bab54e98944c45e6e201fd8a2ed19eb24d72c7c2320a9dfa99eceb069c87ddae7c9396d24adbccbffeaf4ce03902cac23af227142d3a88b503898b8414a24e962d334d0fd1d602036b187995cb94eb3ebbc33f3577d510f82bfe56330be3a02c8c5686255943a72ccb52bf459dd1f149483d834bcd563c7a66706ade4543d6e0e42b1be9cca21b32d5e64af3302daeec94b6d2736474f9960a5ad0c5c2cedc1934346acb670abff0bce321781ae1a4fb0ac5533b4d293ed3e70d80ae2329db875febf9d430d9d6ffce3142fce7a007ee86bd0fea79bbcce30cec6ba175f98681e91259eaf4795a07da61f762ac010687067f588fbd33d7b6941a5dfd4b1d80370600cd4846cc96b63e8b6eb31e0704193a0b806284fa741fa89d262dd00bf8aecc3cee2038a2958767e90027a1d71bb5a19ca95c0d3bc649bf2c811cba552ff8c2325616a8e3fdd58c6ccf8b21b101552fec068d1867285633edd220066b89f5683507b80fecd09eff31a0d67ab6ee25954eb8175993a4de1a76b6d2f35bd7140d8dbeb0321c04a72491101b0def0cb199dcfc47831c9ad7e0d13f091ded4e35224c9253336330faf9680376b123ef34f81c607f8ea8557eaff475b2b7bbc2cc5a84448b6a0ed4e4125e4bc2705ff3ebe6ba09179f2295b6ddceeb103fce2df5e73081219eca7dd9f2f301cfa33b3615eff12ba2d9dc7639047cf7f3b220217693c208d945f4ed97708cfe9ef4d185fc111c4f1074dda7efc6ffdc6c96df809d297d5268d91f480ab5e9669b205b3fdb070d1c688479acb5a0f6540e061460a504fd9575704ade17a9bd61e83c9928341fc9f99f81b4cd50411d9eb2e08808bb0a7e859bda5e4d0b58317701f1a51dd66830f83ac2ace76a8bea383d5d58646bb82c2002f32552a28e6656efd4bd1d110734a1ebebbad10731af1524bd5b863ae5e6eccd1d861f05ef59660a9e092c0af962820929435c5cf9509c0f5a514f7b8a7f42bac236d420d16f391383a8040b0addd011e2a7883a557c3d91064640d81702a4d5b9ba546a9d28c21b3eeebac1abb9a3e59598608833c2b9c49d7f556b4959bd93ad98cd331c25f511d5571b2c3be7fd550284c8d5a5f13a21c8d059e4e80af07fe94bdd752008fcc40c9ece075b3967cb24a60355f6218bdb94a7dd28ed61f811e1de808717975900100c9b67245d8d52a84700733106bbac05bcd02f35ec11406c186b0bdcafd0bcbae5a143c78ae00a954e7df6a97e5f480de953e913565030dc57344f538b12d914790e050861892d3eba6f11cf0f83104503b6e0445e4a49cee88f5d74013a37d5bfb1b526eb74053546dc53f2c27a6d7527fe9440001a92f6f9e25b8e9a2616c54977e4c942969c4d6614ef9788412d6f5abd1198c88e022de64fadcb65984a8012f8d9b5144927f15392353cdc31e0098d23dd0e3d0dd749c6925af037396ae78db44e88aad84b3b02177d2792d7accc972375b07f736764d669da33f0b4aa80bcbb3f9ff1218fa17f02ba440c193c923a93b537dc5a0695a17ff548f8f02e17cbbccd1a1904d1ee581885030e8b0b2031832e292d37d24796df71ff2fa5af7e8ab9e24b85fd851d1408310ab81c679b3b83cbc119f3ba29de5833df0f1a80a34cc55bf730bed5aa890dd546a79918ed751e13039dd6f9771dd118cf31f7bfa96e38d5a93dfeccfe9b38d17b12b41bbfde7bbc34ac864e63825234846ac46b1293fe66c5393bdc3ede646d46c7d7846f2ab52f11ea4589c19f09a355ed7815eb8c6cc4463ab379bdfeee805ce18956a6064cddc0a2e167ad1159818ea2e7cfe935981d3f9147371aa5238caa8c4794bc37083ecdcb649b811023e9ec61a65b55d1a22d528190550fed11be577082baf0c195d24143c7db4af6e99fe30727582a4dfc3e6fdbc1f09ef62ab3b801bd8eae6c360627d7acb16abb8b35abf92060623b5dbe16278239570f6b84633a516e80d76fa1ec3b04e7d0fb8a2839077c29066942de0428e417602c334f546bebaf278074b2bdef41a0b42b10246d9fa7aa2588dd437090ef7f407890021f8adefd7c7a9d6dc2bb7d6ae469a714814bce6e016121424714b61c9ce078fbb3e3b2d155667d12bc15691733732eb7f859a0ecfd7d30bd919a17834331b1d9b2d8febd18a16db123918382614d5c628297185f1557bc73c834a717ae8a654b4408105df7e8c9d81d59233d31fc01b226d1a30cde331cd2816367b10296ffba712d8e15b613e23bf6e183be3c5e9add23efbb02cce89a4ae68b6bb92edc2b267b14e830e54e2a0b7b7db20bb731501aebf26ca51b62babfb00022e7b38138b2c782a6edf886b00e3d898fe610c0e99e7517e4d22a3b160f930ecba666d2b5ce3453430e63991f7aba5f2f79b9df227c484599027ae44d8eccc1c02ff8ccb01333f8abc8dba8b70670a863361520ea8f32c53a5c88355ce8f2bf409b7eec9ab2cd9eb36aa9842ce25b3acfe0fbf514580bce63561d1ac274427beb14a14148745f92718e621c91335b68938fa1154a800aaa98a72b517617ee215d821e9a1ed77436b3d83d9114f01f4f820a9a00bfeab6097423f0f64f8e115935621c95694879fe56133793632dbdc7ed29510c3955a8e94379a223d82975aa5b41bd2adff6bfad46610919c65aecc8f219cb875eb9c962e4d2657d6b6a9cc2b4cdb0dabdfba7328729dc24a1878a159ba3f8d76a25146edefbbe9bb4038fcedf9ed4227e410ff7d2d593bf0d58525bea159c507198d65cab6d5b60d78f557c4fcd70e393da7e05d3476eb1ea746678722aeb84015b0c53580d033966ce2ef2e1ba4681a54dca8333ba33f8d74924f7a611960815d4b949c7b9d4ec62310b40522f0c2f4468c3f67d8bd692cd7f63841c9f40b165b514073c96163f5f02c44be7d4073118690be8a71421c9bf39d26c8c42ebc6afa02342a4b4395fd35b05d66c1feb13fc73ce69daca896d080ca47b7069d64a4d62a119eb54916751f5c7d44b315a02e5ec2ea6a75c1b0fd4fbbaf92dbc8e198c628ed80c5bb9c68d8f8f94dfa1a430d3a3c2d9bfdcba2f5689c4c000e5c9b28ce4cd4a3f655df8f722ebf1c79e3af792dc52a283950ea1d6aae4138c1bfd6e00a231cafa9ebe2d0af3e3be1418f2c776edadbe8d90bb866b530c088706fec0fe7ecdebaaefaa29709b75886026ac2437c9deb2415194b347a457bdd9f27b2f1f1a65ae555df64a076b58f09e0ce44cd74a27fd582b53f3661d903aba0c0f2fab8cad5df8f86f24219a4024b4146bf0c499aebfcf183ece46cfaa2782fdf4f1c14b2f4644304a7eb2b2f813080b2f86787c3ed6ad4e3865412f96d4b76714006c084131bff8e44ce14b878f9011ab1ebfacf512a84d70229a"}, {0xa8, 0x10a, 0x6, "c64ed3ad9227c31d187b4b57adf0019841b049edcdb7adde119e79a2631a8aac37fcb0d209be68e2fa221d7b33fb06e3235e76f8c025b4e9d91b18aa734c3ac5961c26b8e6ca4c543f544a45dd65bf4f772c04b88488f7bcd6d7dfa050813f509290f30e26f10716c0d538e1bcbba5b0541487144bb0fbb1102c58fd16494b37bdaeffec48b7d773365cae14f9712f123784e81d03a3"}, {0xb8, 0x10e, 0x2, "d26ab48b2b82bb9ae0082af0a20a2a9281a567a95a998712b24e9f996c4cd1ec07cdd251a59c74c28ce2c87e993e8bce6201782822c8d6a99f259e14455a32c60590813a9b974d70e903c496586830febfbd968ab2cb45cfa32fd0c310d4d3b331a9bf8dd0245ff7452f6b1d5f0e8ed83edb709c6ccbf930a95a6712074e13443df6e9a8c129bc834b308a8d9fd7e8f48601861edb1563e35364f867c8959c1fce77efdd49b6ed"}, {0x98, 0x188, 0xfffff801, "fce363d23ff3975cd3e5ca4513178b9b787c0f74f34419106e4b2364afb5c817a69feb6da188f0f0ba717f0c6e9ced78af665090f39cedbb52bda0c3f29cea0052591c159ca2fa0dd6421627f78718da5bf802d343936d3463263bf67e8fc422e606ebee21d7153d714f901af50e1073d8fbc4d0352b842e5861869949f4329c7e"}, {0x30, 0x105, 0x517, "c747ac09ebeb8f822f1e31e374a0b928882af513f342e5168df7b72cbbac4c0b"}, {0x1010, 0x10b, 0x5, "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"}, {0x110, 0x19d, 0x7f, "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"}, {0x38, 0x1, 0x5, "0b3fa9b75d30a2826d530a31f56969d9e8580ae1fb719729bac45f9f5544a88b56c75959"}], 0x2390}, 0x4000000) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x60840000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:36:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x7000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 584.154731] overlayfs: unrecognized mount option "upperÔir=./file0" or missing value [ 584.178847] validate_nla: 8 callbacks suppressed [ 584.178858] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 584.235633] IPVS: ftp: loaded support on port[0] = 21 03:36:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xa000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 584.501254] net_ratelimit: 30 callbacks suppressed [ 584.501263] protocol 88fb is buggy, dev hsr_slave_0 [ 584.511438] protocol 88fb is buggy, dev hsr_slave_1 [ 584.752028] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 584.932262] IPVS: ftp: loaded support on port[0] = 21 03:36:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xe000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 585.141413] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 585.633424] protocol 88fb is buggy, dev hsr_slave_0 [ 585.639556] protocol 88fb is buggy, dev hsr_slave_1 [ 585.646250] protocol 88fb is buggy, dev hsr_slave_0 [ 585.651631] protocol 88fb is buggy, dev hsr_slave_1 [ 586.112124] protocol 88fb is buggy, dev hsr_slave_0 [ 586.117746] protocol 88fb is buggy, dev hsr_slave_1 [ 586.262849] protocol 88fb is buggy, dev hsr_slave_0 [ 586.268540] protocol 88fb is buggy, dev hsr_slave_1 03:36:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x2, 0x200000) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x3f, 0x0, 0x1, 0x101}) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0xfffc, 0x0, 0x8000000055}, 0x98) 03:36:13 executing program 2: gettid() r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x1000000010, 0x80002, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f000086fff4)) r3 = getpid() r4 = accept4(r1, &(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, &(0x7f0000000180)=0x80, 0x372d47910206783e) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e21, 0x5, @rand_addr="d3d2d763b9cfcc6391fbead7057eb762", 0x1}}, 0xfffffffe, 0x1, 0x9, 0x6, 0x8, 0x80000000, 0x81}, &(0x7f00000002c0)=0x9c) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000300)={r5, 0x2}, 0x8) r6 = gettid() r7 = epoll_create1(0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r9, 0x0, 0x0, 0x0) ioctl$TIOCMBIS(r9, 0x5416, &(0x7f0000000380)=0xac) r10 = socket(0x1000000010, 0x80002, 0x0) r11 = fcntl$dupfd(r10, 0x0, r8) r12 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r12, 0x1, r11, &(0x7f000086fff4)) r13 = getpid() gettid() r14 = epoll_create1(0x0) r15 = socket$inet_udp(0x2, 0x2, 0x0) r16 = socket(0x1000000010, 0x80002, 0x0) r17 = fcntl$dupfd(r16, 0x0, r15) r18 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r18, 0x1, r17, &(0x7f000086fff4)) r19 = getpid() r20 = gettid() kcmp$KCMP_EPOLL_TFD(r19, r20, 0x7, r14, &(0x7f0000000000)={r18, r17}) kcmp$KCMP_EPOLL_TFD(r13, r20, 0x7, r7, &(0x7f0000000000)={r12, r11}) sendto$isdn(r11, &(0x7f0000000600)=ANY=[@ANYBLOB="e60a00007b000079a072dbbe176c8835ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70972f050000001a84f8bd51e864142d41ac2b4e000000b6c8849d3a2ee8b3aef9ca1e622e39a70c7201002e6e432222ec8a3425dac49a9826cbd3950717c23296a44000"], 0x1, 0x48000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x4}, 0x6) ioctl$SNDCTL_DSP_GETOSPACE(r11, 0x8010500c, &(0x7f0000000340)) kcmp$KCMP_EPOLL_TFD(r3, r6, 0x7, r0, &(0x7f0000000000)={r2}) ioprio_get$pid(0x1, r6) perf_event_open(&(0x7f0000000000)={0x1, 0x1e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x40003, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 03:36:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:13 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12) perf_event_open(&(0x7f0000000080)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$smack_current(r0, &(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRESOCT, @ANYRES16], @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRES16, @ANYBLOB="0b37383f709bcd40afdf26e9e9ca5979c9b6cee992f232e3a79f58c869615ce6c3677c2a9635a5d853f17a97c324eda47c67b8848878ce2e35f1bf30a48dd56a9a259c7adf7a1fb37776ca7320418aabf8733015f028c7c0a874dbe204c30d80a4beaba44b08b5d346e9607471050b322128db4bb7e4a8d863e727bd6e7732418ac32ccf2d08e8cda84f3f70d273e8d84d02dfdc761302e0f27aadfd0ddf3b3b234c472c565febc259b6aefa06090d89c901a05ca88d8d7b1ed358254ff6f7c490010df87bdd58062cc8f17f0cca03f721", @ANYRES32=r0]], 0x1) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) 03:36:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x20000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:14 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x8, 0x8, 0x6, 0x92, 0x0, 0xff, 0x85044, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x4, @perf_config_ext={0x1, 0xac4}, 0x200e0, 0x6, 0x9, 0x1, 0x0, 0x1, 0x6}, 0x0, 0x9, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1000, 0x5b104573019a95bc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x10600, 0x0, 0x0, 0x1}, 0x0, 0x80000000000, r0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0x200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x141000, 0x120) ioctl$TIOCGETD(r4, 0x5424, &(0x7f00000001c0)) r5 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 03:36:14 executing program 1: mkdir(0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socket$tipc(0x1e, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_read_part_table(0x4, 0x2, &(0x7f0000001380)=[{&(0x7f0000000380)="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", 0x0, 0x80000000}]) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x101000, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000180)={0x43, 0x0, 0x3}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r4 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, 0x0, &(0x7f0000000100)) getsockopt$inet_udp_int(r4, 0x11, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$VFIO_IOMMU_UNMAP_DMA(r2, 0x3b72, &(0x7f0000000340)={0x18, 0x3, 0x8, 0x800}) [ 586.791279] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x3f000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f0000000040)=0xffffffff) eventfd2(0x20000, 0x40801) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='cmdline\x00') read$eventfd(r0, 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x180000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)=0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x2, 0xa5, 0x7d, 0x7, 0x0, 0x8, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x118, 0x200, 0x931b, 0x6, 0x7, 0x101, 0x2}, r1, 0x4, 0xffffffffffffffff, 0x3) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xb9) unshare(0x40000000) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f00000001c0)) epoll_create(0x3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) r5 = getuid() setreuid(r4, r5) ftruncate(0xffffffffffffffff, 0x200004) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1000, 0x82000) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) gettid() r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x9b\xa8\x00'}, &(0x7f0000000100)=0x54) [ 587.072964] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 587.372638] IPVS: ftp: loaded support on port[0] = 21 [ 587.413981] IPVS: ftp: loaded support on port[0] = 21 03:36:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000040)=0x1, 0x4) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@generic={0x86, 0x8, "879e2a31010a"}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 03:36:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x48000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 587.722705] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x49060000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 587.943577] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:36:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x4c000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:15 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) recvfrom(r0, &(0x7f00000015c0)=""/4096, 0x1000, 0x4002a161, &(0x7f0000000680)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @loopback}}, 0x80) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$packet(0x11, 0x0, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') fchdir(r2) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @rand_addr=0x8000}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x8, {0x2, 0x4e24, @empty}, 'ip6_vti0\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') fchdir(r3) sendmsg$nl_route(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x900002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="1404000054ece91c3e6a1a000087a4ca524b4469190100eb0000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) write(r2, &(0x7f0000000600)="6bf56afc50a0e93aa38d0facf12695984e76406b06a8fcaea5bfde971649c8b91c3a66895a3758bddd5cf922e9a70e0eace50a5f2209b0ebec191932b8055134ac", 0x41) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={0xffffffffffffffff, &(0x7f0000847f95), 0x0}, 0x20) poll(&(0x7f0000001580)=[{0xffffffffffffffff, 0x500}, {0xffffffffffffffff, 0xb041}, {r1}, {}], 0x4, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') fchdir(r4) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f0000000500)=0x0) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000004c0)='./file0\x00', r5, r6) syz_emit_ethernet(0x66, &(0x7f0000000740)=ANY=[@ANYBLOB="0180c2006c00f7ffffffffff867f050dff0000000300f588ffff020000000000000000000000000001860090780007080060c5961e0004000005010000000005001814869d9500000100000000000000000000ffffac14140118561e3a117e9148c1dab0ba1d93095652d6d51dbd6c75346ff4ca2e3df0e7ffc1ed4e21ce2ccea81a774c7f3935305fa246f3893c5d86bad88e450342475800"/165], 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff96, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x285, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x4001, r8}]]}}}]}, 0x38}}, 0x0) [ 588.169434] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 588.262594] IPVS: ftp: loaded support on port[0] = 21 [ 589.781249] net_ratelimit: 20 callbacks suppressed [ 589.781258] protocol 88fb is buggy, dev hsr_slave_0 [ 589.791429] protocol 88fb is buggy, dev hsr_slave_1 [ 589.796573] protocol 88fb is buggy, dev hsr_slave_0 [ 589.801677] protocol 88fb is buggy, dev hsr_slave_1 [ 590.190707] IPVS: ftp: loaded support on port[0] = 21 [ 590.261277] protocol 88fb is buggy, dev hsr_slave_0 [ 590.266430] protocol 88fb is buggy, dev hsr_slave_1 [ 590.421325] protocol 88fb is buggy, dev hsr_slave_0 [ 590.426459] protocol 88fb is buggy, dev hsr_slave_1 [ 590.581291] protocol 88fb is buggy, dev hsr_slave_0 [ 590.586507] protocol 88fb is buggy, dev hsr_slave_1 [ 594.901238] net_ratelimit: 30 callbacks suppressed [ 594.901247] protocol 88fb is buggy, dev hsr_slave_0 [ 594.911364] protocol 88fb is buggy, dev hsr_slave_1 03:36:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x60000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:22 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) 03:36:22 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={@null=' \x00', 0x1, 'syzkaller0\x00'}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_IO(r0, 0x2285, &(0x7f00000000c0)={0x53, 0x0, 0xfffffffffffffd61, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000440)="618732f9df1d", 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) fstat(r4, &(0x7f0000000140)) [ 595.440830] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 596.021312] protocol 88fb is buggy, dev hsr_slave_0 [ 596.026480] protocol 88fb is buggy, dev hsr_slave_1 [ 596.031678] protocol 88fb is buggy, dev hsr_slave_0 [ 596.036770] protocol 88fb is buggy, dev hsr_slave_1 03:36:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x60000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:23 executing program 1: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r2, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7) execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040)=[&(0x7f0000002100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac']) 03:36:23 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3, 0x0) 03:36:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x68000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:23 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mIS*Ntimer\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r1, 0x0, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) accept4(r3, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000100)=0x80, 0x180400) r5 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r5, 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, &(0x7f00000001c0)={0x3, 0x0, 0x2, 0xffffffffffffff63}) ioctl$DRM_IOCTL_AGP_BIND(r4, 0x40106436, &(0x7f0000000200)={r6, 0x6}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x1, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket(0x0, 0x6, 0xfc) fcntl$dupfd(r8, 0x0, r7) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$bt_BT_SECURITY(r9, 0x112, 0x4, &(0x7f0000000040), 0xfe63) close(r0) [ 596.362812] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x6c000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 596.501313] protocol 88fb is buggy, dev hsr_slave_0 [ 596.506502] protocol 88fb is buggy, dev hsr_slave_1 03:36:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4, 0x0) 03:36:24 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x402, 0x0) r2 = epoll_create1(0x0) read$alg(r1, &(0x7f0000000280)=""/4096, 0x1000) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) setsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f00000000c0), 0x4) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000100)='ns/net\x00') fsetxattr$trusted_overlay_origin(r7, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) r8 = getpid() r9 = gettid() kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r2, &(0x7f0000000000)={r6, r5}) write$P9_RGETLOCK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2ef9ffff1000000010", @ANYRES32=r8, @ANYBLOB="10002f6465762f6d4953444e74696d657200"], 0x2e) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) [ 596.571345] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000400)={0x6033bf14, 0x5}) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000500)=0x6, 0x4) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r4 = socket(0x10, 0x80002, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565b, &(0x7f0000000240)={0x1800300f, 0x4}) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip6gretap0\x00', 0x10) sendmsg$kcm(r4, &(0x7f0000000100)={&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2, 0x1, 0x2}}, 0x80, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000440)="106cc83c2702b6808ff3eb621c6f217c280c482c3e4b997e8cd9143c5a7aa7d8d6009d62ad311f3d4968cac97282506857c73d11565d2c028ac63a03e4c9cd4e907cef0a318d35715162cebd0408334761819eb4ee727b", 0x57}], 0x2}, 0x60040040) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$session_to_parent(0x12) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r3, 0x40045730, &(0x7f00000004c0)=0x2) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r7 = accept$alg(r6, 0x0, 0x0) sendmmsg$alg(r7, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r7, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0xfffffdd7}], 0x1, 0x0, 0x2000000}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) r8 = epoll_create1(0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = socket(0x1000000010, 0x80002, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) r12 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r12, 0x1, r11, &(0x7f000086fff4)) getpid() gettid() ioctl$int_in(r8, 0x0, &(0x7f0000000300)=0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x84, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x100000001, 0x98}}, 0x0, 0x2, 0xffffffffffffffff, 0x3) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0xa00f0000}, 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) [ 596.661297] protocol 88fb is buggy, dev hsr_slave_0 [ 596.666482] protocol 88fb is buggy, dev hsr_slave_1 03:36:24 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x5, 0x0) 03:36:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x74000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 596.863087] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 598.821455] IPVS: ftp: loaded support on port[0] = 21 [ 599.020934] chnl_net:caif_netlink_parms(): no params data found [ 599.053497] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.059948] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.067822] device bridge_slave_0 entered promiscuous mode [ 599.206680] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.213465] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.220484] device bridge_slave_1 entered promiscuous mode [ 599.239547] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 599.249818] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 599.270442] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 599.278452] team0: Port device team_slave_0 added [ 599.285633] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 599.293367] team0: Port device team_slave_1 added [ 599.298960] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 599.345987] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 599.393304] device hsr_slave_0 entered promiscuous mode [ 599.441664] device hsr_slave_1 entered promiscuous mode [ 599.529914] device bridge_slave_1 left promiscuous mode [ 599.536584] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.582355] device bridge_slave_0 left promiscuous mode [ 599.588485] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.181266] net_ratelimit: 20 callbacks suppressed [ 600.181275] protocol 88fb is buggy, dev hsr_slave_0 [ 600.191384] protocol 88fb is buggy, dev hsr_slave_1 [ 600.196522] protocol 88fb is buggy, dev hsr_slave_0 [ 600.201624] protocol 88fb is buggy, dev hsr_slave_1 [ 600.661380] protocol 88fb is buggy, dev hsr_slave_0 [ 600.667083] protocol 88fb is buggy, dev hsr_slave_1 [ 600.981264] protocol 88fb is buggy, dev hsr_slave_0 [ 600.986404] protocol 88fb is buggy, dev hsr_slave_1 [ 600.991569] protocol 88fb is buggy, dev hsr_slave_0 [ 600.996630] protocol 88fb is buggy, dev hsr_slave_1 [ 603.573726] device hsr_slave_1 left promiscuous mode [ 603.634884] device hsr_slave_0 left promiscuous mode [ 603.686779] team0 (unregistering): Port device team_slave_1 removed [ 603.697546] team0 (unregistering): Port device team_slave_0 removed [ 603.707977] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 603.755431] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 603.837696] bond0 (unregistering): Released all slaves [ 603.906299] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 603.915386] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 603.930875] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 603.968345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 603.980747] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 603.993168] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 603.999344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 604.006573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 604.016660] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 604.023022] 8021q: adding VLAN 0 to HW filter on device team0 [ 604.031850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 604.039084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 604.047118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 604.055067] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.061464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.068693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 604.114037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 604.121335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 604.129339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 604.145080] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.151510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 604.168360] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 604.178141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 604.197368] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 604.209418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 604.229385] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 604.239211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 604.254899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 604.268660] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 604.287296] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 604.297706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 604.309733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 604.328746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 604.340154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 604.356520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 604.369726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 604.384733] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 604.396341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 604.413512] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 604.419587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 604.454354] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 604.469001] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 604.478005] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 604.490726] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 604.505883] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 604.709294] sd 0:0:1:0: [sg0] tag#3175 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 604.718201] sd 0:0:1:0: [sg0] tag#3175 CDB: opcode=0x61 (reserved) [ 604.724662] sd 0:0:1:0: [sg0] tag#3175 CDB[00]: 61 87 32 f9 df 1d 00 00 00 00 00 00 00 00 00 00 [ 604.733758] sd 0:0:1:0: [sg0] tag#3175 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 604.742950] sd 0:0:1:0: [sg0] tag#3175 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 604.751921] sd 0:0:1:0: [sg0] tag#3175 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 604.760879] sd 0:0:1:0: [sg0] tag#3175 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 604.769949] sd 0:0:1:0: [sg0] tag#3175 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 604.778893] sd 0:0:1:0: [sg0] tag#3175 CDB[60]: 00 03:36:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6, 0x0) 03:36:32 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000000)=""/229) close(r0) stat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)) getresuid(&(0x7f0000001680), &(0x7f00000016c0), &(0x7f0000001700)=0x0) getpid() r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0xc40, 0x0) ioctl$USBDEVFS_BULK(r3, 0xc0185502, &(0x7f00000001c0)={{{0x1}}, 0xf7, 0x101, &(0x7f0000000280)="9f89ad285a03c6b3fad37a7775d1bb068d656e8ffdb0cd602585a5a80442930b0a1781d2814d83d91b0ab7c52b4c485ef5d40f76bc7e8c3da2595be356ec9ed39d8c93bc6dcf09dbb9556c832a4573466eab507aecebcdbca0182779a1aa19228fe83ee7e8f42c86bf51c3547cdcf185dc011ebde737f060186b52ec8f1c85975cc0930f1e455b3bf44f3c6d4ef68a6a049a25b8cb18ba212cd8e222faa09feebee8fab28f337caa1ef161231cee9d0b63846cc0237a27ca1233ce786e343aa88b6a04a0567a34447456e43a9fe0f3fb680fb3db6690314cc49a51081f30c7601460714c4cd2f7224d08f562f0ee484e87e134b742cc36"}) syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x7, &(0x7f0000001500), 0x4, &(0x7f00000019c0)={[{@utf8no='utf8=0'}, {@shortname_win95='\xfc\xf2\x00\x00\x00\x00\x00\x00e=win95'}, {@shortname_winnt='shortname=winnt'}, {@fat=@usefree='usefree'}, {@iocharset={'iocharset', 0x3d, 'koi8-u'}}, {@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@fat=@codepage={'codepage', 0x3d, '1250'}}, {@numtail='nonumtail=0'}], [{@hash='hash'}, {@uid_eq={'uid', 0x3d, r2}}, {@pcr={'pcr', 0x3d, 0x35}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 03:36:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x7a000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:32 executing program 1: syz_mount_image$f2fs(&(0x7f00000015c0)='f2fs\x00', &(0x7f0000000600)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c00004c09000000010000000200000000000000002d0000000000000e00000018", 0x31, 0x1400}], 0x0, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='\a\x9b~:\x00\x00\a\x00', 0x2, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000040)={0x0, 0x3, [0x2ae, 0x7fffffff, 0x4983, 0x4, 0x2, 0x0, 0x9, 0x2]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r2) setfsuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r4) setfsuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r6) setfsuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r8) setfsuid(r8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r10) setfsuid(r10) syz_mount_image$xfs(&(0x7f0000000080)='t\x00\a!', &(0x7f0000000100)='./file0\x00', 0xabaf, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000140)="ba602e4c4bd072f4a5e39d252d1f7a87e9a64cb52b321485a2446bd63ecef14223753b5c717003a0304b63bb05c4317971d258188f7fe92ed49f62dcf1069a67900e42994480e3d120321553a7d7ba8b915cca4af2c415443ffc174e1aa2419ba2c6ab27fa5292f0107054148ba14aa62c620ea3a3a90d7ba1cfdb81713698520325b80e9d29750fb0dd9dc46c03b776573979c63cb4d13d79a279dd1bb2121b5ac47fbe204ce0c0eb5c039675a51c0edc099ff35c474f55", 0xb8, 0xfff}, {&(0x7f0000000240)="bd35f02fe7b2eb158ea0a971101e8f7986ee73bc828fb76215bbcb7a9c7261cf26226fe105a195144d139d0fd2e6546bca4205e304175d73fcf2c94d939ed262626e1a3c812162c5229f64de2c8db0bc8821310c", 0x54, 0x10000}, {&(0x7f00000002c0)="d642c2b84875d8afb718e5986bf903fe4a09a42ae7149e50bac24b07822be96c7ea58fee84d3b29ee702bad3a6b65e791c288f220f6ac176aec17fe616c66597ca7684bf6f996592c3d5498baf558864e89da7d1e29f207e48efc67b706401654d17a178554f0c4088ff37a8af9b93018e", 0x71, 0x3}, {&(0x7f0000000340)="ab561d3897af83f21782ae5416171121df5aa1135fc8659b748155ec461e27daada130a626b0ec53e5b0fb523f35104e196ed4e0955a26eec5914a799a688e6658022eac516d8343fa741327", 0x4c, 0x4}], 0x18000, &(0x7f0000000640)={[{@attr2='attr2'}, {@barrier='barrier'}, {@nolazytime='nolazytime'}, {@rtdev={'rtdev', 0x3d, './file0'}}, {@noquota='noquota'}], [{@dont_hash='dont_hash'}, {@permit_directio='permit_directio'}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fowner_eq={'fowner', 0x3d, r10}}, {@uid_gt={'uid>', r6}}, {@obj_type={'obj_type', 0x3d, 'uid>'}}]}) 03:36:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x60000000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 604.850069] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:32 executing program 5: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@null, @rose, @default, @bcast, @bcast, @rose, @rose, @null]}, 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0x9e0000, 0xa, 0x10000, r1, 0x0, &(0x7f0000000080)={0x136121a, 0x30000000, [], @ptr=0xffffffff}}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000100)={0x45}, 0x1) [ 604.898727] FAT-fs (loop4): Unrecognized mount option "üò" or missing value [ 604.909412] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 604.941941] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x7, 0x0) [ 605.005489] F2FS-fs (loop1): Wrong segment_count / block_count (24 > 11520) 03:36:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x9effffff, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 605.078133] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 03:36:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20841, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0xfe2b) 03:36:32 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r4, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000040)={r4, @in={{0x2, 0x4e23, @remote}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)={r5, 0x1f, 0x1, [0x1]}, 0xa) close(r0) [ 605.157694] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 605.189288] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 605.197393] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8, 0x0) 03:36:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xa0008000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:32 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0xa000, 0x0) close(r0) [ 605.271533] F2FS-fs (loop1): Wrong segment_count / block_count (24 > 11520) [ 605.293887] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 605.301894] net_ratelimit: 32 callbacks suppressed [ 605.301902] protocol 88fb is buggy, dev hsr_slave_0 [ 605.301959] protocol 88fb is buggy, dev hsr_slave_1 03:36:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e6400000000140000000000000008050000000800010004000000"], 0x44}}, 0x2) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r1, 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000180)={0x9e0000, 0x7, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x9a0913, 0x4, [], @p_u32=&(0x7f0000000100)=0x6}}) 03:36:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xa, 0x0) [ 605.443490] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 605.460175] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 605.481314] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:36:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xa0010000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 605.781541] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 606.421253] protocol 88fb is buggy, dev hsr_slave_0 [ 606.426415] protocol 88fb is buggy, dev hsr_slave_1 [ 606.431596] protocol 88fb is buggy, dev hsr_slave_0 [ 606.436678] protocol 88fb is buggy, dev hsr_slave_1 [ 606.901463] protocol 88fb is buggy, dev hsr_slave_0 [ 606.907091] protocol 88fb is buggy, dev hsr_slave_1 [ 606.912257] protocol 88fb is buggy, dev hsr_slave_0 [ 606.917323] protocol 88fb is buggy, dev hsr_slave_1 [ 608.053756] IPVS: ftp: loaded support on port[0] = 21 [ 608.268095] chnl_net:caif_netlink_parms(): no params data found [ 608.429657] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.437066] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.445199] device bridge_slave_0 entered promiscuous mode [ 608.586351] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.592978] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.600038] device bridge_slave_1 entered promiscuous mode [ 608.619942] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 608.763476] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 608.784246] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 608.792170] team0: Port device team_slave_0 added [ 608.798251] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 608.805849] team0: Port device team_slave_1 added [ 608.812613] device bridge_slave_1 left promiscuous mode [ 608.818130] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.861993] device bridge_slave_0 left promiscuous mode [ 608.867540] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.581248] net_ratelimit: 18 callbacks suppressed [ 610.581256] protocol 88fb is buggy, dev hsr_slave_0 [ 610.591349] protocol 88fb is buggy, dev hsr_slave_1 [ 610.596441] protocol 88fb is buggy, dev hsr_slave_0 [ 610.601557] protocol 88fb is buggy, dev hsr_slave_1 [ 611.061275] protocol 88fb is buggy, dev hsr_slave_0 [ 611.066413] protocol 88fb is buggy, dev hsr_slave_1 [ 611.071591] protocol 88fb is buggy, dev hsr_slave_0 [ 611.076661] protocol 88fb is buggy, dev hsr_slave_1 [ 611.381239] protocol 88fb is buggy, dev hsr_slave_0 [ 611.386349] protocol 88fb is buggy, dev hsr_slave_1 [ 612.853532] device hsr_slave_1 left promiscuous mode [ 612.895072] device hsr_slave_0 left promiscuous mode [ 612.956820] team0 (unregistering): Port device team_slave_1 removed [ 612.967810] team0 (unregistering): Port device team_slave_0 removed [ 612.978488] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 613.025395] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 613.119471] bond0 (unregistering): Released all slaves [ 613.184702] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 613.193874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 613.253839] device hsr_slave_0 entered promiscuous mode [ 613.291564] device hsr_slave_1 entered promiscuous mode [ 613.342583] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 613.349864] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 613.367226] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 613.410924] 8021q: adding VLAN 0 to HW filter on device bond0 [ 613.419891] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 613.428625] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 613.436906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 613.444710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 613.505071] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 613.511405] 8021q: adding VLAN 0 to HW filter on device team0 [ 613.522222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 613.529320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 613.538273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 613.546705] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.553131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 613.564395] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 613.572044] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 613.579335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 613.588375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 613.596607] bridge0: port 2(bridge_slave_1) entered blocking state [ 613.603033] bridge0: port 2(bridge_slave_1) entered forwarding state [ 613.616560] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 613.624922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 613.637675] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 613.645387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 613.657511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 613.667024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 613.675949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 613.687580] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 613.695624] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 613.704028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 613.712438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 613.729310] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 613.740042] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 613.751009] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 613.765162] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 613.778150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 613.798203] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 613.805640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 613.817924] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 613.824933] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 613.833299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 613.847817] 8021q: adding VLAN 0 to HW filter on device batadv0 03:36:41 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x1, 'q'}, &(0x7f00000003c0)=0x9) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x9, [@struct={0xd, 0x2, 0x0, 0x4, 0x1, 0x81, [{0x5, 0x1, 0xa9800000}, {0xd, 0x0, 0x8}]}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x7c, 0x0, 0x6, 0x3}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x3c, 0x0, 0x9, 0x4}, @typedef={0x4, 0x0, 0x0, 0x8, 0x4}, @struct={0xd, 0x1, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x3, 0x3}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x1, 0x4}, {0x6, 0x4}, {0x2, 0x3}, {0x9, 0x3}, {0x3, 0x1}, {0xd, 0x3}, {0x5, 0x4}]}, @typedef={0xc, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x0, 0x71, 0xba2edbb3513fd11a, 0x42, 0x0, 0x30, 0x2e]}}, &(0x7f0000000400)=""/245, 0xd9, 0xf5}, 0x20) sendfile(r3, r3, &(0x7f00000000c0)=0x500, 0x8080fffffffe) 03:36:41 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f00000000c0)=0x2) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) timer_create(0x3, &(0x7f0000000000)={0x0, 0x0, 0x3, @tid=r6}, &(0x7f0000000040)) close(r0) 03:36:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r2, &(0x7f0000000000)={r6, r5}) ptrace$peek(0x2, r7, &(0x7f00000000c0)) r9 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r9, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1000, 0x40000) listen(r9, 0xfff) r10 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r10, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) ptrace(0x10, 0xffffffffffffffff) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) r11 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r11, 0x1, 0x0) ioctl$TIOCGETD(r11, 0x5424, &(0x7f0000000080)) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) 03:36:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xf0ffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xf, 0x0) 03:36:41 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$amidi(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f00000003c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f000086fff4)) r8 = getpid() r9 = gettid() kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r3, &(0x7f0000000000)={r7, r6}) sendto$isdn(r6, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000100)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, r1, 0x0, 0xfffffffffffffcba, 0x0, r10}, 0x1c) r11 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x140, 0x0) ioctl$IMDELTIMER(r11, 0x80044941, &(0x7f0000000040)=0x3) r12 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r13 = ioctl$KVM_CREATE_VM(r12, 0xae01, 0x0) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) ioctl$KVM_CREATE_IRQCHIP(r13, 0xae60) r14 = ioctl$KVM_CREATE_VCPU(r13, 0xae41, 0x0) ioctl$KVM_RUN(r14, 0xae80, 0x0) r15 = dup3(r12, r13, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x0, 0x0) request_key(0x0, 0x0, &(0x7f0000000200)='/dev/kvm\x00', 0xfffffffffffffffb) setsockopt$bt_BT_RCVMTU(r15, 0x112, 0xd, 0x0, 0x0) r16 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r16, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) r17 = socket$inet_udp(0x2, 0x2, 0x0) r18 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r18, 0x0, r17) dup2(0xffffffffffffffff, r16) [ 613.903541] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 613.994635] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x21, 0x0) 03:36:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xfffff000, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r0, 0x9) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0x0, 0x3, 0x4, 0x2000000, 0x3, {}, {0x4, 0x2, 0x5, 0x1, 0x2, 0x5, "fc4c6575"}, 0x101, 0x0, @userptr=0x1000, 0x1eff, 0x0, 0xffffffffffffffff}) ioctl$USBDEVFS_RESET(r2, 0x5514) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x0, &(0x7f0000000100)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r3, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r3, 0x5386, &(0x7f0000000040)) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r4, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x2, @empty, 0x2}, @in6={0xa, 0x4e20, 0x9, @remote, 0x7fff}], 0x38) 03:36:41 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/m`SDNtimer\x00', 0x0, 0x0) close(r0) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r1, 0x1, 0x0) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r2, &(0x7f0000000000)={r6, r5}) sendto$isdn(r5, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r9 = epoll_create1(0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x80002, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) r13 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r12, &(0x7f000086fff4)) r14 = getpid() r15 = gettid() kcmp$KCMP_EPOLL_TFD(r14, r15, 0x7, r9, &(0x7f0000000000)={r13, r12}) sendto$isdn(r12, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r16 = epoll_create1(0x0) r17 = socket$inet_udp(0x2, 0x2, 0x0) r18 = socket(0x1000000010, 0x80002, 0x0) r19 = fcntl$dupfd(r18, 0x0, r17) r20 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r20, 0x1, r19, &(0x7f000086fff4)) r21 = getpid() r22 = gettid() kcmp$KCMP_EPOLL_TFD(r21, r22, 0x7, r16, &(0x7f0000000000)={r20, r19}) sendto$isdn(r19, &(0x7f00000004c0)=ANY=[@ANYBLOB="e60a00007b0000009b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a6703605003facfbd3b8c324f4ee3802106f93ea936c6f4c44cd6cf4ade7e08132353b2026adb6b8e35f3cf5223c2580f2b2ec8d3be6797749f9a8f1d890762cfdc891e30251d39a98cbad8e29b0a2e02ce916a2720a51475bdf705bcde433cc587af88c7990433b03e63e2c289c6fb7"], 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r19, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0xcc, "1cb82561d0e797f458452a01b50b4863ead68869643c757a3981500588c7d0688736b33da4c0f3089c376675f8fbeac463fa176383e245d8f776ac209eabdf9c51e73073e097b581e80ed5c69a0ab4a807ca53e9cdb9df4c1be2b8ed141e4068137774006b82ce2dcbc900e41362f8d588a620275e3ca2374dfc23cfff2cbabf7bf6739938c717f4e262509e512a2770d67a4bb3c7246a511e843ce7cd0aa140233a78db12f54d01043ff046a685660029e91e72c21b2c0515b2f0556fee0db6f33531aa1be4845782da5470"}, &(0x7f0000000400)=0xd4) getsockopt$inet_sctp_SCTP_RTOINFO(r12, 0x84, 0x0, &(0x7f0000000440)={r23, 0x10000, 0x0, 0xf7}, &(0x7f0000000480)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r24, 0x1}}, 0x18) [ 614.314271] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x48, 0x0) 03:36:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 614.683010] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) prctl$PR_SET_THP_DISABLE(0x29, 0x0) 03:36:42 executing program 1: r0 = gettid() clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f>Vrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0x0) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x1, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) pread64(r2, 0x0, 0x0, 0x0) accept4$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x10, 0xdbc331167c46657b) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) r3 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r3, 0x1, 0x0) ioctl$TCSETXF(r3, 0x5434, &(0x7f0000000000)={0x996, 0x8, [0x9, 0x4, 0x1, 0xe2a, 0x7], 0x8}) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 03:36:42 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x800, 0x0) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x8, 0x2100) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "f09cd94205e7880f5c8382e9adb7f76faedead8c7ba5e1d2aa3b15c9a7c046c056f1521348e8c95c792ff5d2491ffa785354d39db62754fbabc661e680b731d6c208a1c7352572602d952c19a4ef9d636e401ce4440b077f7a1c139dd8500d1fce4f5807c57ad52fce64f928d713401e92c328b9c06536601e7b22891c025f6250a033a1b355dd542ed96afcdb68dd08b6f9ad12c3525cc5233ed376d9abf6b7820ab45993664026e590c4003cf9516670aab7f7abeb3b67a2bc918f4bafee2d5b089590332ea9e20ef0c2322b8de2a83c78ef70e68a3499f456bde2d6da8b14045c74036f2b523ba1b6f78be3c1851b6f24e83535b60d3a7d2e6ab079f86108"}, r2}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) 03:36:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4c, 0x0) 03:36:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffff9e, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:42 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r0) bind$unix(r1, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r2, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, &(0x7f00000001c0)='\xc1\xd6;W\xdbZ\x9aP\x8dkad8\xd9&\x92*4\xe4\x1fN\x0f\x90*\x8b4\x86]3\xd4f\xbb\x90\x92\nL4Y\xfd\xef(\xf83\xb5F\xad\xd3\x8d\xa4e\xe7\x84dl\xcb\xba\x97\x03\x16\x88Z\x1a\xae07\xad,\xf3\x06|\xca\xed\x8f\x02V\x85\xac') [ 614.995008] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:42 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = gettid() tkill(r1, 0x1f) close(r0) 03:36:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x64, 0x0) 03:36:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xfffffff0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 615.107424] SELinux: mount invalid. Same superblock, different security settings for (dev debugfs, type debugfs) 03:36:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x10}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x299}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r3, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r4, 0x0, 0x0, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r6, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x4, 0x4b218432ac16a839, 0xffff, 0x6, 0x1, 0x6, 0x101, r6}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000200)={r7, 0xfffffc00}, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nvram\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x109000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000300)={0x0, 0x7, 0x0, 'queue1\x00'}) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_LOCK(r8, 0x4008642a, &(0x7f00000002c0)) openat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x112) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) 03:36:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f00000004c0)='./bus\x00', 0x111b80, 0x100) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r1, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x19352, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x7}, 0x0, 0xa, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x1) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0xfff, 0x4) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f0000000680)={0x6, 'nr0\x00', {0x7}, 0xfeff}) open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000240)='./file0\x00', 0x3f, 0x2, &(0x7f0000000400)=[{&(0x7f0000000300)="30dd605b8bd009457fc846b54505485045207d174671fb9a8c453aa0d57c1c29c470e68f9e5cd7d7886fccf4e4d725f54eb4124f20bd6d24ccdc5d5f156667b632d5031b", 0x44}, {&(0x7f0000000380)="fd73555392de2cf3897d", 0xa, 0x3329}], 0x20000, &(0x7f0000000480)='cpuset.effective_mems\x00') sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040008001b000000000001000000"], 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000100)={0x3, [0xa81d, 0x401, 0xef]}, &(0x7f00000006c0)=0xa) r7 = dup(r6) r8 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81}, 0x0, 0x0, 0x0, 0x0, 0x3, 0xdffffffa}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = getpgid(r8) write$FUSE_LK(r7, &(0x7f0000000180)={0x28, 0x0, 0x8, {{0xffffffff, 0x2, 0x1, r9}}}, 0x28) syz_genetlink_get_family_id$SEG6(&(0x7f0000000540)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="00012dbd7000fddbdf25010000001000040009000000e100fcff6d08000008000400ba030000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(r10, 0x401845ef, &(0x7f00000002c0)={0x80000000, 0x4, 0x10001, 0x2, 0x8, 0xffffffff}) 03:36:42 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x480001, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v2={0x2, @adiantum, 0x1, [], "dd3c41d15161008badf3b992601861ac"}) close(r0) 03:36:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x68, 0x0) [ 615.358904] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 615.553972] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 615.662263] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 615.701810] net_ratelimit: 32 callbacks suppressed [ 615.701819] protocol 88fb is buggy, dev hsr_slave_0 [ 615.711936] protocol 88fb is buggy, dev hsr_slave_1 03:36:43 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfd, 0xfe, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x1400000000000000}, 0x100, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0xffffffff}, @timestamp, @window, @mss={0x2, 0x91c}], 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000004b40), 0xd7, 0x8000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) close(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x4) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r3, r3) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) bind$pptp(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000080c0000000000000000040000000000"], 0x30}}, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='timers\x00') getsockopt$SO_TIMESTAMP(r4, 0x1, 0x3f, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 03:36:43 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='\x01dRv\x02\x00\x00\x00\x00\x00\x00\x00mer\x00', 0x121160, 0x0) close(r0) 03:36:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'\x86yz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x1001, 0x0) keyctl$read(0xb, r2, &(0x7f0000005340)=""/4096, 0xd900) 03:36:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6c, 0x0) 03:36:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x800, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="94717352696d6d757461626c652c00"]) 03:36:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 615.943627] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 615.952566] FAT-fs (loop5): Unrecognized mount option "”qsRimmutable" or missing value 03:36:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x74, 0x0) 03:36:43 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) r8 = gettid() syz_init_net_socket$ax25(0x3, 0x5, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=0x0, @ANYBLOB="020100000000e800"], 0x20}}, 0x0) kcmp(r6, r8, 0x3, r9, r0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@alg, &(0x7f0000000100)=0x80) 03:36:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="0a0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x248) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') r4 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r4, 0x1, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000140), 0x8) pread64(r3, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_GETISPACE(r3, 0x8010500d, &(0x7f0000000280)) [ 616.211881] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 03:36:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000640)=""/171) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) timer_create(0x2, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_getoverrun(r3) write$RDMA_USER_CM_CMD_ACCEPT(r1, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0x0, 0x0) r6 = epoll_create1(0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket(0x1000000010, 0x80002, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r9, &(0x7f000086fff4)) r11 = getpid() r12 = gettid() kcmp$KCMP_EPOLL_TFD(r11, r12, 0x7, r6, &(0x7f0000000000)={r10, r9}) sendto$isdn(r9, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000280)={0x2000000000000155, &(0x7f00000002c0)}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000200)=[0x0, 0x3f, 0x80000001], 0x0, 0x5, 0x0, 0x8000, 0x0, &(0x7f0000000300)=[0xc97]}) dup(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) close(r0) r13 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r13, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r13, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r13, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000040)={0x1, 0x0, 0x0, 0xf6, 0x5}) r14 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r14, 0x200004) sendfile(r0, r14, 0x0, 0x80001d00c0d0) [ 616.261257] protocol 88fb is buggy, dev hsr_slave_0 [ 616.266494] protocol 88fb is buggy, dev hsr_slave_1 03:36:43 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) bind$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @local}, 0x10) [ 616.336399] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 03:36:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2e00, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000002c0)=""/159) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) sendto(0xffffffffffffffff, &(0x7f0000000140)="7a5e392e845ca1ae359dd409b62c4c20bd828207647d85bf0f", 0x19, 0x20000000, &(0x7f0000000200)=@ethernet={0x1, @local}, 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="0f0000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x7a, 0x0) 03:36:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x2, 0x5, 0x0, 0x6}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) mount$9p_tcp(0x0, 0x0, 0x0, 0x2000000, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000440)={0x7c000, 0x6, 0x4, 0x8, 0x1, {}, {0x4, 0x2, 0x6, 0x25, 0x0, 0x3, "4658ce5f"}, 0x3ff, 0x1, @planes=&(0x7f0000000400)={0xfe0, 0x5, @userptr=0x7f, 0x7}}) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/relabel\x00', 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000100)=ANY=[@ANYBLOB="01003800b7b7b46f2b4051c6f2499c14da8cae93d48f30dc3a72e8ab06b8377635560e9b6305fe33ff08b2faedb3fe0633b74ff0ee98"]) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="5b5c0a1d8280000100365b1cce79ff43d6b91979ed45bae9daab62279183165ff2b7c49bde35f5b9ab0a605f74865690ccca2a7da7aad60e2bf3df75911d5b6e51271e7b9c7063f25f797c0e0ac29cd5715d8a31d1095e4b"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1002000000013) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, &(0x7f00000001c0)) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r4, 0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0xc) r5 = socket(0x1000000010, 0x80002, 0x0) r6 = fcntl$dupfd(r5, 0x0, r3) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f000086fff4)) r8 = epoll_create1(0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = socket(0x1000000010, 0x80002, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) r12 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r12, 0x1, r11, &(0x7f000086fff4)) r13 = getpid() r14 = gettid() kcmp$KCMP_EPOLL_TFD(r13, r14, 0x7, r8, &(0x7f0000000000)={r12, r11}) fcntl$setlease(r8, 0x400, 0x1) r15 = getpid() r16 = gettid() kcmp$KCMP_EPOLL_TFD(r15, r16, 0x7, r2, &(0x7f0000000000)={r7, r6}) sendto$isdn(r6, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r6, 0xc0585609, &(0x7f00000002c0)={0x6, 0xa, 0x4, 0x4, 0x6, {r17, r18/1000+10000}, {0x5, 0x1, 0x8, 0x2, 0x1f, 0x1, "6978fd8f"}, 0x4, 0x2, @offset=0x8, 0x4, 0x0, 0xffffffffffffffff}) accept4$unix(r19, &(0x7f0000000340), &(0x7f00000003c0)=0x6e, 0x101000) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 03:36:44 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) 03:36:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xbf, 0x0) 03:36:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="180000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 616.737920] ceph: device name is missing path (no : separator in [\ [ 616.737920] ‚€) 03:36:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="250000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xc8, 0x0) 03:36:44 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/\x00\xe1\x83\xee\xf2\x00\xff\x00', 0x640a00, 0x0) close(r0) [ 617.035450] ceph: device name is missing path (no : separator in [\ [ 617.035450] ‚€) [ 617.085524] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.0'. [ 617.166983] protocol 88fb is buggy, dev hsr_slave_0 [ 617.172142] protocol 88fb is buggy, dev hsr_slave_1 [ 617.172211] protocol 88fb is buggy, dev hsr_slave_0 [ 617.182333] protocol 88fb is buggy, dev hsr_slave_1 [ 617.301267] protocol 88fb is buggy, dev hsr_slave_0 [ 617.306437] protocol 88fb is buggy, dev hsr_slave_1 03:36:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1a0, 0x0) 03:36:46 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x10002}, 0xc) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) inotify_init() close(r1) 03:36:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="300000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2e00, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000002c0)=""/159) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) sendto(0xffffffffffffffff, &(0x7f0000000140)="7a5e392e845ca1ae359dd409b62c4c20bd828207647d85bf0f", 0x19, 0x20000000, &(0x7f0000000200)=@ethernet={0x1, @local}, 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:46 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r0, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x8, 0x1, 0x4, 0x10, 0x214, {0x0, 0x7530}, {0x4, 0x0, 0x7f, 0x20, 0x0, 0x80, "eaef3568"}, 0xbf, 0x1, @planes=&(0x7f0000000000)={0x2, 0x80, @userptr=0x3, 0x4}, 0x4, 0x0, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r3, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={r3, 0x4}, &(0x7f0000000100)=0x8) r4 = socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r4, &(0x7f0000002dc0)=[{{&(0x7f0000001440)=@pppol2tpv3={0x18, 0x2, {0x100000000000000, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0), 0x200003c0}], 0x1}}], 0x1, 0x0) 03:36:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000640)=""/171) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) timer_create(0x2, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_getoverrun(r3) write$RDMA_USER_CM_CMD_ACCEPT(r1, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0x0, 0x0) r6 = epoll_create1(0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket(0x1000000010, 0x80002, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r9, &(0x7f000086fff4)) r11 = getpid() r12 = gettid() kcmp$KCMP_EPOLL_TFD(r11, r12, 0x7, r6, &(0x7f0000000000)={r10, r9}) sendto$isdn(r9, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000280)={0x2000000000000155, &(0x7f00000002c0)}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000200)=[0x0, 0x3f, 0x80000001], 0x0, 0x5, 0x0, 0x8000, 0x0, &(0x7f0000000300)=[0xc97]}) dup(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) close(r0) r13 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r13, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r13, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r13, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000040)={0x1, 0x0, 0x0, 0xf6, 0x5}) r14 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r14, 0x200004) sendfile(r0, r14, 0x0, 0x80001d00c0d0) 03:36:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="520000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x300, 0x0) 03:36:47 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x20400, 0x0) close(r0) 03:36:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="c00000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:47 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2e00, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000002c0)=""/159) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) sendto(0xffffffffffffffff, &(0x7f0000000140)="7a5e392e845ca1ae359dd409b62c4c20bd828207647d85bf0f", 0x19, 0x20000000, &(0x7f0000000200)=@ethernet={0x1, @local}, 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:47 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\xf3\x00', 0x800, 0x0) close(r0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r8 = epoll_create1(0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = socket(0x1000000010, 0x80002, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) r12 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r12, 0x1, r11, &(0x7f000086fff4)) r13 = getpid() r14 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x400, 0x0) kcmp$KCMP_EPOLL_TFD(r13, r14, 0x7, r8, &(0x7f0000000000)={r12, r11}) ioctl$TIOCSPGRP(r4, 0x5410, &(0x7f0000000000)=r13) [ 621.301321] net_ratelimit: 22 callbacks suppressed [ 621.306395] protocol 88fb is buggy, dev hsr_slave_0 [ 621.311475] protocol 88fb is buggy, dev hsr_slave_1 [ 621.316590] protocol 88fb is buggy, dev hsr_slave_0 [ 621.321802] protocol 88fb is buggy, dev hsr_slave_1 [ 621.471288] protocol 88fb is buggy, dev hsr_slave_0 [ 621.476503] protocol 88fb is buggy, dev hsr_slave_1 [ 621.481692] protocol 88fb is buggy, dev hsr_slave_0 [ 621.486758] protocol 88fb is buggy, dev hsr_slave_1 [ 621.861251] protocol 88fb is buggy, dev hsr_slave_0 [ 621.861305] protocol 88fb is buggy, dev hsr_slave_1 03:36:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000640)=""/171) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) timer_create(0x2, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_getoverrun(r3) write$RDMA_USER_CM_CMD_ACCEPT(r1, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r4, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r5, 0x0, 0x0, 0x0) r6 = epoll_create1(0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket(0x1000000010, 0x80002, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r9, &(0x7f000086fff4)) r11 = getpid() r12 = gettid() kcmp$KCMP_EPOLL_TFD(r11, r12, 0x7, r6, &(0x7f0000000000)={r10, r9}) sendto$isdn(r9, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000280)={0x2000000000000155, &(0x7f00000002c0)}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000200)=[0x0, 0x3f, 0x80000001], 0x0, 0x5, 0x0, 0x8000, 0x0, &(0x7f0000000300)=[0xc97]}) dup(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) close(r0) r13 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r13, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r13, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r13, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000040)={0x1, 0x0, 0x0, 0xf6, 0x5}) r14 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r14, 0x200004) sendfile(r0, r14, 0x0, 0x80001d00c0d0) 03:36:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x500, 0x0) 03:36:49 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00'}) connect(r0, &(0x7f0000000740)=@hci={0x1f, 0xa, 0x6d73e3179f6b3f67}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_ENDIAN(0x14, 0x2) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r3, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f0000000040)={0x1, 0x1}) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x1, 0x0, 0x0, {}, {}, {}, 0x2, @can={{}, 0x0, 0x0, 0x0, 0x0, "5f6e418b5d036252"}}, 0x200004c8}}, 0x0) r4 = epoll_create1(0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f000086fff4)) r9 = getpid() r10 = gettid() kcmp$KCMP_EPOLL_TFD(r9, r10, 0x7, r4, &(0x7f0000000000)={r8, r7}) sendto$isdn(r7, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r7, 0xc034564b, &(0x7f0000000000)={0x5, 0x30314247, 0x9, 0x400, 0x2, @stepwise={{0x8001, 0x20}, {0x3, 0x2}, {0x0, 0x10000}}}) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=ANY=[@ANYBLOB="010000002300"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000000200000000000000000000001aa4a2ab33b31fe4"], 0x20000148}}, 0x0) 03:36:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x98000, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x4) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) 03:36:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="230200003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2e00, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000002c0)=""/159) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) sendto(0xffffffffffffffff, &(0x7f0000000140)="7a5e392e845ca1ae359dd409b62c4c20bd828207647d85bf0f", 0x19, 0x20000000, &(0x7f0000000200)=@ethernet={0x1, @local}, 0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="c00e00003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:49 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x440600, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x541c, &(0x7f00000000c0)) close(r0) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r8, 0x401845ff, &(0x7f0000000080)={0x6, 0x1ff, 0x5, 0x4, 0x5, 0x20}) 03:36:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x600, 0x0) 03:36:50 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9ff8efa2325ad5a0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r5, 0x0, r4) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r7, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000040)={r7, 0xffff, 0x9, [0x1, 0x9, 0xff, 0x7, 0x5, 0x40, 0x40, 0x5, 0x1]}, &(0x7f0000000240)=0x1a) r8 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r3, &(0x7f000086fff4)) r9 = getpid() r10 = gettid() kcmp$KCMP_EPOLL_TFD(r9, r10, 0x7, r0, &(0x7f0000000000)={r8, r3}) sendto$isdn(r3, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r3, 0x800448d3, &(0x7f0000000140)={{0x6, 0x5, 0x5, 0x8, 0x0, 0x1}, 0x4, 0x4, 0x8, 0xfff9, 0x1, "2acbe1f40983ae249578b508538951e8fd9a7bd560d986f0f75187e3008428bf1cbcc057e813ea2accd84183bb897f236032ee8e7d1f5d2a7fe73dfb5b1e1007fed1a6e54a084ef9fc55b7176b915d28531b399a993aafeaae63657e4b9c4959b9d5a11755fe5134f254ff2d64e6172cbdd7008a4d8677b522813eb63dc569b9"}) perf_event_open(&(0x7f00000004c0)={0x1, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4802, 0x0) 03:36:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="e03f03003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:50 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2e00, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000002c0)=""/159) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:51 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x2, 0x2) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r1, 0x1, 0x0) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r2, &(0x7f0000000000)={r6, r5}) sendto$isdn(r5, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r11 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsu\x00', 0x0, 0x0) r12 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r13, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000003c0)={r13}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r11, 0x84, 0x78, &(0x7f0000000440)=r14, 0x4) sendmsg$TIPC_NL_BEARER_ENABLE(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r10, @ANYBLOB="010000000000000000000300000004000400"], 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r5, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="00000038b9aad2b9b53a08c66c00", @ANYRES16=r10, @ANYBLOB="e20109000000ffdbdf25647000080001006962000014000200080001000701000008000300b30000001c000200080003008000000008000400d5cdef37080002003f0000002400020008000300090000000800010012000000080004006ff6785d080001001d00000008000100696200004400090008000100080000000800020032e46b24080002009f0e00000800020006000000080002000800000008000200ff0f00000800020002000000080002006d0900002400050008100100696200000800010069d45a0ee9502f757ca6a662000008000100756470000800010075647000"/240], 0xec}, 0x1, 0x0, 0x0, 0x20040801}, 0x0) r15 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r15, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r16, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={r16, @in={{0x2, 0x4e23}}, 0x5, 0x8}, 0x90) 03:36:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x700, 0x0) 03:36:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0100203500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:51 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r0 = creat(&(0x7f00000003c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x29, 0x3, 0x0, {0x4, 0x8, 0x0, 'overlay\x00'}}, 0x29) ioctl$SIOCRSSCAUSE(r2, 0x89e1, &(0x7f0000000040)=0x678) link(&(0x7f0000000100)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000340)='./bus/file0\x00', &(0x7f00000004c0), 0x0) 03:36:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="00f0ff7f3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2e00, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000002c0)=""/159) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 623.761847] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 623.798471] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43705 sclass=netlink_route_socket pig=24634 comm=syz-executor.4 03:36:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xa00, 0x0) [ 623.805216] EXT4-fs (loop5): group descriptors corrupted! 03:36:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="effdffff3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xf00, 0x0) [ 623.974004] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 624.003916] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43705 sclass=netlink_route_socket pig=24652 comm=syz-executor.4 03:36:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2e00, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000002c0)=""/159) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000000a00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:51 executing program 2: r0 = socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x8916, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000240)=0xfffffffffffffe24) syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x38, 0x2e8240) r1 = syz_open_procfs(0x0, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, &(0x7f0000000380), &(0x7f0000000240)=0x4) accept$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfe) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) write$UHID_INPUT2(r2, &(0x7f0000000180)={0xc, {0x45, "292823bcbc894af576fe161df6ecefe5ae7197949f32cd68f36a67714399ddcb0ea4605fb136fd12c6db3884a7e00fe64242601dd1e59797a4e712e81b9082d0c639d74b99"}}, 0x4b) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000340), 0x4) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d04000000007643560000000062100000000000000000", @ANYRES32, @ANYBLOB="ecffff03070000ff0e34e40ebefdeb4f5bdb485eefc74b919cd0a1bdd740b7f2371f20f3140ef3a062fd1c91f6d72b2932993484e4d558cde304b1adc6aeb21f16084a8e0408bb03b19cb0c73d5697710e06e1861a14c7af4208b82eef5a0cdba2dec2f319b0ce8ea0a4828c4e52edc80fb711f37826a01dee6d6d157fd4767c963394d198ed6cd2db6d1cfa66d05ab6b2d22db55409fa36b5a0dc96ef838e3ab2dbfc8beb34e80b2e12cd1e438652394f6c5712e5b51e3d76b230f4696d413c5a956f8464b5f4e9113fa3937be57547502f15d4273c6dc5dac9d0697038ab493d92"], 0x20}}, 0x0) 03:36:51 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='\a\x00\x00\x00\x02\x00', 0xfc5e28ae5dfed765, 0x0) 03:36:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2e00, 0x0) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f00000002c0)=""/159) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2100, 0x0) 03:36:51 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x80) sendfile(r1, r0, 0x0, 0x1ff) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000080)={0x4, 0x7, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x9909d4, 0xb6b9, [], @ptr=0x5}}) 03:36:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000000f00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:51 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x2e00, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r1, 0x1, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000001c0)={0xa00000, 0x2, 0x7fff, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x9a0001, 0x4f5, [], @string=&(0x7f0000000040)=0x1}}) r3 = openat$cgroup_subtree(r2, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = epoll_create1(0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff]) stat(&(0x7f0000000400)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r9) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r10) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r11) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000700)=[r10, r12, 0x0, r11, 0xee00]) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000006c0)=[0xffffffffffffffff, r14]) setregid(0x0, r14) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x36, &(0x7f0000000300)=[0xee00, r15, r13]) getgroups(0x4, &(0x7f0000000380)=[r7, r8, r9, r16]) r17 = fcntl$dupfd(r6, 0x0, r5) r18 = epoll_create1(0xec94a30eb584465e) epoll_ctl$EPOLL_CTL_ADD(r18, 0x1, r17, &(0x7f000086fff4)) r19 = getpid() r20 = gettid() kcmp$KCMP_EPOLL_TFD(r19, r20, 0x7, r4, &(0x7f0000000000)={r18, r17}) sendto$isdn(r17, &(0x7f0000000600)=ANY=[@ANYBLOB="e60a14007b0000009b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f5eb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"], 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) setsockopt$TIPC_GROUP_JOIN(r17, 0x10f, 0x87, &(0x7f0000000080)={0x41, 0x2}, 0x10) write$cgroup_subtree(r3, &(0x7f00000005c0)=ANY=[@ANYBLOB="2073d7ea7013a66fced72259585cf3f7f76cf230e5a3f54d9bdc8263e19c9675"], 0x6) 03:36:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002000050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3f00, 0x0) [ 624.893734] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:36:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002300050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:52 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='\rdev/m\x00', 0x200, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f000086fff4)) r8 = getpid() r9 = gettid() kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r3, &(0x7f0000000000)={r7, r6}) sendto$isdn(r6, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea84a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffffffffffffff74) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r14, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="ddfa15b361965ae7"], 0x48}}, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4f36e9009aa19ca680177ffa871deb57c1ec6e", @ANYRES32=r14, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="340000002800070500"/20, @ANYRES32=r14, @ANYBLOB="0000ffff0000ffff000000000cb4010067726564bee55b3075379f2d01eea6fca2030000006b15300004"], 0x34}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000001600000228bd7000fedbdf250a080166", @ANYRES32=r14, @ANYBLOB="140006009e00000012a72e09000000ff01000009000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x848) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'veth0_to_bond\x00'}) dup2(r1, r2) close(r0) r15 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r15, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r15, 0x54a3) [ 625.214092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=69 sclass=netlink_route_socket pig=24712 comm=syz-executor.2 [ 625.613647] team0 (unregistering): Port device team_slave_0 removed 03:36:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4800, 0x0) 03:36:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) bind$alg(r2, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x3e7) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)='\x00\x00\x00\x00\x00\x00\x00\x00', 0x8) accept4$alg(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r3, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x6) 03:36:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002b00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 625.805885] team0 (unregistering): Port device team_slave_1 removed [ 625.823845] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 625.846703] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 03:36:53 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x3090, 0x5, 0x4, 0x100, 0x3, {0x0, 0x7530}, {0x1, 0x1, 0xb7, 0x7f, 0x1, 0x40, "08d2ff10"}, 0xb8a, 0x3e51551e00f4d73d, @userptr=0x80000001, 0x7, 0x0, r1}) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2}, 0x80) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{0x0}, {&(0x7f0000000200)=""/142, 0x8e}], 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r4, 0x0, r3) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000001c0)=0x8) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmmsg(r0, &(0x7f0000001540), 0x553, 0x0) [ 625.898808] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 625.925586] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 03:36:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4c00, 0x0) 03:36:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002d00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003000050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6400, 0x0) 03:36:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0200003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:53 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6800, 0x0) 03:36:53 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r5 = epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) r7 = epoll_create1(0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) r9 = socket(0x1000000010, 0x80002, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) r11 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r11, 0x1, r10, &(0x7f000086fff4)) r12 = getpid() r13 = gettid() kcmp$KCMP_EPOLL_TFD(r12, r13, 0x7, r7, &(0x7f0000000000)={r11, r10}) sendto$isdn(r10, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r14 = fcntl$dupfd(r6, 0x0, r10) r15 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r15, 0x1, r14, &(0x7f000086fff4)) r16 = getpid() r17 = gettid() kcmp$KCMP_EPOLL_TFD(r16, r17, 0x7, r5, &(0x7f0000000000)={r15, r14}) preadv(r15, &(0x7f0000000400)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/131, 0x83}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/147, 0x93}], 0x4, 0x4cb8) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x6, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r14, 0x84, 0x14, &(0x7f0000002580), &(0x7f00000025c0)=0x4) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00'/20, @ANYRES32=r4, @ANYBLOB="0000ffff0000ffff000000000cb4010067726564bee55b3075379f2d01eea6fca2030000006b15300004"], 0x3}}, 0x0) sendto(r0, &(0x7f0000000000)="024f971f7373e30f69433ece484e299b8da98c8f824b8db559e47496db084d7a06fac483ddb0598e5fcfeee0dadedbc545b3b682c7f56ba6cea4ed33d083c4a93eb82d1cfbf1ee71873da7183bf25fc7bfae767a6a81c06681de22cfa38c0ce6692ec764ef7f3fcd13a015ae1507a9a08dc96ec9a3efe0ae2dfacd9369cea70b1c8b0c4de550648455938645ab8377f69e0b3be89c3a21ec13abe43bcc953504436997142f73562121ab7901fcad6f50c19d0ad26cfa89794f22e444f793cfd25271bd344f96702fb50725ae5cb318168c3f34d52e0c105b87f5e6b393fa8b09d3c884e800f5", 0xe6, 0x4000011, &(0x7f0000000100)=@xdp={0x2c, 0x1, r4, 0x2e}, 0x80) 03:36:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0300003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6c00, 0x0) 03:36:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0400003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 626.662635] net_ratelimit: 30 callbacks suppressed [ 626.662644] protocol 88fb is buggy, dev hsr_slave_0 [ 626.672826] protocol 88fb is buggy, dev hsr_slave_1 03:36:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f000086fff4)) r8 = getpid() r9 = gettid() kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r3, &(0x7f0000000000)={r7, r6}) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x3, 0x1) r12 = fcntl$dupfd(r11, 0x0, r10) r13 = epoll_create1(0x0) r14 = socket$inet_udp(0x2, 0x2, 0x0) r15 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r15, 0x0, r14) openat$cgroup_ro(r12, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r16 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r17 = epoll_create1(0x0) r18 = socket$inet_udp(0x2, 0x2, 0x0) r19 = socket(0x1000000010, 0x80002, 0x0) r20 = fcntl$dupfd(r19, 0x0, r18) r21 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r21, 0x1, r20, &(0x7f000086fff4)) r22 = getpid() r23 = gettid() kcmp$KCMP_EPOLL_TFD(r22, r23, 0x7, r17, &(0x7f0000000000)={r21, r20}) epoll_ctl$EPOLL_CTL_ADD(r16, 0x1, r21, &(0x7f000086fff4)={0x6000200a}) r24 = getpid() r25 = gettid() kcmp$KCMP_EPOLL_TFD(r24, r25, 0x7, r2, &(0x7f0000000000)={r13, r12}) r26 = socket$inet_udp(0x2, 0x2, 0x0) r27 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r27, 0x0, r26) r28 = epoll_create1(0x0) r29 = socket$inet_udp(0x2, 0x2, 0x0) r30 = socket(0x1000000010, 0x80002, 0x0) r31 = fcntl$dupfd(r30, 0x0, r29) r32 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r32, 0x1, r31, &(0x7f000086fff4)) r33 = getpid() r34 = gettid() kcmp$KCMP_EPOLL_TFD(r33, r34, 0x7, r28, &(0x7f0000000000)={r32, r31}) syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYRES16=r0], 0x0) 03:36:54 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='\x01\x00', 0x2d0281, 0x0) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000001780)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000200)={0x0, 0xfffffffd, 0x2, {0x1, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x96000]}}}) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_driver={0x3, 0x2cb0, &(0x7f0000000300)}) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc058565d, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x7, @raw_data="2085f3072c9b42f03f10be83b68ebcf014a0409fdf8be3d3e82c747c7f79f7cee00b443f02000000a91ca25441677d169fb75a152d6eebf4bef6c96076d67f243aebaac6430c9ef1a788e60eb3d0a7c29a5e3416871c8a51df55701a05e0a2f09883c482efaf6dc9e1695038733a23bbf0faf76a1d3fae5c251c4fad507b2ead2f1581057e3f84f3e8503ee570d8069eb53a897d2dd5f3d89629917fb171132181e9f3c510ac5229a6b6096547977578c5795d84cf23fe1d042df97dbd37a4b3d0e338a1b611e3ae"}}) socket(0xa, 0x1, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r5, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) r6 = syz_open_dev$vcsu(&(0x7f0000001340)='/dev/vcsu#\x00', 0x81, 0x880) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r5, 0x111, 0x2, 0x0, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000001380)={0x0, 0x80000, r6}) r7 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1, 0x20011, r7, 0x0) r8 = syz_open_dev$sg(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1, 0x20011, r8, 0x0) ioctl$SG_SET_RESERVED_SIZE(r8, 0x2287, &(0x7f0000001240)) 03:36:54 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0500003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x7400, 0x0) 03:36:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0600003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:54 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x620000) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/unix\x00') pread64(r2, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB='\x00'/16], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x4400a802) close(r0) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f000086fff4)) r8 = getpid() r9 = gettid() kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r3, &(0x7f0000000000)={r7, r6}) sendto$isdn(r6, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)=0x0) ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f0000000340)=r10) recvfrom(r1, &(0x7f00000002c0)=""/119, 0x77, 0x0, 0x0, 0x0) 03:36:54 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x7a00, 0x0) 03:36:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0xfffd, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x6, 0xf087}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x4) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000140), 0x4) close(r0) 03:36:54 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000080)=""/157) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:54 executing program 4: close(0xffffffffffffffff) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000240)='/dev/mISDNtimer\x00', r4) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r0, &(0x7f0000000000)={r5, r3}) sendto$isdn(r3, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000)={0x2, 0x40, 0x4, 0x7e, 0x0, 0x9, 0x8, 0x9, 0x9, 0x40, 0x4, 0x0, 0x1}, 0xe) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) vmsplice(r3, &(0x7f00000004c0)=[{&(0x7f00000002c0)="9cc2ab67f0de", 0x6}, {&(0x7f0000000300)="c998ca44ab8ebd1a36a27ef34b7f0a06c7d998985479e30f", 0x18}, {&(0x7f0000000340)="1fd0f99f17df0d07b18324dd4d97abdfba49b8713becf69e1797bdb0e255623d77bb7aee337a96b401ebdbd76dad667537daf08ca78ba578af0109a5df470ea4472ca2c434ee13cea9a895df7b2590ac1181e409f81b7813b47361413d294c8b3506748aa785585f5e313736", 0x6c}, {&(0x7f00000003c0)="8ff4c4da04f1a620046cb0", 0xb}, {&(0x7f0000000400)="8a6888550e5779cc24b684bbbafb845ff5dfeda8bc4211be8413195e50b8f7a085f081fb068f334d6a2914c1ba8d5a90dd18fab631383e2dabb43ea40198982202ca8066888ada383f4a2d8c9777e53912376da5429ce3c70685e479f12de501860d199fe7479ad40314b904d551aabe1e4857afcdb319aee0f93e0cb23902a08f2f6f152a03fd7a8a4dfaf9a56db9c4", 0x90}], 0x5, 0x1) sched_getattr(r8, &(0x7f0000000280)={0x38}, 0x38, 0x0) 03:36:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x1000003, 0x13, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:36:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0700003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xbf00, 0x0) 03:36:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 627.701259] protocol 88fb is buggy, dev hsr_slave_0 [ 627.706463] protocol 88fb is buggy, dev hsr_slave_1 [ 627.711654] protocol 88fb is buggy, dev hsr_slave_0 [ 627.716729] protocol 88fb is buggy, dev hsr_slave_1 [ 627.721901] protocol 88fb is buggy, dev hsr_slave_0 [ 627.726994] protocol 88fb is buggy, dev hsr_slave_1 [ 627.732191] protocol 88fb is buggy, dev hsr_slave_0 [ 627.737259] protocol 88fb is buggy, dev hsr_slave_1 03:36:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0a00003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:36:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xc800, 0x0) 03:36:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:55 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r1, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000540)=""/4096) r4 = fcntl$dupfd(r1, 0xb453da2874b48145, r2) connect$llc(r4, &(0x7f0000000180)={0x1a, 0x4dc48bb2d6a956be, 0xbe, 0x1, 0x2, 0x8, @remote}, 0x10) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000200)={0x8000000, 0x1, 0x1}) close(r0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r6, 0x218, 0x70bd28, 0x25dfdbfc, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 03:36:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0e00003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 630.232109] device bridge_slave_1 left promiscuous mode [ 630.237905] bridge0: port 2(bridge_slave_1) entered disabled state [ 630.307555] device bridge_slave_0 left promiscuous mode [ 630.313755] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.871240] net_ratelimit: 18 callbacks suppressed [ 631.871249] protocol 88fb is buggy, dev hsr_slave_0 [ 631.881344] protocol 88fb is buggy, dev hsr_slave_1 [ 631.886609] protocol 88fb is buggy, dev hsr_slave_0 [ 631.891711] protocol 88fb is buggy, dev hsr_slave_1 [ 631.896792] protocol 88fb is buggy, dev hsr_slave_0 [ 631.901908] protocol 88fb is buggy, dev hsr_slave_1 [ 631.907015] protocol 88fb is buggy, dev hsr_slave_0 [ 631.912112] protocol 88fb is buggy, dev hsr_slave_1 [ 632.261236] protocol 88fb is buggy, dev hsr_slave_0 [ 632.266775] protocol 88fb is buggy, dev hsr_slave_1 [ 632.723345] device hsr_slave_1 left promiscuous mode [ 632.774764] device hsr_slave_0 left promiscuous mode [ 632.834041] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 632.876474] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 632.949958] bond0 (unregistering): Released all slaves [ 633.043766] IPVS: ftp: loaded support on port[0] = 21 [ 633.125242] chnl_net:caif_netlink_parms(): no params data found [ 633.208543] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.215101] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.229386] device bridge_slave_0 entered promiscuous mode [ 633.237327] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.250872] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.259493] device bridge_slave_1 entered promiscuous mode [ 633.295830] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 633.313110] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 633.349352] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 633.357168] team0: Port device team_slave_0 added [ 633.370164] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 633.378881] team0: Port device team_slave_1 added [ 633.391852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 633.399722] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 633.494821] device hsr_slave_0 entered promiscuous mode [ 633.551617] device hsr_slave_1 entered promiscuous mode [ 633.592308] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 633.599766] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 633.630347] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.636807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.643722] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.650202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.738121] 8021q: adding VLAN 0 to HW filter on device bond0 [ 633.756765] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 633.772211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 633.789174] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.809510] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.823630] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 633.829759] 8021q: adding VLAN 0 to HW filter on device team0 [ 633.842805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 633.850533] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.856960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.874757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 633.882634] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.888987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.907772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 633.924344] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 633.933563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 633.942056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 633.955720] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 633.968033] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 633.975105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 633.983071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 634.000209] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 634.011092] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 634.020093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 634.035175] 8021q: adding VLAN 0 to HW filter on device batadv0 03:37:01 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x605, r1) r4 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r4, 0x1, 0x0) fanotify_mark(r3, 0x11, 0x1018, r4, &(0x7f0000000000)='./file0\x00') 03:37:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6b6b6b, 0x0) 03:37:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0f00003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:01 executing program 5: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = syz_open_procfs(0x0, 0xffffffffffffffff) fstat(r0, &(0x7f0000000000)) ioctl$UI_DEV_CREATE(r0, 0x5501) creat(&(0x7f0000000300)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000240)='/dev/snd/midiC#D#\x00', 0x2ba0, 0x409043) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f00000002c0)={0x1, 0x0, 0x40}) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) fdatasync(r1) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, 0xffffffffffffffff) fstat(r4, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x101000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2, 0x2}}, 0x20) r7 = openat(r6, &(0x7f0000000080)='./bus\x00', 0x200001, 0x40) ioctl$VIDIOC_S_FBUF(r7, 0x4030560b, &(0x7f0000000100)={0x8, 0x80, &(0x7f0000000340)="46b5e7881b2e3e98f555da0e51f981108653708d8d2bd015ce188e5169b81f3d8f498969a78571318b0d7d438a8f6381fa52fc6c1829204a74ce9306ece4f0c53af6526b09d17f12539109937f02429a865cc6428d979438", {0xffffffff, 0x0, 0x0, 0x5, 0x2, 0x1, 0x4, 0x1fa}}) r8 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r9 = dup3(0xffffffffffffffff, r7, 0x140000) ioctl$VT_RESIZE(r9, 0x5609, &(0x7f00000001c0)={0x7fff, 0x401, 0x6}) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000000), 0x20) io_setup(0x1ff, &(0x7f00000003c0)=0x0) fcntl$setstatus(r3, 0x4, 0x44800) io_submit(r10, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_VLAN_DEFAULT_PVID={0x8, 0x27, 0x80000001}]}}}]}, 0x3c}}, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x9}]}, 0x28}}, 0x0) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3c}}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r11, 0xc028660f, &(0x7f0000000200)={0xfff0, r13, 0x8, 0x0, 0x3, 0x4000000000}) 03:37:01 executing program 2: timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x4}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = dup3(r1, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x200}, 0x0, 0xbfffffffffffffff, r2, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r4 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000300), 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000003c0)={0x1}) add_key$user(&(0x7f0000000040), &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000800)="0200ec2d3b60c92cab18ee6455feac3b42b2a798d6d298c48867fc0e949636e74d657b02e3aaae3708fa2a2d8e3cac6a05c53becf31b32c804e7bc7c89bc37eba19cb5efd995b513380d7beb856aa4361a9ccc039a4c87bbfe676e540042b18d90fd42796336779ead6123a0754075e4b0fad5a09ca9b611f4e8e1f827d415ca883c5f39cba3dc2fbaaa8551e8d5c7a986fe525877a176c396cf00000000918904ce1e2610eab7650ffc2782e074fb4ec0f6c88b956e3c4f980e4391aa71316d216cb1d021917fa8a39424eee062829906e103a594fe92b898df206b3c2e7ca22a58d0cb140d0900cbd36fb05d46f8fc266afe9b65959eccafbff82a4e0741b8ab45863b0ea79199b996db", 0x10b, 0xfffffffffffffffd) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r6, r6, r6}, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) r7 = epoll_create1(0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) r9 = socket(0x1000000010, 0x80002, 0x0) r10 = fcntl$dupfd(r9, 0x0, r8) r11 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r11, 0x1, r10, &(0x7f000086fff4)) r12 = getpid() r13 = gettid() kcmp$KCMP_EPOLL_TFD(r12, r13, 0x7, r7, &(0x7f0000000000)={r11, r10}) sendto$isdn(r10, &(0x7f0000000940)=ANY=[@ANYBLOB="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"/263], 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r14 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm_plock\x00', 0x0, 0x0) r15 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r15, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000740)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r14, &(0x7f00000007c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000680), r16, 0x2}}, 0x18) ioctl$EVIOCGMASK(r10, 0x80104592, &(0x7f0000000400)={0x14, 0xb7, &(0x7f0000000480)="07a6f014bd1030c58863a5f812a1575b6d14437543df8f1f829d22914657347de8bc44a2b56e449210e1b54787a013270ccd58293c7276a4052d42eed985839ea33968c682b1242b6b8c2a5f28d65dfb0b6efd86cda9384cd073417086238a98d60fdbfffdb68ea6bb8ec153b938f7cb3acae249ecd480facd749a36dd6e8fc734b0914ab63f79b39d57a03fd40983ba857e6086a89d3c3e333440a06920293377f37a349adbb11357df843ac46ae2def9d46f955db57c"}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r6, r3}, &(0x7f0000000240)=""/93, 0xffffffffffffff2a, 0x0) 03:37:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:01 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000a0, 0x0) 03:37:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e4800003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:01 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x105000, 0x0) close(r0) [ 634.508442] netlink: 'syz-executor.5': attribute type 39 has an invalid length. 03:37:02 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1000000, 0x0) 03:37:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e4c00003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 634.640488] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 03:37:02 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vga_arbiter\x00', 0x20002, 0x0) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r4, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000007c0)={r4, 0x440f}, &(0x7f0000000800)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000840)=@sack_info={r5, 0x7ff, 0x50a}, 0xc) r6 = syz_open_procfs(0x0, 0xffffffffffffffff) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r8, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000003c0)={r8, 0x95, "af0583993d7ff8b5fe4f815b594a0cfe143f6b564e9a42829383df0f1b5f29573d966010d349dc489934f86f8b8a834d739127ad20860768f22f37fe4a832b05379e6bf35c1eff60032b60dbfe97b7eb40c03cef9b9615abc03670683982e68b8ca6260f7cb1c983b4d4b93d2123a2715f1f2efe40df8a0b025d98c2914f1cd59efc2a1a02e7af099d32efe52a634fcccd5a8590f5"}, &(0x7f0000000480)=0x9d) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x111400, 0x0) ioctl$SG_GET_REQUEST_TABLE(r10, 0x2286, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f00000004c0)={r9, @in={{0x2, 0x4e24, @empty}}, 0x3, 0xd8}, &(0x7f0000000580)=0x90) ioctl$FIBMAP(r6, 0x1, 0x0) ioctl$UI_SET_PHYS(r6, 0x4008556c, &(0x7f00000000c0)='syz0\x00') syz_mount_image$nfs(&(0x7f0000000100)='nfs\x00', &(0x7f0000000140)='./file0\x00', 0x1, 0x3, &(0x7f0000000300)=[{&(0x7f0000000180)="7bbe995c59bd93894a7d9d818346a9eba072f6b739b617ae84d445b6c9c377e9d8a45c13ade3b56b68d15bf6544935a1e93c956d8861ad0d25ed261a3b25cacdaf46b25bcaaec95cdf446e71b979fbf0dd457833b081b955e0afa11273bab76db487717beb7948b90804b81d690777b6588074d29aafa44fb32928c0dbd2515280d4f6a91934de8031028da7de37108cb1142f3bd249008359a1938176122cf85c90d6a473052d4f66993fe55f0348692edcef3d959d4eb0e0e6a3b69e05dad2a6daa62e4c6d11e8e982de6d44610e60599e7add16aa3f79b4254ca0640eac194ca356a0daf61ac41beeb6f3dfabe21dd7c0b78efedc47921d23afa655", 0xfd, 0x20}, {&(0x7f0000000280)="5100f3bcfc2648916ac2d15a", 0xc}, {&(0x7f00000002c0)="1e528b41cc01020c4d9261c4f1939297666b", 0x12, 0xad3d}], 0x4, &(0x7f0000000380)='\x00') ioctl$KVM_GET_DEVICE_ATTR(r6, 0x4018aee2, &(0x7f0000000080)={0x0, 0x0, 0x100000000, &(0x7f0000000040)=0x3}) 03:37:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e6000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 634.882551] netlink: 'syz-executor.5': attribute type 39 has an invalid length. 03:37:02 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) fcntl$setstatus(r0, 0x4, 0xf19e78606da6c421) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x8000) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000040)=0x4) 03:37:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r0 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:02 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2000000, 0x0) 03:37:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e6800003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) recvmsg$can_raw(r2, &(0x7f00000017c0)={&(0x7f00000002c0), 0x80, &(0x7f0000001680)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/2, 0x2}, {&(0x7f0000001380)=""/152, 0x98}, {&(0x7f0000001440)=""/99, 0x63}, {&(0x7f00000014c0)=""/43, 0x2b}, {&(0x7f0000001500)=""/118, 0x76}, {&(0x7f0000001580)=""/238, 0xee}], 0x7, &(0x7f0000001700)=""/145, 0x91}, 0x40000000) pread64(r1, 0x0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x28, r4, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {}, {0xc, 0x18, {0x0, @bearer=@l2={'eth'}}}}}, 0x28}}, 0x0) r5 = epoll_create1(0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x1000000010, 0x80002, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) r9 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, r8, &(0x7f000086fff4)) r10 = getpid() r11 = gettid() kcmp$KCMP_EPOLL_TFD(r10, r11, 0x7, r5, &(0x7f0000000000)={r9, r8}) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000001800)=0x8) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x10, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x44011) 03:37:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) dup3(r0, r1, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x313080, 0x0) 03:37:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r3 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r4, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f00000000c0)={0x6, 0x1, 0x8, 0x8, 0x0, 0x4, 0x4, 0x2, 0xd, 0x29, 0x50, 0x5, 0x8, 0x7}, 0xe) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f00000001c0)={0x9d0000, 0x8, 0x0, r3, 0x0, &(0x7f0000000180)={0x9c0902, 0x8, [], @string=&(0x7f0000000140)=0x9}}) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r5, 0x4008af23, &(0x7f0000000380)={0x1, 0x1}) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) lseek(r1, 0x20400001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00007b9000/0x2000)=nil) 03:37:03 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x5000000, 0x0) 03:37:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e7a00003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:03 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) pipe(0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000480), 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)=@random={'osx.', '#}em1\x00'}) preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) preadv(r1, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_DIRENTPLUS(r1, &(0x7f00000007c0)={0x10, 0x0, 0x2}, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r2, 0x0, 0x0, 0x0) sendmsg$key(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)={0x2, 0x10, 0x3, 0x6, 0x6, 0x0, 0x70bd27, 0x25dfdbfe, [@sadb_sa={0x2, 0x1, 0x4d6, 0xff, 0x1, 0x45, 0x3, 0x20000000}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d3}]}, 0x30}}, 0x8014) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000800)=""/4096, &(0x7f0000000000)=0x1000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) fanotify_init(0x2, 0x2) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000001c0)=0x4) 03:37:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:03 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNt)mer\x00', 0x40000, 0x0) close(r0) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r1, 0x1, 0x0) r2 = socket$inet(0x2, 0xf92350510b4ace25, 0x8c) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r3, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r3, 0x3}, 0x8) r4 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r4, 0x1, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r4, 0x80044dff, &(0x7f0000000000)) 03:37:03 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6000000, 0x0) 03:37:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2ef000003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:03 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='\xeeMY\xb1\xb8\x971\xcf\x8bmer\x00', 0x4008a0, 0x0) close(r0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x180, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000080)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000000)=0x7dd) 03:37:03 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x7000000, 0x0) 03:37:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x448000, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f00000000c0)={0x1, 0x0, 0x102, 0x0, {0x1, 0x1, 0x7, 0x7f}}) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x17c) 03:37:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0003003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r3 = socket(0x10, 0x803, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x40004, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x0) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x11) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x3, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 03:37:04 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={0x0, 0xeff53766}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r3, 0xa1, 0x8000}, 0x8) 03:37:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000000, 0x0) 03:37:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0005003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c00000010002b0400"/20, @ANYRES32=0x0, @ANYBLOB="000000c600d0d8b04e7f398a5906007d18b815fcbe2ecde8e7001c0012000c2c69ef2bf86f2698"], 0x3c}}, 0x0) 03:37:04 executing program 4: syz_open_dev$ptys(0xc, 0x3, 0x1) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r1, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000000)={0x2, "e81e5dbba05966de6d4b61c27fcaf440fee95c27533817a0f07fde5d88fe846a", 0x1, 0x1}) close(r0) 03:37:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xa000000, 0x0) 03:37:04 executing program 2: syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x13}, @multicast1}, @udp={0x4e24, 0x4e20, 0x58, 0x0, [@guehdr={0x1, 0x1, 0x3, 0x1, 0x100}, @guehdr={0x2, 0x1, 0x2, 0x5, 0x80, [0x100]}, @guehdr={0x2, 0x1, 0x0, 0x0, 0x100, [0x0]}, @guehdr={0x2, 0x0, 0x3, 0x7, 0x200, [0x80]}], "add3d54c9a918f3086ea165a56066d7513ec0ca6d81a304547c6dd589e826881553266b716b826a5a98a0cb7fe0af7e2352ac30a"}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x2, 0x2db]}) 03:37:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0006003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:04 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x218103, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x4) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket(0x1000000010, 0x80002, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) r10 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r9, &(0x7f000086fff4)) r11 = getpid() setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000001ac0), 0x4) r12 = gettid() kcmp$KCMP_EPOLL_TFD(r11, r12, 0x7, r6, &(0x7f0000000000)={r10, r9}) sendto$isdn(r9, &(0x7f0000001b00)=ANY=[@ANYBLOB="e60a00007b0000009b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32c459019fefefb4277cb7309a05a8b98a830e8ed6bcfb8e230fe56bce838eb8d3e9ce963a8362b008673481ab5a57c943277165fa669c5a94925f4904b768030ca9d5"], 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$KVM_SET_PIT(r9, 0x8048ae66, &(0x7f0000001a40)={[{0x9, 0x8, 0x8, 0x8, 0x1f, 0x2e, 0xff, 0x96, 0x0, 0x1, 0x1, 0x1e, 0x5d}, {0xff0, 0x40, 0x5, 0x1, 0xff, 0x81, 0x8, 0x7f, 0x80, 0x0, 0x0, 0x4, 0x1}, {0x5, 0x0, 0x7, 0x40, 0xff, 0x9, 0x49, 0x98, 0x5, 0x7, 0xff, 0xd7, 0x10000}], 0x8}) r13 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r5, &(0x7f000086fff4)) r14 = getpid() r15 = gettid() kcmp$KCMP_EPOLL_TFD(r14, r15, 0x7, r2, &(0x7f0000000000)={r13, r5}) sendto$isdn(r5, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) syz_open_dev$media(&(0x7f0000001a00)='/dev/media#\x00', 0x800, 0x40000) sendmmsg(r5, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000280)="83e6eb2ddf3fa78078ec23460ebcfd1a90481a996d1e2c9224f7253d42e08df78f25015be7f913dcd33e003469376af893d686c43b66ca51834a3b9e10b271caee05cb4fdb5f42134b0a4528d7743d39e2ec5a87cf2308921b36b9cb16c761c0809f9e076c26dd1fd4e8ceba054764545c07c61287c926f4f8076088d295bf4dd146f84047178e2291c0d7911aa69540a33bea4e1d94536916f65a8d9e55d57cf943eae85757c8cbdcb6f4ea5828111f228f72561fbbeff385c7cebe6a5f0a4f0f30244b5b920977d78677b478b55897ddfe733152c8230bed95d544b2398b17253eb9ce415aab8800b2293b81430ef5eb1e5636c9f66c618335ce0d37bc90f5cecce2fc37845327c32a49017f7af02128c62d2d41cf9aa5bf3cdf21fd603b64ea8269d3f396c3c4e5d975663a55536d1424fe3f5e575a5d5cb957640a4c7c59fa2df54ff459c27a96f94bdda61f2a8ca45265dfed5928b86c999817a9a20561e0336eec39724f91da1d35f272e13df02cd27d44a572216c3b9d9b30cdd3089dae5f84f74f1ec18d17a0a2c4b776d69c7eeefa1a984239c36f278f828666055f8f36c70ad3f23af3eaf4c51f38915e545057df003df8c8e5fac491b7d2f0de1af3dc111a71a3583fba94c6b8d16b1afc7e0b92c2fca0ee2d62c66175d49152c099348fa2ee2a04de8eb701c6a05bb1dbef69cdf009a8d48e58fb384fe43d9cd8ee9ddf8cf961640f97974f51fde949bcf57de2265be515fa01cbf1d3c9da6e1a5f2de6aae3e647a68c927a54a4c7047b079646aa13f7a0f562203c5c206cc4de1c11535ae43cafa544c79b2f17daf69f30c73c916db475a6d275cf4f3a89bfad739080451e94d9a0a590dfa7d3a6bd96aafbcddb0a66057489ff5b77d200d9cd152e2d643eb84ff4ab3bd1046838cb9b743423bf5d1a6f45d7523fb2772940c4a2493dd57ada5685cdb54f66f7c4a0e84be9bd972edb855529a3bfdce79a52def3ee5e4c261a189ccec97f96fe37453b22baef98e4989850461a1d994e91b8ec42774bdada8ac380ee3a577b1b6ad1f5fc8382ad3741931ad4e945a01c75d8ab1fd9512547d174b0454ce59177f65cbe6861f3ff48e955ead66556bab1073858ed19c93db8655ded8078806a8922724c19d35f387207f2353c61d72d8e30df2ab9c1648804be7fa1a78c5bbea02f62b0fc73481c51519d33da12d5d2eca7d0c46b12c47316c1db38d11b774fca2babe773a0bdc114b93a98dc84b1dc070f0aa71813cfc072ce2aea4dfe6595cd266deef1146d8bbc9816acad029fdc51e492c6c96a8318192094053f2330e5d2a1b6e51708292b2ea292c31e66cdf909fd25801bbad6f7097e6c5f735f9532be248a7fb0713304bf4787533969fa4d6a07d5f39aa6b13eb7a626aff1e9dfd50f242e36da3d91e31d134e33a77dbddee120c9602cc48e569f71357e0e9a097e327bc92802feda8f1d10b76f74d604b88255104f9a797b65a2a1280f7f9d1d2725cb03b7637fdcc5dda793c0b3e2ed55fbdbe30b80a9754d6377e581ed3e287788400bcf9387b16d31d84cd79ce0db40fb3c07504ddcff427db66034cb2a64d2bc3564c5424d3920592cbbdc04c2ef402a39450a155a4ba1a85c5fc72b57d956a40c8a123e5fbee2b713c38c0b895b860291048900456f52c86c3e5a734932b7b64784c28e05fcf1cc8ec6667b0e726b6f914e2975974d48bf08423753fd0ea0a0c793d07be996e05d0ef2f55fcfd7683298f2a0adddd672bc0f3b338e0b6d628536a24928be660f5926ebfe02309c56fe50e8d08018130cbd73981be8f6e4b5a28209154aea5bbc3125c75f21ce76f1188459bd17614b00a936ad8538f46d03f0c7903309891260fe3bf16f299c366cb8deb7452faf59b650a12781fa0b5e08bfccd1e08e0356ad8ff791b96a32de45ed60eb2aa8e5acf93fa58891248272523658fa6fb141db472bd2a0369a21e415daf48e51df0b8bf185b6193c54842d78639c865fdd7592bea89a929b2902846786843644d3a2e7c3a037b46b196648fbb5644200fc4861c0a3669f186d491c1e5e860bf0d4527912b2a7c69882f25d3d961a79c2ca32596201faa01fbc05da15b0aa6face34ba908af87f83ff4c464a48ea086e3b41b69930bd3bbe9352de8bf4717fc6bb4acd67f30ed2b2a2133166ef8b53600d8a94341ae5037b682b5efeeb2c80225cf20e1643a9e853bbfb7013416a2030a2f4b660a483189e7ee3241d80ac5bb2bdabbc8c90625ebe35809714690e6149282c09277ca9ed4cfffb8e93f29892dfea51c5af61fc575a05474b011c0b788ee298274ca0af614fd68293bf4a847a795e82da67ee854e220d4b84909e1ddacf2d1bcd068991876cd1e42da285447a7060853c3f6358d1b7fd9527a0da79153cacb8510189ced0f504cf5a74437bdb58fddfc8adf77049b6a42d11cd854c34c4d3e0e72d23f6e84cb5b72338776dc258f1c15d301bf60c1cb76955c7e223abdad0ba22d611b721403c94f4b663692298728236e31ff492d2f3268e59e06cbd98a71b09da30ef654a639949e850046dfab9826f1034af1888bb490568fb546987e0e65013f732d94e40a961f34cc0842b1e806bd2319836417f25c94c60ead0fe3e941cb21f0f223ee13f460709779b795ab95cc50ea63babcc5e46d8cc2339f77e800d98b1be625976fca65c8961a75a05074831e00b77c4cf1d52c2bbc397bb11efb8ea5b9dac30cbc0a2401e79923dba12b722109c19a71d87c4b99f52627350a5e0153edc74786b1b897686d93bcfcaf787e4fbe257f34d3be47de9c322c67d0b844b6b2183a358c27e7f6cde2152c59c900f88958aad94f88ea9623fc3b0204afd37c9c51fceacefbfde303587f904ff365ce98d0de2e6a124a01cb789326cf8ae412979f629a784e86432512bcaeddeac3504bd48ed79897d1349f7909a9def189f3fdea1044918ea6063a24f27cc9b76eb0c76c6c88a86e3badd453ecf7cd5199c9f6d56d9945da1bdcde0b19c38fc0c0fb0f1b1c44212a625825cd79903eeed77ba022193c72b5d22054c4586e97c965142aa022e44e70ff7c6b9924a5ebb67ecb4f899e6a7e33ae37f07864556de7c594caa5be1c152e50b4e8fc2ca69c34a23dbfdd909a29c2bc75232224cc526454201863679bfa62ca5820f681e57f23428946d223e75d0eb3f02544c7159577362d0a94380fedd530c9d379d4e6e829329911ff25c81b29b03fddcb034356c8a60909b7d1d53c4908a47556224b155f0b01bba8202a23115681be800870225a6a5b16320aa56c9427da077260fabd50bc02becfa0e949cc1e4711c40926beb2f34853bfb687daed0dc841f7d1fd1ef6188923dc7036d7f4d5723ffdda151a3b8398122304a0022b7922a8b8968a742d63cff263c256d8c0af639f047911b730f2226c29adcecdc9458766ed4266d49809d841be842c7a6da5cb84ae4b0caba9d9984fb3a191c613fabce4ff5b4e963908b586ee93d211769ee82da091d73c69848da0799a567e974e7ea8c2990ccd2bf06f073dfad666602b60729597d25903414340c21f15bd8a397029a0f5e611231cf008cea1f41911d71862f75476125a4b3b5bac71fe4567c3a56505000ea1571b94d0513d828ed4b176373153d2c394afca273adcf4e96beff2b3eae7d82867101d74516896cc548af4bd1c9eb9c4bd48455b68a8f071346242444cc70ed5922e8f9a4fa98583d7d11021c08821f084c4b15a010ada4821f5a0ebd324aa9fff4d1b3874be7cef886e9f3464677374377daea4813b5beda9f54fdca8ae57034023ef0d7d6d3f5c73d080ab59690b1e4248d044ae472d9bb61b791f70a5185e4572d06dbc4de76be2efd8c8fdc3eb0f573417d0a332b5fc74cec4b5a730d0c614e425afbab60d0c50b7a343003131d632401a102921494765dc96f9973b8289d8ce91ccdf2d9e486bc12ae88df663cdd6b7e795c6ebb6236ac5c0158f9df0aab4970a19eb469bc001dce7c789d25373f57833f837ed38e5582cd26db916d3f6061df69d4a223a029d5b15367b007c4f5f941bb2ac60556cfd1d5e6d910386e2f6575a458031c41a2273400d478f1ed67c9b38466b25e6ce8b7c4667440b9e81fc86805a7a2c2dec9ea3b321f34346040a5b634e42192b1116637611945f24c3313a3b7e446a85270cf10614e6ce6d09f68976afc304482d693c11787d57880237cc6bacb4e51e2170285b77f985c053e2de85f4715d4f12e50497915e8837187326277b93f90b75acd76ec92eb8e800b836514e5d8883d652d81e91856605c9df0b81d995559cb6ec30614445a4e62c63711e446e70f4b14228a62944dc8d9cd58b3ed52999fc2dc252f360a666d9592f423883b442c5320f8085a961959f7e63657f71f20e539910b89f68048c70d638495eb9bc5fdfc43c0d84b62c6111a06c4f9de953a1796643158056c20715e12e32b206b77f762bddc7d8460e553176f1106b8a84eeb4ba8002b477bb16cf3330c7adbb366f1698dc91579e08cb6cae1527cfb4b6d8e57f9c0a2093b04d24e10c7795a42634dcb98a4e3552dcf4a4ff388623c659498820fe7a5dd2009e480cc7e8266db78f2d401711142e9ba325bfa0fd16fab2ee4cd8818439fcf8d1fc6f9522caa8b7eee7b56afbb4167786bc2823a843cebc9ce4f6a6d28377fb91844812b0503020c2f053d16650d2ea5d032b9f33dfdb9256dbd6a11bf0a3ed30ebe5d1ed5ce208de9570fb86089b91772ced3e54f1f23ac24f16eab3c385da926cd2bf7e76a8933c56b876a6b236a3871548a4c9163de65aa74b8666f612ad8f2ee75753e563d509c4e42c032a0ff3b3b2ca79384c9e4d523f7807c58f621961c926ee2408a377bcd30ce7536f6e8e8e0cd5502764f7dd7072b3f3f1c7d29f851acb4230d97b140b44e39dfa78b29637301a3867bd15d5ea4efe2dca5c7de1faca219b70cc8fec3f18139d44e1a1de9f1f45924742a199e57ccce4cb320772e2a8301a044c5813deff623bf796cd5b1c952ea9d1a00f133c16f3a670109ae5e48fb2b19a5707d305c94e32b84a00cf8394bb147e5d05153fe4617c2ddd4957aab0e50924275038e169c1db39ac4e2b24485e0cf869efdc135441486a5036547977e4248fa34f7abd99a1ee094449ece05b4bde40580bfe30f343e9d7ebf7db89b378b9c20e84addb0cea732c903bee3a2b047396290efcd13686372064d176cd0de10cb1bc00e012854ff98c6ef0f8b9e02d8c6e96fbb2cb55e3c586bb73fafe64441eafe12157bd35aec178a8f333b025861bdf1a2c1c8e7288f81d513bbaac195e4dea6d74954c162cc605116bd31270bc3107fa517da1fa991651bb9cb7add2500c3f027910af7e585d3b693bd2de90bd57eab80231f95e9b6d5c8b471b80fda1a63e75c643eff5a042dcc2ec8e8ae4c838d561b0505b26c7c8908a4b9e178f5ba43beb14944380fb72905b79ed7d6a51e3201eda3f84b9ea461435a4202894de80d6a020dec3c8be3dfc80c7bc10a29b8d675e60ec5fb43f7372813fda71286efb2e7179cdef83c5a939a9d555deb553ac989ea0db89b1ae0564d07d6bda1ffdf1cf7931ed9242320d3fbbf549a2bb4b36fea3f6c32f286f02bc124982648b9fac021729380884cb8a78bd5efb0f47090d35ecc77bff09bc15b78a558362987dda0043ef36e1739e8c232d44ee6c7793979988bac6d4c51ef155682acd9c395fe03aab720d50aee1ec85bf492ac48223777137e0ea8363724a250e09c0edaa", 0x1000}, {&(0x7f0000000040)="66cd0e76dcfb96e60e217f4b9a360863544bb192ee226b9f59a4e659ab803805644eef686fc30caa3168ebbe5c22a3e7dd", 0x31}, {&(0x7f0000000080)="0f65c6a597cd5b96ad85552f7832b83e", 0x10}, {&(0x7f00000000c0)="dce291c1b5573db021e6b45cf4b76f2f4e9666ac4cc35435e46e3166b6ade7f8be7350c36f2d3dec593386b8b150fff28683018005c3bf77d3e9d681444a8de7b2b3fca2b4382bf55abe554541d48a9d5d760f6fc087dfdbda4d1eb35cd116784705ff29deaf69e0040e15592b4b6da3767099e8af8801cc1cba9aa288e97ce9a5f37890af660b14030f40c16d68aabef0f5a312fc4d8444539a69cc4b24beab604560e3aec9c6cd77365d3d63347368a7f9b9488f09a1d258928f9d203124eaf21942bae674c5b3085e835c80fed519e721c8ce98aae82176d8e998c7beb4287c0a", 0xe2}, {&(0x7f00000001c0)="15dd873356e2efe9018515c747e916bd0e6962a561ee3578696da030e06aacec53056f0e32a92c17da54526d24fd11bf57fd7c25e729a35294f94bf23a25f09114fc299794be8c8c7d7677830a126853cad279d76dc8ca", 0x57}, {&(0x7f0000001280)="904dff717eea57a7df96ae295a3b2f90a21d56d3253793b902967b9d190d0012861d253320115b1547393a3a7d689c4488f987e070524cab97527ddb04dcf0f5a74c4cc5779e0234996abc95235436efe1b9235f53afac58da8d35fcd303a076ea7ae63e46ce488482e84a5d99f5bb267bbda9c8c46f4e75c9e4a06e66c12ebfec2506f5c98f9816d6bf200e8ea6dc47db74479ca452644fc6f7f79464cf1f8bf9462c1035452c4181aa319ebe5ee5af0991a7d8c9f1b7f61733a564339dcbee0bd411", 0xc3}, {&(0x7f0000001380)="e086da9a854b7198eab392af39a15856c04136d5db401f0912703a608fa349acf56061d07199bb92750098a596217f9c114d018ee58427fc4f8a21a8ecf5d0c4756db9565d67d8d99e7468281b5b072c6facd658c967684131126d84af18897c7443dae84ad891d07d2f601d84d27fe36591f9b56ba0f02a4f9403fb4a4b4f9d903904cbd9368d55dce27b2b4ecccb3b5d7a0883403eda6ee2", 0x99}], 0x7, &(0x7f00000014c0)=[{0xb8, 0x10b, 0xaf, "8e3dd3608a56ffcead235ed006feb96a0b346e81bcd3a674d82f7ad7faf999b22fd2355cbeefa4519065339159c3967823c5edcfedd84b0b5e7852d537b902cd7ade7beee93f0c82ca71951c13fdeae21d90104ff18a8693b8846d4d91e3c768113396058e5a01b73ab3df6c29236ca3bcd4a5abf1f387cc1c7349945837c11edf2b585c295e3cf39416d639b90a607a469e7ca3d24e79957999815871d56e29816552689202b3"}, {0x58, 0x107, 0x2, "3fa44892c7485b31deba0801f67e4295837f9181c1d7e07af068c212ee2a26c9c9219a43756494df8f298e74f72d6ea1c6170e0db29e1a6f0a117293a3703b186d307b9cccb6"}, {0xb8, 0x321, 0xffffffff, "45de392e36fb883eb9155bf993aa675be3f55d990a846655af942df6612c26f3207081f7b3ffd68aa7d61e8222368da6852acfef267c18cc67057f112e4087f863390587d20abda2436458622d2f0d55074c59df79adf2a609984eb917b6fad40981690ebcf8a4f627fd589cfa58ea9ace1172ff7bb8ca48ea9848ed479646eb1be36a4129bd07e0a9d871846c5fa4683516c007d87868462a502f247b9b40308b90cd27bda4"}, {0xc8, 0x8ab1d83a34928b56, 0x80000000, "2ac9f5d8eedee9ea1e089d68b4964921ff90b3cfe40f35cb6ecd40dbc1da5cce80a026626eb8bcc31176e2e11e0f139cf47df8c26f0404de76148829606eda6c7c0eaf80954bd7a4f926cfb895da1d15dbab1b6c08ea11f05772e920c78406c8cb056e1a33dfcc138dcceddcaac839faafb5eab3907741b1cab62c253c5a2e4054b36c23026d4eed71eb208eae0f2d00eafaea099935d741cc639b17d2e80210b24bdf17c5e2b82cfdbb78651d60dd3318feda78190a"}, {0x68, 0x29, 0x6, "aad3c85d5a178c9fa97aff01a2cbc31130ed0ed86736c593a1a4646eb9a2fb2b8a82be25c75bc479e26ed9ca32d405c25a85d63a9f21ae022ff8b5f9de5e0a840c846dae93c9bedcf7d64644759bbcd259e69e9b84"}, {0xe0, 0x112, 0x8, "0a40debc0b2b0e6d71be03e417147be4bd48c73ea306400735588a0f633a8fe482c575e24a2b0106b7bca5ec9b44a500baaec34e54c927121fff2a0589c197d19b57712e9bfe8aace8d1d26352e3da7231ee95ce90b5765430a86c5c166b1fbf6769507b01c29e29dfcb3ac13d98cffd9e7b6d209d9e9e390510532832445baaa70ae97e26020111d4e81242d44509e48a4f6c603b10598c2087e0b0d5fe28e44389c892086e7b37b3b04c43847b0c63dedf52aae7df7c4d19452fa5cef0c947dbde98f28ee995764d8b05dd6af6"}, {0xa0, 0x110, 0x8, "d1cee9ba33a9ac82f869641e25f3b6d7a9d6387a1e079a56af7b3381c64b8d21a876c5e8b843f153861b447fe788cb76195dd31ee62926cad6eaeab72d90986d12d9f419a51fecf34d0373176ec782dc4766e31bdd8bf73357bcdd031cae0641a24a21ae5e34ab5b2b84a39c3c33b31231289c92ba200ab9d12c0a4013aa33551ab612ad242d3fa8f3d215"}, {0x78, 0x1c3, 0x7, "21ab723b7aad2beeb5e87643322cdf0cbe0c627086522556871013f26947d23209584cd1b090bd86941add6c1aed75bd5b9d382394f8737c237faf2c026add7180dfa94db7924c75ad542e6abf0566bd53de1dca32d5c9a28cc4c0d743b1271cb053f89c"}], 0x4f0}}], 0x1, 0x8000) close(r0) [ 637.111452] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 03:37:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)={0x58, r2, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000ea2500000000280012000500000076651a7d000006009e00"/36, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000006491bdad00"/64], 0x58}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x186d3d3b29695227, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r13, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000006491bdad00"/64], 0x58}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x186d3d3b29695227, 0x0, 0x0, {0x0, 0x0, 0x0, r13}}, 0x20}}, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r14, 0x0) getsockopt$inet6_mreq(r14, 0x29, 0x1c, &(0x7f0000000180)={@mcast1}, &(0x7f00000001c0)=0x14) r15 = socket$nl_route(0x10, 0x3, 0x0) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket$netlink(0x10, 0x3, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r17, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r19}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r19, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000006491bdad00"/64], 0x58}}, 0x0) sendmsg$nl_route(r15, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x186d3d3b29695227, 0x0, 0x0, {0x0, 0x0, 0x0, r19}}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'vcan0\x00', r19}) r20 = syz_init_net_socket$ax25(0x3, 0x5, 0xe) setsockopt$ax25_int(r20, 0x101, 0x0, &(0x7f0000000000), 0x4) ioctl$sock_SIOCDELRT(r20, 0x890c, &(0x7f0000000400)={0x0, @can, @isdn={0x22, 0xff, 0x19, 0x2, 0x40}, @ipx={0x4, 0x8000, 0x101, "627d1b077e40"}, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x2aa, 0x1}) r21 = socket$nl_route(0x10, 0x3, 0x0) r22 = socket$nl_route(0x10, 0x3, 0x0) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r25}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r22, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r25, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000006491bdad00"/64], 0x58}}, 0x0) sendmsg$nl_route(r21, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x186d3d3b29695227, 0x0, 0x0, {0x0, 0x0, 0x0, r25}}, 0x20}}, 0x0) r26 = socket$nl_route(0x10, 0x3, 0x0) r27 = socket$nl_route(0x10, 0x3, 0x0) r28 = socket$netlink(0x10, 0x3, 0x0) r29 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r29, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r29, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r28, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r30}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r27, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r30, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000006491bdad00"/64], 0x58}}, 0x0) sendmsg$nl_route(r26, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x186d3d3b29695227, 0x0, 0x0, {0x0, 0x0, 0x0, r30}}, 0x20}}, 0x0) r31 = socket$nl_route(0x10, 0x3, 0x0) r32 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r33 = socket(0x3, 0x801, 0x1) sendmsg$NBD_CMD_DISCONNECT(r33, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r33, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r32, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r34, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000006491bdad00"/64], 0x58}}, 0x0) sendmsg$nl_route(r31, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x186d3d3b29695227, 0x0, 0x0, {0x0, 0x0, 0x0, r34}}, 0x20}}, 0x0) r35 = socket$nl_route(0x10, 0x3, 0x0) r36 = socket$netlink(0x10, 0x3, 0x0) r37 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r37, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r37, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r36, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r38}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r35, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r38, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000006491bdad00"/64], 0x58}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x186d3d3b29695227, 0x0, 0x0, {0x0, 0x0, 0x0, r38}}, 0x20}}, 0x0) r39 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r39, 0x0) getpeername$packet(r39, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001700)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) r40 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r40, 0x0) accept$packet(r40, &(0x7f0000004740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004780)=0x14) r41 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r41, 0x0) getsockname$packet(r41, &(0x7f0000004880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000048c0)=0x14) r42 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r42, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r42, 0x29, 0x23, &(0x7f0000004980)={{{@in=@local, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000004a80)=0xe8) r43 = socket$nl_route(0x10, 0x3, 0x0) r44 = socket$netlink(0x10, 0x3, 0x0) r45 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r45, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r45, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r44, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r46}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r46, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000006491bdad00"/64], 0x58}}, 0x0) sendmsg$nl_route(r43, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@dellink={0xb2, 0x11, 0x186d3d3b29695227, 0x0, 0x0, {0x0, 0x0, 0x0, r46, 0x400}}, 0x20}}, 0x0) 03:37:04 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xf000000, 0x0) [ 637.156857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16351 sclass=netlink_route_socket pig=25059 comm=syz-executor.4 03:37:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x4, {0x0, 0x3, "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", 0xb9, 0x4, 0x0, 0x2, 0x100000000}}}, 0x128) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futex(&(0x7f00000000c0)=0x1, 0x81, 0x0, &(0x7f0000000200)={r2, r3+30000000}, &(0x7f0000000240)=0x1, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r7, 0x0, r6) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000340)={r8, 0x8}, 0x8) pread64(r5, 0x0, 0x0, 0x0) ioctl$FIONREAD(r5, 0x541b, &(0x7f0000000280)) ftruncate(r4, 0x200004) sendfile(r0, r4, 0x0, 0x80001d00c0d0) 03:37:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e4906003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 637.293356] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16351 sclass=netlink_route_socket pig=25067 comm=syz-executor.4 03:37:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x21000000, 0x0) [ 637.394446] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 03:37:04 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x40, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) close(r0) 03:37:04 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 637.516399] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.5'. 03:37:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0007003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:05 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3f000000, 0x0) 03:37:05 executing program 4: ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f0000000000)) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x200000, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) close(r0) 03:37:05 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 638.102795] net_ratelimit: 36 callbacks suppressed [ 638.102814] protocol 88fb is buggy, dev hsr_slave_0 [ 638.108275] protocol 88fb is buggy, dev hsr_slave_1 [ 638.119980] protocol 88fb is buggy, dev hsr_slave_0 [ 638.127382] protocol 88fb is buggy, dev hsr_slave_1 [ 638.134222] protocol 88fb is buggy, dev hsr_slave_0 [ 638.140379] protocol 88fb is buggy, dev hsr_slave_1 [ 638.146624] protocol 88fb is buggy, dev hsr_slave_0 [ 638.152414] protocol 88fb is buggy, dev hsr_slave_1 [ 638.163583] audit: type=1800 audit(2000000225.600:152): pid=25089 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=17265 res=0 [ 638.375746] audit: type=1400 audit(2000000225.810:153): avc: denied { accept } for pid=25066 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:37:05 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x48000000, 0x0) 03:37:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000a003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:05 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x4000, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x800, 0x200, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r3) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000280)=0x0) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x2012, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2498e4cdc15b193a}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xffffffffffffffc0}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r4}}]}}) close(r0) 03:37:05 executing program 2: fchdir(0xffffffffffffffff) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) getpid() pwrite64(0xffffffffffffffff, &(0x7f0000000200)="bd71f1ceae255c571db97e00c06f183e932d1be2d466245d760bf3b34e11232426ba91d50989788efbe8cb38cad809ce0c1d006cf5b395a1c1a5d7d2da931380690957e89d656c918f25f44570beb4e70fd82f05d79a495b72584848867517e7dc6b75a6cd7289d50f48484a626012806c6a19568de2c60212ad1e2a5cfd53d22d02b45b1668eb2cbaa184221c976436e659d011ad502a9ef6c9ee08eb2fda13e36040ea4291b81cbf03", 0xaa, 0xfff) sched_setscheduler(0x0, 0x5, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0xfffffffffffffffd}}, 0x18) vmsplice(r0, 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/sy}in\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0ec\xb6_\x12o\x88\xe8\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r1, 0x1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r2, 0x0, 0x0, 0x0) accept4$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000380)=0x1c, 0xc00) r3 = epoll_create1(0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f000086fff4)) r8 = getpid() r9 = gettid() kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r3, &(0x7f0000000000)={r7, r6}) sendto$isdn(r6, &(0x7f0000000600)=ANY=[@ANYBLOB="e60a00007b0000009b20027331d17935ffb584bd41d20483f402c670d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670360932"], 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$VIDIOC_QBUF(r6, 0xc058560f, &(0x7f0000000680)={0x1600000, 0x2, 0x4, 0x80000, 0x2, {0x77359400}, {0x3, 0x2, 0x6, 0x0, 0x44, 0x4, "010d208d"}, 0x401, 0x1, @userptr=0x8, 0x10001}) r10 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r10, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@mcast1, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xffffffffffffffa4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef7}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x8) mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x0, 0x0, 0x0) r11 = syz_init_net_socket$ax25(0x3, 0x5, 0x8) getsockopt$ax25_int(r11, 0x101, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r12 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r12, 0x8914, &(0x7f0000000040)={'ifb0\x00', 0xffffbffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r12, 0x8914, &(0x7f0000000340)={'ifb0\x00\x03\x00`\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) fstat(0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x14008010) lstat(0x0, &(0x7f0000000400)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 03:37:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x3, @ipv4={[], [], @multicast1}, 0x4}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0x9, "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", 0x9, 0x58, 0x1, 0x0, 0x1, 0x3f, 0x81}}}, 0x128) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r2, r3, 0x0, 0x7ffff000) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000340)) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r5, 0xffffffffffffffff, 0x0, 0x7ffff000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r6, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r7}}, 0x18) r8 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x1, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) ioctl$KVM_IRQ_LINE(r8, 0x4008ae61, &(0x7f0000000000)={0x0, 0x10}) connect$inet(0xffffffffffffffff, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(0xffffffffffffffff, 0x100000004) r9 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r9, 0x8983, &(0x7f00000002c0)={0x0, 'caif0\x00', {0x3}, 0x6576}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x1ff) 03:37:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000e003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 638.501252] protocol 88fb is buggy, dev hsr_slave_0 [ 638.506485] protocol 88fb is buggy, dev hsr_slave_1 03:37:06 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x84000, 0x0) close(r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x501201, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) 03:37:06 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4c000000, 0x0) [ 638.648204] device ifb0 entered promiscuous mode 03:37:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000f003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:06 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x64000000, 0x0) 03:37:06 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x1040, 0x0) inotify_add_watch(r1, &(0x7f0000000100)='./file0\x00', 0x800) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000040)={0x3, 0x1, 0x1c, 0x1, 0x19, &(0x7f0000000280)}) ioctl$USBDEVFS_GET_CAPABILITIES(r1, 0x8004551a, &(0x7f0000000140)) 03:37:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="1500000065ffff01800000080039503230303076733d1c2ce86f7552aaebd9762e4cc74502f987c2cec6504df6ead74ed8a44347a64ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d0000000000000000000000653daf5b4a00000000000000002c99cc51dd68bfe3b73664aa06478eda2b4c2adc0ba93ebab17350060351c1d9f356ae581b0d12c7891ea2763b3a435263"], 0x15) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r5, &(0x7f0000000180)={0xa, {0x1, 0x0, 0x5}}, 0xa) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@posixacl='posixacl'}]}}) 03:37:06 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000080)=0x4) 03:37:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0020003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 639.338348] device ifb0 left promiscuous mode 03:37:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev7u\x00\b\x00\x1eom\x00', 0x410200, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1) sched_setattr(0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000240), 0x4000000000dc) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x81, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept(r0, 0x0, 0x0) recvmsg(r2, 0x0, 0x0) connect$vsock_stream(r2, &(0x7f00000002c0)={0x28, 0x0, 0xed62509674527dbe, @my=0x1}, 0x10) syz_open_procfs(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) socketpair(0x4, 0x0, 0xff, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000340)={0x2, {{0xa, 0x4e20, 0xcb, @rand_addr="6fc77a6b316a39b5be9ab97c9ae8d166", 0x5}}}, 0x88) lseek(r3, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="00e60324beb621f46b3b0000358b07ce84a37c350d5ab862f90356d39768ff65d0d8935111496ccff9e6b3b41500000000000007ff10691b9ce91d49"], 0x3c) fallocate(r3, 0x3, 0x0, 0x8020003) dup(0xffffffffffffffff) socket(0xa, 0x2, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x36, &(0x7f0000001440)=""/4096, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x20000000000002) syz_genetlink_get_family_id$nbd(0x0) 03:37:07 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x4, {0xffffffff, 0x4, 0x4, 0x1ff}}) close(r0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000080)) 03:37:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x68000000, 0x0) 03:37:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e003f003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7905faaaca74ae5bd71f5b27df7b091c97554bb007c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8d9ffcd60ac4807ea6b29aa6d36fc1107b9cf2a89a797cd5c578f0000000000000000000000000000009b28a2bbd93c5d476ecc2fcb8e6ce94529bfa7f761657eb5945c049d3690f62392c059f662a65f75cc87fbebe6686a9f77e3950e17868405c1980de93ac341f44a0436900c6c3bce7f6d0da0ffe994f5ddb56b9fbf24de6967fc1c9ab6d884a965346b1eb306eb47f2458f769d5b2577aa5a89f4c0af61872c7c1ab888231656a92b01a9032c"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = dup3(r5, 0xffffffffffffffff, 0x0) sendto$inet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000e8e57e585fcbf4036697f50742ac1181", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x30, 0x0, 0x0, 0xfa17}, {0x6}]}, 0x10) dup2(r3, 0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r4, &(0x7f0000000080)={r6, 0xffffffffffffffff, 0x4}) 03:37:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0048003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6b6b6b00, 0x0) 03:37:07 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '\x00'}, &(0x7f0000000080)=""/93, 0x5d) close(r0) 03:37:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0649003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6c000000, 0x0) 03:37:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:07 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x74000000, 0x0) 03:37:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e004c003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:08 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x20080, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000180)={0x74, 0x17, &(0x7f00000002c0)="4715850d7472076777d1408c1d4aba38814ea8065c2c3de0b103bea3aef20329f51e2af0821011bc0ef6425cfd97230d2950021ee5af9af3e9621c85761019a6405fd950d76d95ead8358ae89c2f7283038a445b383e0ca771633f047c04013bd6ba7031d11a020d3a65d158ee5e7b9611f1c5633660bf3a22542b6a8a5256a75ba773e270b20916a403e4a98cab5476e0c4ebd07931d0536be1373b08ebd5333bcdcc2182f041e266befcb75467f54c2f6a4ee0c4a5e3287652832559e69fcff3825b2c9abe1103d1250df9aaa68f70233af0432aa484efeb54b1a5273baf340e69049ee6152a44fe9a9ecdec88edd88fbef8395cc3b09734e627ad49ed70584051278c21a9651525281eba4120de0959d6a44d0f25143f3b0af8c7ab08196e28a1b79103fcc7b735b316037532589411c15179ed11c0ae3cbca2c1cc6fb8541a709f22a50c1c788f1974714ee43dbba31396bc0944f4bdf38298488c89df647bc532c13f25b6259484ce675949db728cdaa29573bbb37d973bf70da8f06806c9c23cd5c8cb83cd701ccb2e2247f0bf02224d88b7951dd111e4eaf66b3173df95f139471198dedb18488d745d8f61041b54d6cd44c4395224b7014e1345cdfe65bad2e28237eff30bde60a6cd702074f3e2bf01a8285b5a6e4d75d14ac69b8df840b484422d7ca032c4de5b7d1638d3c0feb4550a85f330be55878081502c5196ff8672a58e2eea4df380e129e4d541be9fdfae751430b0de0bfc477a7def0c726049938cc78c9916080f3c9a1487fce86392c4860e3e3d66be9ca971454a3f203acd7ad4f95e118abfb28a74a0415dcbe60c64b89fa70d2eed7b5adb53e884d029210b2e11ac6c8e340fb59247c260b223cc8fee7c05682953287d5a5c72d190b7cb24a68477c273da98f4a4cbfd9256cce1228563bf6d308da2423e3ced311fdb7324f54c7ff5079bcd8626ddb4766ad94d72861e3f4f3f584c0a785ecb37be8c86a8e846d173b8f50ff0ac8fdbdff02b1d0943427112483748eaf924177b1b67c42fb4b13eff5e52f6017d9f3c7c51e3112eb51380e7826affe747524a73a08d1f37464b6759eeba0cdce8769d5cbbe4df4a1788b7a53dd018dac7c9b3c9c41acb796c861802d6ec05a7ed0aed134763a3743811b778eec8ae36784a499666ed0279d9b0523dd7058c88325e1ddafd18742a3d859192f7b16cfb78e4f982aef2722d0d1eb5cc354da7bc7aba5c425b747630304350e87787fcbabeabb5ea0269b4cf8bb5343b1c3f569db0b2f18492e230b8366633b47e169c64635d1f1802f6ef862ea1dc4f87a5fff0267cf79144b6987c68ea0a7378a0e35a1005412f3c9c9b8c973d43d4d40dbfa65354d158116022f9639bc469aeaf02b7e01595a5a12d00e6d5c60fe22e13656b32e9e41a9e68f07cc5d18350e348486132f07fd1"}) read$dsp(r0, &(0x7f00000000c0)=""/129, 0x81) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000880)=0xc) r3 = syz_open_procfs(r2, 0xffffffffffffffff) ioctl$FIBMAP(r3, 0x1, 0x0) r4 = epoll_create1(0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = epoll_create1(0x0) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ubi_ctrl\x00', 0x129540, 0x0) read$alg(r9, &(0x7f0000000a80)=""/218, 0xda) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f000086fff4)) r10 = getpid() r11 = gettid() kcmp$KCMP_EPOLL_TFD(r10, r11, 0x7, r4, &(0x7f0000000000)={r8, r7}) sendto$isdn(r7, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x1, 0x204c001, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x58}, 0x6) r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r12, 0x0, 0x0, 0x0) mmap$fb(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x110, r12, 0x1f000) r13 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r14, 0x0, 0x0, 0x0) writev(r14, &(0x7f0000000840)=[{&(0x7f00000006c0)="a0228a6296434941f93da89e6b2bf4a5ebd6a75b902c3d507f5125ab624712a2058f4bb3c02f6327f20cfc9f557467238c15b4e1ee67eb675e8ae190765d9b1593cf478103e1b628ebb19836e4d516", 0x4f}, {&(0x7f0000000740)="5882809fd5806c0d5531714969f933b6aae06de41cb50d5411a0edeaef9bbf5a2fd24247c96044f4cf53ec68ce664e9490e97c666d653e7d5aef20aaf5f3c8054c17dce9e874c8f8025d716fd041cebb4d06e61353fd4af396ead4e25096c092d7750565f25280d0f0f73452cd592f3b682a59c1f4b7cb93d10b2a8a02f16ad5e3c921965a6748e26f226df982e603de734f4a10904e543dd5c79291064393b01c39295651ac0005fa1da971dc8881a5e4e74145b19363f0b2f2f0b702ec15ccf5272f64295a0f0d9ed34080825efed84eed6449a6", 0xd5}, {&(0x7f0000000240)}], 0x3) pread64(r13, 0x0, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000900)='./file0\x00', &(0x7f0000000bc0)='security.selinux\x00', &(0x7f0000000c00)='system_u:object_r:sound_device_t:s0\x00', 0x24, 0x2) ioctl$SNDCTL_DSP_SETFMT(r13, 0xc0045005, &(0x7f00000001c0)=0xfffffffd) ioctl$KDSKBMODE(r13, 0x4b45, &(0x7f0000000c40)=0x1) 03:37:08 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1d1000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r1) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) write$ppp(r2, &(0x7f0000000280)="f5906c40b62331da0dad7dd516a92c818808d04388d7527451d6728434a6cbb3f40b4b1beea1c1dd847b1b270aefc0a4980cbf473d3d97aa76516f65a6807edfc8f9b4c6b4a75e00b7e034ec4d1275344098930da7241716", 0x58) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) r9 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r9, 0x1, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) sendfile(r9, r10, &(0x7f00000004c0)=0x2, 0x9c2a) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0000e67665746800000000180002b8001408223900000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r11, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="340000002800070500"/20, @ANYRES32=r11, @ANYBLOB="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"], 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'lo\x00', r11}) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, r4, 0x705, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r12}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r14, 0x0, 0x0, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r14, 0x65, 0x6, &(0x7f0000000140), 0x4) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r13, @ANYBLOB="010000000000000000000300000004000400"], 0x18}}, 0x0) r15 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/dlm-control\x00', 0x80, 0x0) sendmsg$TIPC_NL_PUBL_GET(r15, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10040080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[]}, 0x1, 0x0, 0x0, 0x8000000}, 0x94) [ 640.676620] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 640.733776] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 640.794315] audit: type=1400 audit(2000000228.230:154): avc: denied { map } for pid=25263 comm="syz-executor.2" path="/proc/25263/task/25276/status" dev="proc" ino=100389 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 [ 640.821506] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 03:37:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="a400000014000100200000000000000002690000", @ANYRES32=0x0], 0xa4}}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, 0x0) 03:37:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x7a000000, 0x0) 03:37:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0060003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:08 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$KDMKTONE(r4, 0x4b30, 0x1f) close(r0) 03:37:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0068003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:08 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r0, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80000, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x400000, 0x0) close(r1) 03:37:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xa0008000, 0x0) [ 641.088682] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.5'. [ 641.116380] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.5'. 03:37:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000640)=""/171) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r1, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000b80)={0x2, &(0x7f0000000b40)=[{}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000200)=[0x0, 0x3f, 0x80000001], 0x0, 0x5, 0x0, 0x8000, 0x0, &(0x7f0000000300)}) r3 = dup(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000240)={0x3, 'nr0\x00', {0x5}, 0x80}) close(r0) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @mcast2, 0xfffffffd}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xf6, 0x5}) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 03:37:08 executing program 2: r0 = socket$inet6(0xa, 0xe, 0xffff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) r2 = fcntl$getown(r0, 0x9) r3 = getpgid(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x2, 0x0) socket$inet6(0xa, 0x6, 0x7f) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0bd7e09dcd11a9ae8953a270425f411b76348da9b42d1ce9b72f2f32a1c8e0c8161abfb310f27fe3b720f7b67fa168d3a54e55f3c538aa8bdcdee2940066577c8d186786255cda3216fe1c3a575b953ce5d86daba580c30dadbedbcdc00a8011611e624ff71446fd314a28feaa5f5a7afd5e7132c7c1059b7445cfe982b179a864c3c1b2bbae10a940bad53b17ba445b460009893925612b37e142c0932ae9fea5f9cd24acf6df5d5c0ca3fcf43495392318dc597c042d0e49cc5785561a7de0d1029c47c5239060bfcd150505ce2ac15b5411641cb5f155ef90370c74d3c8be00423e90dee99a6ee1454d", @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303030b030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0]) ioctl(r4, 0x0, &(0x7f0000000780)="47ca8baecfbe4d684bc70000a3e43324dac2f4a902d7c3129fa281ff3edb4ac020d3404d3c28fea4ffffe44c5d2af969da7c6746ab620600"/73) syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000640)='./file0\x00', 0x2000000e005, 0x1, &(0x7f0000000380)=[{&(0x7f0000000680)="eb3c130105a4874e97bfeb58906d6b66732e6461740002", 0x17, 0x9}], 0x1010802, 0x0) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x4, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0/file0\x00', 0x0) r6 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r6, 0x40345410, &(0x7f0000000100)={{0xfffffffffffffffe}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r6, 0x40505412, &(0x7f0000000180)={0x0, 0x1f3, 0x5, 0x0, 0xd}) removexattr(&(0x7f0000000300)='./file2\x00', &(0x7f0000000800)=ANY=[]) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x24000000, 0x0, 0x642086af446b9594, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x110, r1, 0x8000000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) ptrace$setopts(0x4206, r7, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2676607c}, r7, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, r3) capset(&(0x7f00000002c0)={0x19980330, r2}, &(0x7f0000000580)={0xc, 0xfffffffe, 0x89, 0x5, 0x8, 0xca2c}) perf_event_open(&(0x7f0000000840)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x40, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff00000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext={0x0, 0x87}, 0x5e, 0x0, 0x0, 0x4, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0xa2081, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000540)='threaded\x00', 0x399) mkdirat(r5, &(0x7f00000004c0)='./file1\x00', 0x100000000) creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) fstatfs(r5, &(0x7f0000000400)=""/128) 03:37:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e006c003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:08 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x90c82, 0x0) close(r0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xab4, 0x200) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000280)={0x0, 0x0, @ioapic}) 03:37:08 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xa0010000, 0x0) 03:37:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0074003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)=0x101) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x9) exit_group(0x9) 03:37:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xbf000000, 0x0) 03:37:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x401, 0x20082) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f00000000c0)) connect$pptp(r0, &(0x7f000004d000)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) 03:37:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:09 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) close(r0) 03:37:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e007a003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:09 executing program 2: mlock(&(0x7f0000006000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mlock(&(0x7f0000003000/0x3000)=nil, 0x3000) 03:37:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xc8000000, 0x0) 03:37:09 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f0000000000)={@random="a9248e6e42e2", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x13}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x2, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @empty, @dev, {[@lsrr={0x83, 0x23, 0x0, [@empty, @multicast1, @loopback, @rand_addr, @broadcast, @rand_addr, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @rr={0x7, 0x1b, 0x0, [@loopback, @multicast1, @local, @multicast2, @dev, @multicast2]}]}}}}}}}, 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtiper\x00', 0x0, 0x0) close(r0) 03:37:09 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8000, 0x0) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000080)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xa, 0x3, 0x1, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0), 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00f0003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xf6ffffff, 0x0) 03:37:09 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) 03:37:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r1, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r1, &(0x7f00000002c0)="622cf6baf087a1b7f044a1dbd64651d45856530c2e37038f6b2bf844358d336b4787c5f53f94675da1fa031bb4772dcec148ca7f15868f6e2d00e9cc097d56d471b8aa85fc5334c3786e1580fc38ba8fe79abdb4c446ad", &(0x7f0000000340)="b047d696d38b37a4a49b3ec60204248d829b2a691458bc07649cc9add9f590c95d19f764", 0xa2050e9e11e51b6b}, 0x20) r2 = socket(0x11, 0x800000003, 0x0) socket$isdn_base(0x22, 0x3, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = syz_open_procfs(0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r5, 0x1, 0x0) ioctl$KVM_NMI(r5, 0xae9a) ioctl$FIBMAP(r4, 0x1, 0x0) ioctl$VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f0000000180)={0xfffffffe, 0x1, 0x4, 0x820, 0x6, {}, {0x2, 0x8, 0x2, 0x0, 0x6e, 0x0, "72fd30b6"}, 0x68, 0x4, @planes=&(0x7f0000000100)={0x7fff, 0x4, @mem_offset=0x8, 0x4}, 0x7, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r6, 0xc0505350, &(0x7f0000000200)={{0x1c, 0x7}, {0x1, 0x6}, 0xdb96, 0x4, 0x1}) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) setsockopt$sock_int(r7, 0x1, 0x4, &(0x7f00000003c0)=0x80, 0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001900)=ANY=[@ANYBLOB="380000002400e50d000011000000000000997b98", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100686866000c000200080005000000bcd6bd941c5fab18edbb000012804b1511f9c506c9bdc08386c010b54fcb524d3a45e9a7d130517465ac82661b7a2b2ff934dde31b2906a3db578cbf8138f8636cdab61ad7063148cda84a51f4cc7559a81672790e1e0625b31ad49f89a76c53466eee5f2b3d7937ecd996f7e532fd15a66aee7cfb76e153a681001969c601154071642af50210fcbe4b78da7b8e27ddb3c7ab95c3e74c20dfb75913b0a31af6ed65dc01a0deb00b108ea2862f527d29a19ef66a41ad7d45244ac9d295b218caea02f772dad6620c6f4a04ff9a98ebab15dd479c1875cec4f6eb57a3f2e3df85584154908a713bab3c012fd85526e12f206c0c9124392040a46e45036fd57b8d6c2dd33ec9f71114b3fa04"], 0x38}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 03:37:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0), 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003f00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:09 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fdinfo/3\x00') r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000100)={r1, 0x6, 0x3, "7b55b1d1d21580641d283f677ea871e82e7b411436119e6144c2379f997e30974aa0a10af77399a52cd52c7ad88519e9eeaf845f8a7945dd3eb88fe00481591ae22cfc8d61a33330a9f6ed8696bb41c0601f0945dae4544405b1d3352504654af0ea0dea7e6a1d79ff59f50f375139fbbf3ba38c8b92d89e11abae622d5841cfd289f5bc0b643ed24a76c89f16e30ffc4ad7851c2c80e7a53d8f89502cc3c1c275ee84241db10387af1eadfcc30b9d7e56df356eeb88bf310e01fd94"}) close(0xffffffffffffffff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='nr0\x00', 0x10) 03:37:09 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xfffffff6, 0x0) 03:37:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0), 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000005200050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') setxattr$smack_xattr_label(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 03:37:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1a0ffffffff, 0x0) 03:37:10 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x141100, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r3}}, 0x128) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {r3, 0x0, "727fdc", "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"}}, 0x110) close(r0) 03:37:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x30, r1, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {}, {0x1e6, 0x18, {0x0, @bearer=@l2={'\xb5=\x93\xa8\x82\xdd\xf2\xa8;'}}}}}, 0x30}}, 0x0) socketpair(0xa, 0x2, 0x7f, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x100, 0x70bd2d, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x800) 03:37:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0002003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1000000000000, 0x0) 03:37:10 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x100000, 0x0) close(r0) 03:37:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0003003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:10 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, 0x0, 0x0) shmat(0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) r0 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r0, 0x1, 0x0) write$P9_RMKNOD(r0, &(0x7f0000000000)={0x14, 0x13, 0x1, {0x80, 0x2, 0x6}}, 0x14) unshare(0x0) timer_create(0x7, &(0x7f0000000040)={0x0, 0x25, 0x6, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_getoverrun(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r2, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)=0x9d3da6597bb31128) setns(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') clone(0x34004102, 0x0, 0x0, 0x0, 0x0) 03:37:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6b6b6b00000000, 0x0) 03:37:10 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) [ 643.485931] audit: type=1400 audit(2000000230.910:155): avc: denied { sys_admin } for pid=25460 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 03:37:11 executing program 5: shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000340)=""/204) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x200080, 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x1) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x1) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f00000001c0), 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$kcm(0xa, 0x2, 0x73) fchdir(0xffffffffffffffff) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x8}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r3}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r4, 0x0, 0x0}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x8}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r5}, 0x2c) mount$9p_tcp(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000480)='9p\x00', 0x2000000, &(0x7f00000016c0)=ANY=[@ANYPTR64, @ANYPTR=&(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES16=r2, @ANYRESDEC=r3], @ANYBLOB="36181b04180f1eb1003eec689b1c4134be18a2a71c49db163345532367ded574e888250a0a1ad12aa1ad822b80d3857654fd78dce84d2c70e0d3d07747448aa12f983f8ccada915f72a6dc7dd9d7c4a47f1d92f8ee4b018f5e1a361b637f9bf6caac0623c435fc02abd9f3966a0175ff6d28148d47d659031e32c81f70c28fe52b5cd8853b7754fd740d03b1067eb52d4f200da83532ac0be225c81b2252c0935217e8e2ed01defb37b1a46ef19ee9cb6bcf0bd64d4fa665eede663ce02bb2f972050013e453a55519ee212a3df6e2bf1219e49d0a8306ae5676a503e5d4a165099f8a10daadc7919798d39b6f", @ANYBLOB="a18b94c1d0276294c112a7629dd783ed7540344c46b116b302540e36af28d665ad458dc30a3d4ca3962a27c3b28f4ddc5f5fd8466e677d50518f3fa99c8e1959efdcf5d0c253d5f67a9ac2411265255edf8af1bb22e7eb0f8bd5209bffe72c311083c5", @ANYRESDEC, @ANYBLOB="e53661ca44a3d1eea0cbca9a00c24d87d25aa7b619bf0ff45799f10b13e9ebbffac8d6a8", @ANYRESDEC, @ANYRESDEC=r1, @ANYBLOB="42d507a38f2ca2dc4f9141346c537dae53bcccb6feb17f4f8e26afb7a3a772be204e117ec30a92a823275ade149afc7da7c9f84210", @ANYBLOB="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", @ANYPTR64=&(0x7f0000000540)=ANY=[]], @ANYRESDEC, @ANYBLOB="1edadebe9f53d6e79354663d6b7a9bd104ef9b219f69", @ANYRES64=r5]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) r6 = socket$inet6(0xa, 0x803, 0x3) r7 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r8 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendfile(r7, r8, 0x0, 0x7fffffff) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r7, 0x110, 0x5, &(0x7f0000000200)=[0x4, 0x4], 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 03:37:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0004003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000a0ffffffff, 0x0) 03:37:11 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x10500, 0x0) close(r0) 03:37:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={0x0, 0x2}, 0x28064, 0x2, 0x0, 0x8, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) sendto$isdn(r3, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r7 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r7, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xa5, 0x2, 0x0, 0x10, 0x0, 0x100, 0x0, 0xe733c79e8f17c238, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x8000}, 0x1002, 0x0, 0x2, 0x0, 0xffff, 0x0, 0x8400}, 0x0, 0x9, r7, 0x0) r8 = socket$kcm(0x29, 0x2, 0x0) sendmsg$inet(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="f5", 0x1}], 0x1}, 0x0) sendmsg$kcm(r8, &(0x7f0000003940)={0x0, 0x0, 0x0}, 0x4404000c) sendmsg$kcm(r8, &(0x7f0000007400)={0x0, 0x0, 0x0}, 0x0) pipe2$9p(&(0x7f0000000080), 0x800) rt_sigtimedwait(0x0, 0x0, &(0x7f0000000040), 0x0) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r9, 0x4c80, 0x0) r10 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r10) unshare(0x8040900) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x100010, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vhost-vsock\x00', 0x2, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r11, &(0x7f00000013c0), 0x1e3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_to_bond\x00', 0x0}) setsockopt$inet_mreqn(r11, 0x0, 0x20, &(0x7f0000000100)={@loopback, @multicast2, r12}, 0xc) ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000980)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r13 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r13, 0x80284504, 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000600)=ANY=[]) r14 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 03:37:11 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x159400, 0x0) close(r0) 03:37:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0005003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x100000000000000, 0x0) 03:37:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0006003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 643.890322] bridge0: port 2(bridge_slave_1) entered disabled state [ 643.900221] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:11 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) recvfrom$ax25(r0, &(0x7f0000000280)=""/220, 0xdc, 0x40000220, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U-', 0x8}, 0x16, 0x5) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimEr\x00', 0x0, 0x0) close(r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)={0x0, 0x0}) syz_open_procfs(r2, &(0x7f00000003c0)='net/ip_vs_stats_percpu\x00') getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r5, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r5, 0x890c, &(0x7f0000000440)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e23, @local}, {0x2, 0x4e22, @multicast1}, 0x50, 0x0, 0x0, 0x0, 0x1da8, &(0x7f0000000400)='sit0\x00', 0x0, 0x4, 0x295}) setregid(0x0, r4) lchown(&(0x7f0000000000)='./file0\x00', r3, r4) [ 644.341250] net_ratelimit: 32 callbacks suppressed [ 644.341258] protocol 88fb is buggy, dev hsr_slave_0 [ 644.351461] protocol 88fb is buggy, dev hsr_slave_1 [ 644.356606] protocol 88fb is buggy, dev hsr_slave_0 [ 644.361719] protocol 88fb is buggy, dev hsr_slave_1 [ 644.366861] protocol 88fb is buggy, dev hsr_slave_0 [ 644.372007] protocol 88fb is buggy, dev hsr_slave_1 [ 644.377158] protocol 88fb is buggy, dev hsr_slave_0 [ 644.382279] protocol 88fb is buggy, dev hsr_slave_1 03:37:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x200000000000000, 0x0) 03:37:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0007003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:12 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2400, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNthmer\x00', 0x82, 0x0) close(r1) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), 0x4) 03:37:12 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) sendto$isdn(r3, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x6d, "3f0febf6550ae86e7b7fcd5e7825bb7f8cecb90b0b19dd347093c7893b0003e1b663b0832cac69d0e37c4c0c8ad026146ce8f97fbfdcbfc2a041c06a874d201bce4101d9e5572d5864a4158b6362b09f41bf82903a2ea5ff40b15dc14a17eb20391609dcce5dbd6689e932f820"}, &(0x7f0000000100)=0x75) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r8, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000000)="440f20c0663503000000440f22c0baf80cf30f01bf9e4766efbafc0c66ed2e0f210e0f01c20f41f7660fc775d80f0094d1bbba4100b035ee440f20c066f922350d000000000022c0baa1000f20d86635200000000f22d866ef", 0x59}], 0x1, 0x0, 0x0, 0x0) r10 = shmget(0x1, 0x3000, 0x80, &(0x7f0000ffa000/0x3000)=nil) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x10000, 0x1, 0x2, 0x2000, &(0x7f0000009000/0x2000)=nil}) shmctl$SHM_UNLOCK(r10, 0xc) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}}]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) [ 644.741237] protocol 88fb is buggy, dev hsr_slave_0 [ 644.752643] protocol 88fb is buggy, dev hsr_slave_1 03:37:12 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) r2 = dup2(r1, r1) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) close(r0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x408800) setns(r3, 0xca020000) 03:37:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{}, "018000da7d469c04", "02a839a6c7986edc3f8a6200c88e37de79b97525cedefaa0bded32e7d887ec99", "0000ef00", "00943f4aece800"}, 0x38) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000440), 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2f74b864fabdfd6d9016709aa568a1dd2af7e570c81431e0fe705be1de9535af1e1520ec38fce0389a39beff538dfb438a3c93448cad104f9d66117e97aff934914e356c48414e3df401e01bd42f65e63bae1243fbd819eb3c0d4401e2d9a6d4c24f442d625e0cbbea614d2085696d3946370c4ecd2318b5b6e4ea8d18e8a9843641268a71cb4feb04dccd83672a7351545702bbbf3151d1fc2e68cfc8e4393d7d43d0dfe9fd96feb636ae44f501db5b0f651c2ea16a3b08888e63f5d43c24ef0", 0xc9, 0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000004c0)="8c93b369b4485a9c10410940b32f0e27d945c8c14b33d632252983591bb93b689d6e39110602c2742c532b470d9fa7322ac1690e5df60e8062db873b9560fc588ed49aba2b2527da322e73b77d95bb0444859638", 0x54}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x28, r4, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {}, {0xc, 0x18, {0x0, @bearer=@l2={'eth'}}}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x200, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000054}, 0x1) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:37:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x300000000000000, 0x0) 03:37:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000a003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400000000000000, 0x0) 03:37:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000e003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:12 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x500000000000000, 0x0) 03:37:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@ipv6_getrule={0x1c, 0x22, 0x20, 0x70bd2c, 0x25dfdbfd, {0xa, 0xe9f1a3fca5f5f06d, 0x20, 0x3f, 0x2, 0x0, 0x0, 0x5, 0x9603ceaa094572a}, ["", ""]}, 0x1c}}, 0x0) 03:37:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000f003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:13 executing program 4: syz_open_dev$char_usb(0xc, 0xb4, 0x1f) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) 03:37:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0048003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x600000000000000, 0x0) 03:37:13 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000001180)={@local, @broadcast, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}, @dev, {[@ra={0x94, 0x6, 0xfffffffe}]}}, @igmp={0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}}, 0x0) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) sendto$isdn(r3, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket(0x1000000010, 0x80002, 0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getuid() syz_mount_image$erofs(&(0x7f0000000180)='erofs\x00', &(0x7f00000001c0)='\x00', 0x9cdf, 0x7, &(0x7f0000000680)=[{&(0x7f00000011c0)="cdff1642b49944f3cf09ae773f210757d4f5c0bb16034cba9fbbc0a7f11eef252cacd50bab4fd3d42c2dd03304b3fecbb810b0da92d015df9d9d8729d461e5c157504d746478e7d395d1be7cc51c10e9b290e01706fb67d3316c4413cf41fbd9847d57f628e00c55a6ea762c7439f47056601e008af416c9d6d982a11eb87e25566b8854fbbac649fd7c2ae88025eac7ba92b3ee3202ba7ebe591ff5647d8ee63e7055810d5505ff7a059b916c3e7f84db3823e18086e6332cf24b0e844994fff2426a71014aaade4152f5d9082ed4626c453f67eaca990e2e6dfe83fc738826570c116c654723e0b7f093871d4f6baf492539fdd15c0d6073c9ee87504a0c42d662e827b1819b71f60dd00a47a556e458d57b4ba74eca57d41d14d4eb309754fd05905ba574ca713c87dcaaf5122e2e9f3aaece9fe4e48b881f06af35c8a28527806b53d3b4120eeff88885b2152582f85e81501a44d8a6e3eb82bc78105f4d73d93f2aee7d1b84b678ee88e04d13d811ce57a8361075499b787e6493d648b9889f39dc31ab5a63b7a909bc84faec4f2fc48b814b21d206a5797db914946ee8a1b51f7291a50bf669e6b47965a74503bfce051617e699235fbe76ed5366297823f0b8d1ca90af4c03a9326cdca0b0ff3506143de9ed94753114aec88e241545bce09acd9772bfd74d56bd6c084cf5a73646cb68e93cb4d6fb5e5ba442ef8f26f62e7fbb09b07057955694a0479dfd04eb3cf129ee3a21dbf6fa174f5c3bebbef0096c325b06ea2f240f9ff40b80532dded4a2531be586d94e83f5cc0105b0120f904f23674dcca52345776b734043623dc1d2ac71eab30e710f9d9f23e527f3810ea035e95e38a8af9162c1de7f6833433495562d3b38ba3f761fe0a7cf733f84e6d902f80ae4a1776bab821891a201ca387accad478af8003ed3dd1d6abb44a07c38f0f933f467d864f543d6257e217882cc266df9783c62adfa83ba6081ca8016c42df7233b3f0dd5eaeb2647d77fd941f042c6e0598625854b51255ac6076abd5b0ff8af3692f15bfd2fee78eccfd76fceccd052f07d316c4b22e9963333188cc8d8bdee3c2fdb96efc7e3c1736a5e190fff42f0e39d4ae06418e9db9cef4655adf2739819622debd4207e319e58042f7056fcf415199d23929c6793a7aa3af040079a3ec53ecae20a131b6cb4f937488d217f74ae406f12cdc8b680831ac426e9842e0d5caa1b411ae4447aca80c8fd5a4883b3b60cc5c4664ef175d46638d48f3bcaf8ac74421c2115f3d5fd127933b579e6dd956dc07d1be04bba17c981358b4d81bf5579f089c385f343ecb3a221cc5234d2dad7525a206d543572f2fab7acbba3897d2eb45135dad1cd399298d8bffb3e6c6cd6b78b3a7dc16e01601f131d21ed214410302e41cf4b12aaf5ccf63ea630cab6dc0c6f1512c45d608d85f6e26071db485964e5e5b0ca2f99f3021ea3dfbe57119bed5283422e0c3a965b16eada8ff13de6477c4d40b99adad2f55a9297e0080e4a77dcb4624493765a389ffd07c8bccc626f5a8f9ae95d3bdef0065829444f14c19d25864c02aa93ab27b60497d1f0cb449603b21465b3846e56b64fd8be4fe852a4339077203039ba89342fb54f6ee3da1b65b971ce44a3b33adb27aa2051d1fbf838e8221aa3e70ca3c9561cc7b382b9b238e98f218e1d558b53e2fd3835cec6898e29e76b1b366ec24357b6b16c7a8a69b51bfeedbc69b626900edaf7dc44bca5d432dca9440cbe7972dab705230de342630e520f636fcb9999dfcb697719444f030c5f3a06574a7104e638da25328e4001b3eb37427ed910521c4f59ea18ab075f689f114bfa1a09c74b9a02fa961f71d73da98a068c13d74b58b1bbe978626c92cd739a7fa2458f50698a46179bffa6740ca3db30634eca076bcd59b93afdcfba7c78311c91536ab9de1618807ef0588ded6a0e7515f1c437b54688b48d1625fa1c9cef02a3cbc404a9c370d7b2153e78530ea8be883eeaf98b2caa648780fdae01200576eedea47ae3c2e9e68f9cdd034b048fcf9c1f5530ead69175f4f1cc8000a00fa5a9e27c74d8110a94dfea07a4736d61359bfe6b1d8bdb6a6779404ecf030d74c223a28ab6cbd9d2a45086d9c6ea25b2a75786f12febc1949b90ce615d44590d272df00125e7618abef10acd138900a227baf96b3e571b0ab4fc85e8606e0721aa347991bc0ec0d9d618cdfd3c393a6d4bde92f2c9c28a066fd14eaaab55ff188b67ac26f56d45d2fffaa891ae62198644746e3bcef79a55fcf3a76fbb86d1003bbee944ac67dda9a2139ee2b56b46a8cb0f93710e989d6d2a1c6b42dbcf1c77480c7007af114538c59bd593723ad636cad49925579b89cb7f2229f2f2db98a21e18c1dde80154e876c7f6db8d48ea7e4054dfe4fda42711fea72dc164504daf227ac4d55ac8bbc65db98af57e94665394130098cc4c9761f2e7831d981b939e9bf025339bd2db494e4295a50741d25217755d7db260eb2aa49f49bec1e905c89ab4fa4f474cb275175443064bec66e82a7cb844e4231f9659857b98f6faf41bd8957d3dc3f50988843e663a045f5cc48b605b099f97059c1d93bea12f19e37e7a095804cd80c8ad135313b1b8fe65628756004506c0d6bdec4449ab9e0d9c1fdd8fe6732206d2bf878b34a822a6bd137e14ce3b61fcc0c8c14e1afd4b547d92a2e6195abda89b9804498d4380855a22045be4bc5f60cc2eb028086760e6d555d80f64e98ee2e2a1677fc89dfe95b6c8066ce3c849b55a0d237496b157067a070f94bf98c314bca890eeffbaafcf5ec3c5143ffb8ba050705473de85121b8469f65fd804428fbd6f130825fc71a7c35227d9da1fbfc87d40d0ce4043a728464941f51ad8607549d2ba417d4c09c679d465b9092b3a1ddd28690920c307ebfc0b910cf92d1cf52db475438c1f0b645c29b7d7019ac89e5f7101c58d363e12d31ee72deb11d4786aa9eda46c858b55cc8ad600fa87f08f15643de2b471f6120b8c907757262c674b95aff6115d349eafc3dad6fa25cb3e1187bc0c73951729c86848f7a58b4922d597e18e4b573785c2c87035d9e21d48ae0b6952f439997f9ee58ab082d929a533cc2958b9b6c9796c1ac9464b32e12937de950eee8324cf95f287efb18f30275efc20c1564b1d9eae4517a206ce316082e7c4fb31db8acb46a7cf361bee0cd1d8160c290651c0e8524f3d8f852f9fcc5b3c913dfb17d80a4ae26be8b6c32013b1f407c7a9cd8b92a6869e21d9177c88874779e702e29c57769c4f298e64f4f6e43ae2f4ff9f586e3e911f91a5c57ab357209bf961253b9f03f819dc0b9c6da4e7adb4966b95771064eb9445ab9e71c0a20e4936622e6e901e663fd05041d3a3042db881e9ff5e5cfa350948bc3b494cfda41a2a8f085829b988595713be1ad4c696c6234777f473ee53c8a30045224fbef22b9f2f7b711a043cd2c83aa663e5f5c25e7d04ad37fee2253b8bf6889a00621f10720458c3659949a9b0ba6e39b4e9bf69c9b6112ae2e31306552b138bf1ef204b3abfa2a09b30512b31fdc476cdf98630523fb161e4ee4a02b4f27b4fd9ff893e14906738963d2a5ea2791411816dc2bb59dbfaad8ed2504f4eb000787b21d4689e7801d3059ab61b5eba9d2b3930173679a1b1b1fb1b3bb08e241a04446638aec07911bbdcd735f1f796e75537226b29c0f6d2ccfef12ad1f4fcca64eae4b87cf5da12bdbd5aa6e1af1d0b13bb925d50c7836cf5e865831f49fc8b5fb0cb6e37d944f0eb5b678c420276d831770072e8a64a9a6db45271605af1dc5c7a46c85b5359858ac792d580b4b5d4bd8cf9ac969724bbd13da5da3dcc502a36794933a512effabf438b729d93b122efe695111622d038f673297420a4d585ac4b3ba5cbdd5ece3af24a2c0bace074356088d0ae9791f7276364a08604141a0c25d863d9248bd931ffc978fb858d1c2082a529e1f8ca5ae1a4b10771aad55b3d496002d0aadcffc942805a4001dde027d7784296bfea969f824bb259212cebfead20f51367552b7df7a2eb71cb7d31ebdd5b7262b5123afa0d2c15c5762636b4b074b3a824d8cedc16e15c1288b71cde15dfec7f26c266a56444f8c7bbc69a949b030c4452a920c46b84b5adaeadf08144ebad6236799c5f2aec871ee7c7f08c89979c6c49cb853a70ac6c4e6bf65f804427fa5ec6e8d096eeb3271b2c522794609b42e3f9c6934cefa3e5ab8e0e23ce3aa602b48e124d57ba7895ba59cffb6fec8baf3ca52a2861b0fb82cb3463ef5972e101c812555342294513d00bf202c4f453b36fde1202122b9f3669c1ab780001e836e0ded1c3d813250503f10d281c82a2b59be5508dc07aee5bb82b180e0f2608cacc87bb07e2ad5687af6b1469d116f7c37d55618b31cfd376e456e5a3b9f73451485319b7106b42a59f6446cc0aeb669986f31c4ad037378ab73f8a38b82273300c831e855daf6630abc388309700e9488af828966c401a5f578158f2d4c5b23a85e6045a1bdfa63444d2c8b135e77c996edc483479375fdd7eb5cf1c28aef4c15d621b98842c9a7e604a355b4965fca4ef39d9a68df09494d6393766e327beeb0a6766bb7cb273c32ea7196ed499a9dedcf97ffda8bf47ba9830320172705f7356864098ddb4215bddbd10bf69a03a3d552298df1ad4fec6c785e0af8ebda1ea4b949ae440b706dd02b9ebe1f14a358d49d0d991066385c299b513fc0eb194b8d86b1e4601e9ef0eff8db1c55a4bccd4a82a55f6f92cda61348fe04aca5ae6a65a0f4c89ee95705a7bf870f1c8925a0d75d42c4ab6d9e43d2a2c80674eb0144892514dfdef813fa9358c9ac781182544dae983e8c8dd09a73188a4af080f427f08748ec719b7f27381836d56a0f5bac6a2db128252beca1800c103b48f905adf4e80164241a54c2554a5eb83cd9c629ce53630f8ae6588ad061867147029517bcbb29f7e0ad1e95b4f9dd3cc01e633033eb3872a2700682071db989ab2bf460c145696de27954666a26021be8a0a0ccbbc210b7a098a206fc7d31c9103919b99033df22ececdfc19f31aac7510290084e31228e6d3e39cb16b11ddba1c984ce91b5b1d304c7ff9401c68b083e99961d05d029480f7fc6cba42627d0b383c4c94e6fd7d971f3f3faa6d2692a43f1d0e56846d125fb58ecbda1b267071f3b0c83beb4797045edcdfe72e37559de9f166b02ee2de0d78dddcf7d54d9baaee89e3f1cb96f065961f65b91246f175c600d3bfd56900bf97ec2ed6c96726264dd4460319bc9222ed9463697d478d0ea0f62ae1d26bcbe67a79300464dedda3a640cd6f2004bc8da8159534708e48ff145a71db74f3490bbf253140dca78fa891b421b8e9430da30ace35acf23a8dce822f59b5e85c8b10158772c41b717d496d7ecb6a2ed8ba8fa6a30881bafc2e66f600368bd3dde3801e6261d2522b808f9cce150aeb4acea59947a7cb59857fb153c57629e39a59c6ef933a91714e6923f3490cb7579d9b7134185849785322e7ab7379a1b67edc986c1d0607304dd62161e0085aeb1e515216bb6bce94060862bb283d110bc5d89e68e39e789d4234644e7ea93e1c4d29e0f767ebdc858613f6f5ba5d8b1c218cea9270809a49f390bcd0ada62dcf22f3ee550846a9cf3a59eeb8a7e2bbd7450749fcd1d28e96fdaedcbfb43fbd322069ba68b9236591ffa65ebbcb84a858a4ed846bb2bcc7bd143e510f56da795002ba62c2b198b2c34afd2f9d4c7ac394fcc56061d5e6366df5ee", 0x1000, 0x3}, {&(0x7f0000000240)="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", 0xff}, {&(0x7f0000000340)="7efa048f138abde11401e51847e66611a547a99c8bb33e3cb55cec797d8b63c19de22024fa0123f0f4877d1b1383489b58ffcf88369888bb96cb167fc3dbad5a5233c1a261cb4fbae70a898f08cefb144e6edb7972f96a43a193f3be4804d6421c4cfb", 0x63, 0x6f}, {&(0x7f00000003c0)="0dc83b8a24a36c5fb5606c50363ab99e6cdd7ec75d5f2314ea7231f6f4c6f0e5b858f295094a71b9670b67a6a5dc22023935ad9b8261e93dbeabe405c3653225c930da4b3c97fdf9afe138ef49ec349864e9ef7668d8a26775dd93ee93dc0db149c4535644fa50ea17766482bbc9f1244984213680c7239f4e462ad871ca339cf4246bb5c29e6b5ab1f70fe5d3d73f175a959a579d72d929f2e69f26d8876f1a84c752d6612cd7c3445247f0017dbc4ed26a4cf8104ba56567105b97e0a2e1582c395220d6db332f7bd57b", 0xcb, 0x3f}, {&(0x7f00000004c0)="e5552e6cd4b05b1cb75b2b78", 0xc, 0x4}, {&(0x7f0000000500)="207f6f7385b986d83ff1b695651b44b9c1498daa0aa271fbe8ed991270642dec8b24a2af0f52b6b17bd3cc79abb11b25e32e87b42ac4ab305fa0d3f625ba7d9194afbcfdb16f6d484c1bb135e427163e", 0x50, 0x1ff}, {&(0x7f0000000580)="57c255cb3067876284cb28c4af7010988e012afc28ff7e485b14cea504", 0x1d, 0x7f}], 0x200000, &(0x7f00000007c0)={[{@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x3ff}}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@acl='acl'}, {@user_xattr='user_xattr'}, {@nouser_xattr='nouser_xattr'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}], [{@dont_measure='dont_measure'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, 'ib\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@measure='measure'}, {@subj_user={'subj_user'}}, {@euid_gt={'euid>', r9}}, {@fowner_eq={'fowner', 0x3d, r10}}]}) r11 = socket$kcm(0x10, 0x2, 0x10) r12 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r12, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x4109}, {0x4c, 0x18, {0x60, @media='ib\x00'}}}}, 0x68}}, 0x0) fcntl$dupfd(r8, 0x0, r7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20, 0xffffffff, @ipv4={[], [], @multicast1}, 0x10001}}, 0x10001, 0x0, 0xfffffff8, 0x3, 0x20, 0x80000000, 0x81}, &(0x7f00000000c0)=0x9c) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r13, &(0x7f0000000140)=0x4) 03:37:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:13 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl(r4, 0x1000008912, &(0x7f0000000080)="0805938efd370f19d9f70f913700004fe8474006") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.upper\x00') r8 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r8, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) 03:37:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e004c003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x700000000000000, 0x0) 03:37:13 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) io_setup(0x3, &(0x7f00000000c0)=0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x150}]) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) io_getevents(r1, 0x1000, 0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000100)={r3, r4+30000000}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x3b) close(r0) 03:37:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:13 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x800000000000000, 0x0) 03:37:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0060003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:13 executing program 4: close(0xffffffffffffffff) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x2) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/49, &(0x7f0000000080)=0x31) 03:37:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0068003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:14 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) r2 = dup2(r1, r1) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) close(r0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8, 0x408800) setns(r3, 0xca020000) 03:37:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xa00000000000000, 0x0) 03:37:14 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000040)=""/96) 03:37:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e006c003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, 0xffffffffffffffff) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r2, &(0x7f0000000000)={r6, r5}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) ioctl$FIBMAP(r9, 0x1, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000000c0)={0x390000, 0x8, 0xfffffffa, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9b0add, 0x0, [], @p_u16=&(0x7f0000000000)=0xffff}}) r11 = ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x400000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r12 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = dup3(r12, r13, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f8", 0x4}], 0x1}}], 0x1, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x231) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r11, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef) ioctl$KVM_NMI(r11, 0xae9a) ioctl$KVM_RUN(r11, 0xae80, 0x0) 03:37:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:14 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f00000001c0)) ioctl$IMADDTIMER(r4, 0x80044940, &(0x7f0000000180)=0x32) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r8, 0x0, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r8, 0xc058565d, &(0x7f0000000000)={0x35bd8e9c, 0x1, 0x4, 0x8, 0x1f, {0x77359400}, {0x1, 0x5, 0x3, 0x3, 0x7f, 0x2, "521f53c7"}, 0x401, 0x1, @offset=0x3f, 0xfffeffff, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r9, 0x80dc5521, &(0x7f0000000080)=""/221) 03:37:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xf00000000000000, 0x0) 03:37:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0074003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2100000000000000, 0x0) 03:37:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e007a003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:14 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x280, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r10, 0x0, r9) r11 = epoll_create1(0x0) r12 = socket$inet_udp(0x2, 0x2, 0x0) r13 = socket(0x1000000010, 0x80002, 0x0) r14 = fcntl$dupfd(r13, 0x0, r12) r15 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r15, 0x1, r14, &(0x7f000086fff4)) r16 = getpid() r17 = gettid() kcmp$KCMP_EPOLL_TFD(r16, r17, 0x7, r11, &(0x7f0000000000)={r15, r14}) sendto$isdn(r14, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r18 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/sel\x83\x009\x00', 0x801, 0x0) sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x9000003}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r8, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r10}, {0x8, 0x1, r14}, {0x8, 0x1, r18}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4052}, 0x4000) close(r0) 03:37:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, 0x0, 0x0) 03:37:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00f0003500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:14 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x3f00000000000000, 0x0) 03:37:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) getpid() write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000000), 0x4) accept$netrom(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x80, 0x0) getsockopt$nfc_llcp(r4, 0x118, 0x0, 0x0, 0x9) clock_adjtime(0x0, 0x0) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:37:14 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) [ 647.468259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25710 comm=syz-executor.4 03:37:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, 0x0, 0x0) 03:37:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000033500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4800000000000000, 0x0) [ 647.569462] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25715 comm=syz-executor.4 03:37:15 executing program 4: write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x5, 0x9, 0x97a, 0x100000001, 0x2, 0x23a, 0x1f, 0x1, 0x1}}, 0x43) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) 03:37:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, 0x0, 0x0) 03:37:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000053500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:15 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 03:37:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4c00000000000000, 0x0) 03:37:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) 03:37:15 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) r8 = gettid() r9 = epoll_create1(0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x80002, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) r13 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r12, &(0x7f000086fff4)) r14 = getpid() r15 = gettid() kcmp$KCMP_EPOLL_TFD(r14, r15, 0x7, r9, &(0x7f0000000000)={r13, r12}) sendto$isdn(r12, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r16 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r16, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) kcmp(r7, r8, 0x0, r12, r16) syz_init_net_socket$llc(0x1a, 0x3, 0x0) close(r0) 03:37:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) 03:37:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000063500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:15 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r1) 03:37:15 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6400000000000000, 0x0) 03:37:15 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 03:37:15 executing program 2: openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="20000000000000000000000000000000000000000189ee6879d2bd7b3673fb073845f2e7bbdd964cb7189bb86bdd8b72e1a58a89700804f266ffb63eddefd147a8674062fbb6818700302c5cc74b7fb2888e9af17cff6affff99fef160d8db4932503f2b47d4e7d4b7e02da40aa46e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 03:37:15 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000300), 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x7) 03:37:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6800000000000000, 0x0) 03:37:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0049063500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4), 0x0) [ 648.568395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25779 comm=syz-executor.2 03:37:16 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 03:37:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 03:37:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x6c00000000000000, 0x0) 03:37:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000073500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:16 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r2, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080)=r2, 0x4) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') close(0xffffffffffffffff) 03:37:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 03:37:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x7400000000000000, 0x0) [ 649.299206] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25783 comm=syz-executor.2 03:37:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x39, &(0x7f00000001c0)=ANY=[@ANYBLOB="0002040000000000ff020000000000000000000000000001883bd2c4241abfced696d1aee1a0bfbef217bdb04a1665e75167b7a697f7d77f23c2686d2a133bc36f41bfaf0b598147c512bbc151e64f488471b045db3bd14c33cb3e05000000d93b9462e1e2e4f2b75e4b15043094ff7d4080f9fe82553f06d200000000a8090000000000000063fbd77acace27139316e3d3168d8d728c525a11446f99429ba6b9d374e443b155e6c430c4947b89a8ceceb7d09bee03b2468971fe86c31bd9225a94d67e687766af741beb463db6f8b285e5edf0079d1e4343392a444a17d62f5851329ef1ca93750a818bce6ee2ddd87305c33b4b95726bb04d587fd3b8bdd685418112173a866b4643b2f23223ddd482c930722b660f95c6701f950105e7ad2ec2dc68b4145b5c8d4daa75b1e4cc8726467e1c1d207a262ff50bc325092fda4ec96d1789c30d6da56b9c13f5301629d9417142087c586216e774fad71631b7515e15e1a56d18be610eb70ed88e09ad4b2b4ad70ec17f17ab7828a4e8f54c22fa7c3717329a57bd9ff7c91b6a9a82bae58e2339f341eb66777f6a48cbc1ad824dc46277cc5a296ebe37b7749833b4a45963e75b4e0f90923460ee40ecb054ec58eb9223bb40abbb928a5a1d572a2c9a8cd345632522104dd57d9160258023ee1871dc36eb85f1f2dd30d9b65e037cbde641463a0000000000000000000000000000000094aa70a19cd584def90a285fa4bfd788f89010a136d1e56a4d97c1cba324b5b399fd6b23fbdd2bc73d2b0c91f3b63d2851606adfdab9646cea113465f5063daab2857c6ebedbb956bf40588397c16daf90e3ce0b0bd44142a94b4600c842c93bec98610bc59e89e7ed2ae292458213a60a9e20bd2c7abf92ae22083a669be9540e64d9dde2145b14175f45f0c6f6c76e7bee4cbd63dddf0d878fb927a2fbaa0aaac69ef8c66fc036b328afbe239c8c188a6968820d6c"], 0x18) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) 03:37:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000a3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) 03:37:16 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 03:37:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x7a00000000000000, 0x0) 03:37:16 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x528900, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r1, r1}, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={'michael_mic-generic\x00'}}) keyctl$invalidate(0x15, r1) close(r0) 03:37:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000e3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:16 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xbf00000000000000, 0x0) 03:37:17 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) sched_setparam(r5, &(0x7f0000000040)=0x4) r7 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fb0\x00', 0xc1800, 0x0) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x280, 0x0) r9 = epoll_create1(0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x80002, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) r13 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r12, &(0x7f000086fff4)) r14 = getpid() r15 = gettid() kcmp$KCMP_EPOLL_TFD(r14, r15, 0x7, r9, &(0x7f0000000000)={r13, r12}) r16 = socket$inet_udp(0x2, 0x2, 0x0) r17 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r17, 0x0, r16) ppoll(&(0x7f0000000100)=[{r2, 0x10}, {r7, 0x1305}, {r8, 0x1}, {r9}, {0xffffffffffffffff, 0x1000}, {r2, 0x4}, {r0, 0xa010}, {r17, 0x11100}, {r1, 0x1}], 0x9, &(0x7f0000000180), &(0x7f00000001c0)={0xe86a}, 0x8) r18 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r18) 03:37:17 executing program 1 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000f3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 649.744892] FAULT_INJECTION: forcing a failure. [ 649.744892] name failslab, interval 1, probability 0, space 0, times 0 [ 649.771469] CPU: 0 PID: 25853 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0 [ 649.779940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.789314] Call Trace: [ 649.791950] dump_stack+0x197/0x210 [ 649.795613] should_fail.cold+0xa/0x1b [ 649.799534] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 649.804663] ? lock_downgrade+0x880/0x880 [ 649.808851] __should_failslab+0x121/0x190 [ 649.813226] should_failslab+0x9/0x14 [ 649.817047] __kmalloc_track_caller+0x2de/0x750 [ 649.821743] ? __local_bh_enable_ip+0x15a/0x270 [ 649.826472] ? lock_sock_nested+0xe2/0x120 [ 649.830725] ? __local_bh_enable_ip+0x15a/0x270 [ 649.835415] ? lockdep_hardirqs_on+0x415/0x5d0 [ 649.840008] ? lock_sock_nested+0x9a/0x120 [ 649.844257] ? __sctp_setsockopt_connectx+0x45/0x1a0 [ 649.849399] memdup_user+0x26/0xb0 [ 649.852961] __sctp_setsockopt_connectx+0x45/0x1a0 [ 649.857911] ? lock_sock_nested+0xe2/0x120 [ 649.862169] sctp_setsockopt+0x2be9/0x4f70 [ 649.866944] ? sctp_setsockopt_paddr_thresholds+0x420/0x420 [ 649.872757] ? sock_has_perm+0x209/0x2a0 [ 649.876851] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 649.882606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.888160] ? selinux_netlbl_socket_setsockopt+0xb5/0x3f0 [ 649.893795] ? selinux_netlbl_sock_rcv_skb+0x480/0x480 [ 649.893858] ? kasan_check_write+0x14/0x20 [ 649.893879] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 649.908244] sock_common_setsockopt+0x94/0xd0 [ 649.912781] __sys_setsockopt+0x17a/0x280 [ 649.912798] ? kernel_accept+0x310/0x310 [ 649.912821] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 649.925783] ? do_syscall_64+0x26/0x620 [ 649.929774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.935153] ? do_syscall_64+0x26/0x620 [ 649.939152] __x64_sys_setsockopt+0xbe/0x150 [ 649.943582] do_syscall_64+0xfd/0x620 [ 649.947400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.952597] RIP: 0033:0x45a919 [ 649.955799] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.974715] RSP: 002b:00007fa1c910ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 649.982445] RAX: ffffffffffffffda RBX: 00007fa1c910ec90 RCX: 000000000045a919 [ 649.989731] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 649.997020] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 650.004306] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fa1c910f6d4 [ 650.011587] R13: 00000000004d2ca8 R14: 00000000004e2dd0 R15: 0000000000000005 03:37:17 executing program 2: prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r0, r0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) dup2(r1, r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x20, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @sco={0x1f, {0xb2, 0x0, 0x5, 0x81}}, @rc={0x1f, {0x0, 0x8, 0x8, 0x0, 0x0, 0x3}}, @l2={0x1f, 0xeb4, {0x3, 0x0, 0x0, 0x0, 0xce, 0xff}}, 0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)='caif0\x00', 0x80, 0xfffffffffffffffb, 0x4}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001300)=[{{0x0, 0x0, 0x0}}], 0x2cb, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) r3 = socket$kcm(0x2, 0x3, 0x2) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000b00)=0xc) syz_mount_image$ntfs(&(0x7f0000000340)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8b, 0x0, 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r4, @ANYBLOB="7f1d83f61104198446e52dd3e36ba96be2c4e61dae6949f8d11aedc2e4b482f487a36f6097e7f57f0380820ccdba661acb4bcf7b60d76146de15003af1b1f0501b31d93559b006c768735ba94033ae03bac2fed24ab52c2154512700"/106]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r5, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="100006000000000020000000000000"], 0x5, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000840)={0xa0, 0x0, 0x3, {{0x3, 0x0, 0x3, 0x2, 0x1df, 0x3, {0x5, 0x2, 0x7fff, 0x3, 0x100000000, 0x4, 0x53, 0x0, 0x80, 0x2, 0x5, r4, r5, 0x2, 0x9}}, {0x0, 0x14}}}, 0xa0) pipe2$9p(&(0x7f00000004c0), 0x84800) socket(0x10, 0x80002, 0xc) personality(0x400000a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) syz_open_dev$amidi(0x0, 0x0, 0xb4b188f0c4cc821f) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x400000000000119, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:37:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xc800000000000000, 0x0) 03:37:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000203500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:17 executing program 1 (fault-call:4 fault-nth:1): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:37:17 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x100, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'ip6_vti0\x00', 0x9}) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x840, 0x0) close(r1) syz_open_dev$ptys(0xc, 0x3, 0x0) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = add_key(&(0x7f0000000440)='.dead\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000300)='rxrpc\x00', 0x0, 0x0, r3) r4 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000380)={'\x00\x00e', 0x3}, &(0x7f0000000580)="054744f8fb6fa42c35f87951dc3be6af3aa926074dc2af453380815daa4c1450760c083942d7e5b0cbca7a1e21d9a5349269bd8a8a532556fc3f9b1d31f21fded76da1ab3aa6d65c01384c5e63b8e7f439fe6af3fa4e63dd28665629bcfa06a16ebf0231de725e66e4d5de637d3ed6a6b065690d79f78667d4f4b71db1d15130736bda5c67ad7ad45fba01561c58542457c7a3ec93bf76ae417bae421da9044b945c5d1d448cbbf013f15620072cd5a6965807d10e5adf18cca148e794573b09102707d75ecbac2b7c92d4630008f51455618f7a09b879828e0ea40066694c2c8b549809e058b215bfe954", 0xfffffffffffffe74, r3) keyctl$get_persistent(0x16, r2, r4) r5 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000680)="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", 0x1000, r4) stat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = add_key(&(0x7f0000000440)='.dead\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000300)='rxrpc\x00', 0x0, 0x0, r7) r8 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000580)="054744f8fb6fa42c35f87951dc3be6af3aa926074dc2af453380815daa4c1450760c083942d7e5b0cbca7a1e21d9a5349269bd8a8a532556fc3f9b1d31f21fded76da1ab3aa6d65c01384c5e63b8e7f439fe6af3fa4e63dd28665629bcfa06a16ebf0231de725e66e4d5de637d3ed6a6b065690d79f78667d4f4b71db1d15130736bda5c67ad7ad45fba01561c58542457c7a3ec93bf76ae417bae421da9044b945c5d1d448cbbf013f15620072cd5a6965807d10e5adf18cca148e794573b091027776be4b8493a2a88d4630008f51455618f7a09b879828e0ea40066694c2c8b549809e058b215bfe954", 0xeb, r7) keyctl$get_persistent(0x16, r6, r8) keyctl$search(0xa, r5, &(0x7f0000000580)='trusted\x00', &(0x7f00000005c0)={'syz', 0x3}, r8) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x400, 0x0) timer_create(0x5, &(0x7f0000000140)={0x0, 0x18, 0x5, @thr={&(0x7f00000000c0)="dd9ba9e9ce36fc9bd7f60b1f898a1aae271e3e7ee618ed89d25a401a096404efd11fdcb22b697e51b121a8faac5f4b42f511c9eb8e4761bf16", &(0x7f0000000100)="4c8e03"}}, &(0x7f0000000180)) r9 = epoll_create1(0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x80002, 0x0) r12 = add_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="f73f981b652968cc6fce44bf7940847c5f44b1c456e33c7b2d02faf3d226edcfcb173ca0e5c15d9bbcc0a7de01554844e5295651fafa36f42bcabcb92b2451bcfd9439a7263649fd07c582f11be64fb9c4b662aef17f2602a8e3347de6d54516", 0x60, 0xfffffffffffffff8) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r14) setfsuid(r14) statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x200, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r12, r14, r15) r16 = fcntl$dupfd(r11, 0x0, r10) r17 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r17, 0x1, r16, &(0x7f000086fff4)) r18 = getpid() r19 = gettid() kcmp$KCMP_EPOLL_TFD(r18, r19, 0x7, r9, &(0x7f0000000000)={r17, r16}) sendto$isdn(r16, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) mq_timedreceive(r16, &(0x7f0000001680)=""/148, 0xffffffffffffffb8, 0x100000101, 0x0) [ 650.322313] FAULT_INJECTION: forcing a failure. [ 650.322313] name failslab, interval 1, probability 0, space 0, times 0 [ 650.334062] CPU: 1 PID: 25875 Comm: syz-executor.1 Not tainted 4.19.91-syzkaller #0 [ 650.341876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.351243] Call Trace: [ 650.353870] dump_stack+0x197/0x210 [ 650.357614] should_fail.cold+0xa/0x1b [ 650.361534] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 650.366657] ? perf_trace_lock+0x510/0x510 [ 650.370920] ? mark_held_locks+0xb1/0x100 [ 650.375098] __should_failslab+0x121/0x190 [ 650.379345] should_failslab+0x9/0x14 [ 650.383149] kmem_cache_alloc+0x47/0x700 [ 650.383201] ? kasan_check_write+0x14/0x20 [ 650.383219] ? do_raw_spin_lock+0xc8/0x240 [ 650.395756] sctp_get_port_local+0x478/0x1310 [ 650.400283] ? sctp_unhash+0x10/0x10 [ 650.404016] ? kasan_check_read+0x11/0x20 [ 650.408187] ? sctp_bind_addr_match+0x1e3/0x2d0 [ 650.412882] ? sctp_inet6_bind_verify+0xa8/0x4f0 [ 650.417664] sctp_do_bind+0x20f/0x5c0 [ 650.421595] sctp_autobind+0x168/0x1e0 [ 650.425502] ? debug_smp_processor_id+0x1c/0x20 [ 650.430193] ? sctp_do_bind+0x5c0/0x5c0 [ 650.434182] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 650.439395] ? __ipv6_addr_type+0x219/0x32d [ 650.443741] ? sctp_endpoint_is_peeled_off+0xf2/0x130 [ 650.448942] __sctp_connect+0x780/0xcd0 [ 650.448974] ? sctp_clear_owner_w+0x120/0x120 [ 650.448994] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 650.449014] ? selinux_sctp_bind_connect+0x13b/0x2d0 [ 650.468350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 650.473905] ? security_sctp_bind_connect+0x93/0xc0 [ 650.478948] __sctp_setsockopt_connectx+0x133/0x1a0 [ 650.483988] sctp_setsockopt+0x2be9/0x4f70 [ 650.488250] ? sctp_setsockopt_paddr_thresholds+0x420/0x420 [ 650.493974] ? sock_has_perm+0x209/0x2a0 [ 650.498063] ? selinux_secmark_relabel_packet+0xe0/0xe0 [ 650.503443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 650.508994] ? selinux_netlbl_socket_setsockopt+0xb5/0x3f0 [ 650.509014] ? selinux_netlbl_sock_rcv_skb+0x480/0x480 [ 650.509040] ? kasan_check_write+0x14/0x20 [ 650.509061] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 650.529131] sock_common_setsockopt+0x94/0xd0 [ 650.533660] __sys_setsockopt+0x17a/0x280 [ 650.537834] ? kernel_accept+0x310/0x310 [ 650.541924] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 650.546782] ? do_syscall_64+0x26/0x620 [ 650.550773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.556247] ? do_syscall_64+0x26/0x620 [ 650.560246] __x64_sys_setsockopt+0xbe/0x150 [ 650.564674] do_syscall_64+0xfd/0x620 03:37:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xf6ffffff00000000, 0x0) [ 650.568498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.574133] RIP: 0033:0x45a919 [ 650.577341] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 650.596263] RSP: 002b:00007fa1c910ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 650.596279] RAX: ffffffffffffffda RBX: 00007fa1c910ec90 RCX: 000000000045a919 [ 650.596287] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 650.596295] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 650.596302] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fa1c910f6d4 [ 650.596310] R13: 00000000004d2ca8 R14: 00000000004e2dd0 R15: 0000000000000005 [ 650.604318] net_ratelimit: 32 callbacks suppressed [ 650.604327] protocol 88fb is buggy, dev hsr_slave_0 [ 650.604394] protocol 88fb is buggy, dev hsr_slave_1 [ 650.604499] protocol 88fb is buggy, dev hsr_slave_0 [ 650.604557] protocol 88fb is buggy, dev hsr_slave_1 [ 650.604659] protocol 88fb is buggy, dev hsr_slave_0 03:37:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xffffffffa0008000, 0x0) 03:37:18 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:37:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00003f3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 650.604712] protocol 88fb is buggy, dev hsr_slave_1 [ 650.604814] protocol 88fb is buggy, dev hsr_slave_0 [ 650.604883] protocol 88fb is buggy, dev hsr_slave_1 03:37:18 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0xe8201, 0x0) close(r0) r1 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r1, 0x1, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r3}}, 0x128) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x8, 0x1f, "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", 0x3, 0x8, 0x3, 0x5, 0x20, 0x1, 0x8, 0x1}, r3}}, 0x120) openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x40, 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/\x00', 0xdc040, 0x0) ioctl$SG_SET_TIMEOUT(r4, 0x2201, &(0x7f0000000040)=0xfffffffb) 03:37:18 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0x7}, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$read(0x0, &(0x7f0000000000)=""/51, 0x33) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a3612fc"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 03:37:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000483500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xffffffffa0010000, 0x0) 03:37:18 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 650.981293] protocol 88fb is buggy, dev hsr_slave_0 [ 650.984379] ceph: device name is missing path (no : separator in [d::],0::6ü) [ 650.986434] protocol 88fb is buggy, dev hsr_slave_1 [ 651.011675] ceph: device name is missing path (no : separator in [d::],0::6ü) 03:37:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:18 executing program 4: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000000)={0x6, 0x4, 0x6}) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) inotify_init1(0x80400) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) 03:37:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0006493500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x2) 03:37:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) prctl$PR_GET_CHILD_SUBREAPER(0x25) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0) 03:37:18 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 651.169027] bridge0: port 3(gretap0) entered disabled state [ 651.189572] device gretap0 left promiscuous mode [ 651.208265] bridge0: port 3(gretap0) entered disabled state 03:37:18 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x3) 03:37:18 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f000086fff4)) r6 = getpid() r7 = gettid() kcmp$KCMP_EPOLL_TFD(r6, r7, 0x7, r1, &(0x7f0000000000)={r5, r4}) r8 = epoll_create1(0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = socket(0x1000000010, 0x80002, 0x0) r11 = fcntl$dupfd(r10, 0x0, r9) r12 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r12, 0x1, r11, &(0x7f000086fff4)) r13 = getpid() r14 = gettid() setsockopt$inet6_tcp_TCP_ULP(r10, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) kcmp$KCMP_EPOLL_TFD(r13, r14, 0x7, r8, &(0x7f0000000000)={r12, r11}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r16 = syz_open_procfs(r15, 0xffffffffffffffff) ioctl$FIBMAP(r16, 0x1, 0x0) ioctl$SIOCX25SDTEFACILITIES(r16, 0x89eb, &(0x7f0000000000)={0x5, 0xffc0, 0xee, 0x0, 0x48, 0x0, 0xd, "b38936e8b15fd8f24fd7444711eecb9e2b412d7f", "2778cbffe076492b99ad25fe61b433f23ef6d7a9"}) close(r0) 03:37:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00004c3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:18 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:19 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x4) 03:37:19 executing program 2: ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x800) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)={0x134, r2, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x16}}]}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x27}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x5}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xff}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x1}, 0x4080) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) ftruncate(r3, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x48babc9a345861d4, 0xffffffffffffffff) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x50, r12, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x50}}, 0x800) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f000086fff4)) 03:37:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x29, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:19 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/devKmISDNtime`\x00', 0x10000, 0x0) close(r0) 03:37:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000603500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:19 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:19 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x5) 03:37:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000683500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x2, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:19 executing program 4: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r3, 0x0, r2) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000000)={0xc5, 0x7fff, 0x5}, 0x8) close(r0) r4 = epoll_create1(0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f000086fff4)) r9 = getpid() r10 = gettid() kcmp$KCMP_EPOLL_TFD(r9, r10, 0x7, r4, &(0x7f0000000000)={r8, r7}) sendto$isdn(r7, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r11 = epoll_create1(0x0) r12 = socket$inet_udp(0x2, 0x2, 0x0) r13 = socket(0x1000000010, 0x80002, 0x0) r14 = fcntl$dupfd(r13, 0x0, r12) r15 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r15, 0x1, r14, &(0x7f000086fff4)) r16 = getpid() r17 = gettid() kcmp$KCMP_EPOLL_TFD(r16, r17, 0x7, r11, &(0x7f0000000000)={r15, r14}) ioctl$LOOP_CHANGE_FD(r7, 0x4c06, r15) 03:37:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00006c3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:19 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:19 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6) [ 652.438457] IPVS: Error joining to the multicast group 03:37:20 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r4, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={r4, 0x5}, &(0x7f0000000140)=0x8) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x1, 0x7ff, 0x0, 0x80000001, 0x5, 0x0, 0xd4, 0x0], 0x8, 0x3, 0x9721, 0x3, 0xfcc, 0x8d3, 0xff, {0x9, 0x5, 0xfffa, 0x7, 0x65c, 0xffff, 0x8, 0x4, 0x4, 0x80, 0x7f, 0x8001, 0x8, 0xffffffa3, "dd8a3068e5d16393be026ad1920802bdd958f695f33b1fb49dd168c086a69342"}}) r5 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r5) 03:37:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x3, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000743500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x7) 03:37:20 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 652.622929] IPVS: Error joining to the multicast group 03:37:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x4, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x8) 03:37:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00007a3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:20 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r3, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36c15152100669d800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635202100000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000002a00)={&(0x7f0000000240)=@newneigh={0x28, 0x1c, 0x405, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@NDA_DST_MAC={0xc, 0x1, @dev}]}, 0x28}}, 0x0) r8 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = epoll_create1(0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) r11 = socket(0x1000000010, 0x80002, 0x0) r12 = fcntl$dupfd(r11, 0x0, r10) r13 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r12, &(0x7f000086fff4)) r14 = getpid() r15 = gettid() kcmp$KCMP_EPOLL_TFD(r14, r15, 0x7, r9, &(0x7f0000000000)={r13, r12}) sendto$isdn(r12, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r16 = socket$nl_generic(0x10, 0x3, 0x10) r17 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r16, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r17, @ANYBLOB="010000000000000000000300000004000400"], 0x18}}, 0x0) 03:37:20 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/Sev/SHEmxx\xd4\xc8er\x00', 0x80002, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="010000000000000000000300000004000400"], 0x18}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x3e852285682fd26}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xac, r3, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e20}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa4a5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbbc}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10000}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x20011) close(r0) 03:37:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xa) 03:37:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x5, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000f03500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 653.034035] device bridge_slave_1 left promiscuous mode [ 653.050841] bridge0: port 2(bridge_slave_1) entered disabled state 03:37:20 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xf) [ 653.123194] device bridge_slave_0 left promiscuous mode [ 653.132834] bridge0: port 1(bridge_slave_0) entered disabled state 03:37:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000000a00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:20 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x21) 03:37:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 656.821275] net_ratelimit: 30 callbacks suppressed [ 656.821283] protocol 88fb is buggy, dev hsr_slave_0 [ 656.831486] protocol 88fb is buggy, dev hsr_slave_1 [ 656.836606] protocol 88fb is buggy, dev hsr_slave_0 [ 656.841742] protocol 88fb is buggy, dev hsr_slave_1 [ 656.846883] protocol 88fb is buggy, dev hsr_slave_0 [ 656.852003] protocol 88fb is buggy, dev hsr_slave_1 [ 656.857101] protocol 88fb is buggy, dev hsr_slave_0 [ 656.862212] protocol 88fb is buggy, dev hsr_slave_1 [ 657.301304] protocol 88fb is buggy, dev hsr_slave_0 [ 657.306441] protocol 88fb is buggy, dev hsr_slave_1 [ 657.315498] device hsr_slave_1 left promiscuous mode [ 657.366793] device hsr_slave_0 left promiscuous mode [ 657.415986] team0 (unregistering): Port device team_slave_1 removed [ 657.428800] team0 (unregistering): Port device team_slave_0 removed [ 657.442970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 657.527687] bond0 (unregistering): Released all slaves 03:37:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @perf_config_ext={0x0, 0x7c5d44a9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x101080, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x4) 03:37:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000000f00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:25 executing program 4: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) close(r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400181, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000100)={{0xd000, 0xd000, 0xa, 0x81, 0x3f, 0xe2, 0x7, 0x57, 0x4, 0x1, 0x8, 0xfc}, {0x10000, 0x1, 0xa, 0x1f, 0x0, 0x3, 0x0, 0x62, 0x0, 0xc1, 0xff, 0x7}, {0x2000, 0x100000, 0xa, 0x7f, 0x0, 0x1f, 0x20, 0x6, 0x1, 0x8, 0x8, 0x2}, {0x4, 0x6000, 0xf, 0x3, 0x0, 0x1, 0x7, 0x40, 0x3f, 0xbd, 0x4d, 0x3}, {0x4, 0x2000, 0xa, 0x20, 0x4, 0x0, 0xff, 0x20, 0x57, 0x20, 0x5, 0x7}, {0x10000, 0x100000, 0xd, 0x7f, 0xf7, 0x2c, 0x1, 0xe1, 0xc0, 0x5, 0x33, 0x81}, {0x3000, 0x0, 0xb, 0x80, 0x0, 0x9, 0x2, 0x40, 0x80, 0x0, 0xc0, 0x4}, {0x4001, 0xf000, 0x4, 0x0, 0x1, 0x0, 0x7f, 0xd5, 0x3, 0x7f, 0x13, 0x9}, {0x2000, 0x800}, {0x1000}, 0xc000000a, 0x0, 0x2, 0x400, 0xb, 0x6100, 0x1000, [0x4, 0x3, 0x733, 0x10001]}) setresuid(0x0, 0x0, r2) setfsuid(r2) r4 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, r2, r4) 03:37:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x8, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:25 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x48) 03:37:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002000050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:25 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:25 executing program 4: ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x48babc9a345861d4, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getegid() getuid() mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="2c3ceb8648e19543ecde7df25a75d32b354aaac5360b8dcb894860e9fa24a8940000e50000", @ANYRESDEC]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xbf) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="3800000010010400000000000000004c9393f6fc09936e99087b140ca66880ba7b28fde0f3a261723a102c876fd99bed43b8026dc8cfb95386615ea68a23fb3a95dc4f5fb01655cc0b", @ANYRES32=r6, @ANYBLOB="00000000000000001800120008000100736974000c0002000800020044968604db22d871d814146329a7b6a35b82ea96d7d62d5066729640f95aa071a6a4d3eaebaf64226edf1c82d32f810f7a7abf7f7e9f390a6325d25e4afa87ed9d0dfb69dedbd03e1dee2860be3c8edb9d372fe0e346ca4a615d94e39dce8d42c538561743005e1931668bb902dbb957a3d7ff4b7cfe6471800521256153a323a5e0223df201b217b4716bfa82d91e74314d1365129a595fd2ff4f302d61a648d209cf8b300529", @ANYRES32=r7], 0x38}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x38, 0x10, 0x43b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, 0x2a8}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r7}]]}}}]}, 0x38}}, 0x0) 03:37:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x9, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:25 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x4c) [ 657.967477] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:37:25 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 658.148841] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=272 sclass=netlink_route_socket pig=26120 comm=syz-executor.4 [ 658.277728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=272 sclass=netlink_route_socket pig=26129 comm=syz-executor.4 03:37:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @perf_config_ext={0x0, 0x7c5d44a9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x101080, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x4) 03:37:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002300050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xa, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x64) 03:37:27 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:27 executing program 4: r0 = socket$inet6(0xa, 0x800, 0xa) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) r4 = epoll_create1(0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = socket(0x1000000010, 0x80002, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x709002, 0xcc2ab51d69f5c6bf) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f000086fff4)) r9 = getpid() r10 = gettid() kcmp$KCMP_EPOLL_TFD(r9, r10, 0x7, r4, &(0x7f0000000000)={r8, r7}) sendto$isdn(r7, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r11 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) write$binfmt_elf64(r11, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x128) mlockall(0x4) r12 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r12, 0x84, 0xb, &(0x7f0000000240)={0x1f, 0x8, 0x4, 0x80, 0xf8, 0xe1, 0x7, 0x4, 0x0, 0x1, 0x9d, 0xaa, 0x5, 0x1}, 0x106) close(r3) socket(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000040)) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000180)="290000002100190000003fffffffda260200000000e80001040000040d0014", 0x1f}], 0x1) r13 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r13, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0x40d, 0x70bd2d}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) write$binfmt_misc(r13, &(0x7f0000000140)=ANY=[], 0x126) splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0) 03:37:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xb, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002b00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:27 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x68) [ 659.756665] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=26157 comm=syz-executor.4 [ 659.911509] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 03:37:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xc, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 659.956831] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=26174 comm=syz-executor.4 03:37:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6c) 03:37:28 executing program 2: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) stat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="f30fa7e0df3b36f30f350f2164bad00466ed66b8080000000f23d00f21f866351000000d0f23f80fc73b67650fc75ed4e4763e660f72e648", 0x38}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000002e000/0x18000)=nil, 0x0, 0x0, 0x31, 0x0, 0x1e3) openat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) open(0x0, 0x220803, 0x102) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) socket$inet6(0xa, 0x80003, 0x6b) openat$random(0xffffffffffffff9c, &(0x7f0000000480)='/dev/urandom\x00', 0x120084, 0x0) 03:37:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002d00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:28 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x281) r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000003880)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000038c0)=0x7f, 0x4) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x1982) 03:37:28 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xd, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:28 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x74) 03:37:28 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x7a) 03:37:28 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003000050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x10, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1f, 0x8000000000000002, 0x0, 0x0, 0x0, 0x6, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x40000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r4, 0x0, 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000100)={0x4, 0x9, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) 03:37:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xbf) 03:37:29 executing program 5: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000023500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x11, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xc8) 03:37:29 executing program 2: creat(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) sendfile(r0, r1, &(0x7f0000000100)=0x9, 0x10000) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r5 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) write$FUSE_LSEEK(r2, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x5, {0x40b}}, 0x18) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r5, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0xffffffffffffffc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 03:37:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x1a0) 03:37:29 executing program 5: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x12, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000033500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 661.904434] audit: type=1804 audit(2000000249.340:156): pid=26248 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir983677860/syzkaller.QcqdrJ/32/bus" dev="sda1" ino=17561 res=1 03:37:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000043500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 662.078315] audit: type=1804 audit(2000000249.340:157): pid=26248 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir983677860/syzkaller.QcqdrJ/32/bus" dev="sda1" ino=17561 res=1 03:37:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x300) 03:37:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x13, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:29 executing program 5: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 662.234293] audit: type=1804 audit(2000000249.340:158): pid=26248 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir983677860/syzkaller.QcqdrJ/32/bus" dev="sda1" ino=17561 res=1 03:37:29 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000f3ffffffa4ffffff"]) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x322, &(0x7f0000000100)=[{&(0x7f0000000000)="2f0000001c0005c5ffffff000d000000020000000b000000ec0091c913000180f0ffffeb", 0x1dd}], 0x1}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c000f0400092500090007000aab08000e00000001f52c0021", 0x1d) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsu\x00', 0x101680, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, 0x0, r3) setfsuid(r3) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000240)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r3}) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) getegid() r5 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r5, 0x1, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="200000001100550400"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) ioctl$sock_SIOCDELRT(r6, 0x890c, &(0x7f0000000080)={0x0, @llc={0x1a, 0x325, 0x5, 0x40, 0x8, 0x8, @remote}, @hci={0x1f, 0x1, 0x2}, @isdn={0x22, 0x8, 0x4, 0x9, 0x1}, 0x6, 0x0, 0x0, 0x0, 0x400, 0x0, 0x6, 0x3, 0x80}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000040)=0xab, 0x4) 03:37:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000053500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:29 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x500) [ 662.451417] audit: type=1804 audit(2000000249.340:159): pid=26248 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir983677860/syzkaller.QcqdrJ/32/bus" dev="sda1" ino=17561 res=1 [ 662.533840] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. 03:37:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x13, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x54}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x35, 0x10, &(0x7f0000000040), 0xfffffffffffffeb7}, 0x48) 03:37:30 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x14, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 662.578065] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.4'. 03:37:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000063500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:30 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x600) [ 662.637252] audit: type=1800 audit(2000000249.630:160): pid=26230 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=17547 res=0 [ 662.662627] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 662.715110] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 03:37:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x15, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:30 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000073500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:30 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x700) 03:37:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) close(r6) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r7, 0x20000103, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 03:37:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000a3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:30 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) sendto$isdn(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="e60a00007b0000009b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262963425dac49a2626cbd3950717c23296a4c3c6a670368b3200000000000000"], 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r7 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x0, 0x21) ioctl$USBDEVFS_SETCONFIGURATION(r7, 0x80045505, &(0x7f0000000080)=0x7) r8 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r8, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f) sendmmsg$inet_sctp(r8, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r9, 0x0, 0x0, 0x0) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r9, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x68, r10, 0xb0b, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x880}, 0x6e142cc2d004e396) [ 663.061271] net_ratelimit: 26 callbacks suppressed [ 663.061279] protocol 88fb is buggy, dev hsr_slave_0 [ 663.071517] protocol 88fb is buggy, dev hsr_slave_1 [ 663.076760] protocol 88fb is buggy, dev hsr_slave_0 [ 663.081853] protocol 88fb is buggy, dev hsr_slave_1 [ 663.086944] protocol 88fb is buggy, dev hsr_slave_0 [ 663.092019] protocol 88fb is buggy, dev hsr_slave_1 [ 663.097138] protocol 88fb is buggy, dev hsr_slave_0 [ 663.102217] protocol 88fb is buggy, dev hsr_slave_1 03:37:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x16, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:30 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xa00) 03:37:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000e3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:30 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x17, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:30 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xf00) 03:37:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) sendto$isdn(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="e60a00007b0000009b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262963425dac49a2626cbd3950717c23296a4c3c6a670368b3200000000000000"], 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) r7 = openat(r3, &(0x7f0000000040)='./file0\x00', 0x0, 0x21) ioctl$USBDEVFS_SETCONFIGURATION(r7, 0x80045505, &(0x7f0000000080)=0x7) r8 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r8, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f) sendmmsg$inet_sctp(r8, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r9, 0x0, 0x0, 0x0) r10 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r9, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0x68, r10, 0xb0b, 0x70bd29, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x880}, 0x6e142cc2d004e396) 03:37:30 executing program 4: socket$inet(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) r1 = epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x1000000010, 0x80002, 0x0) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r4, 0x0, r3) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r5}) r9 = fcntl$dupfd(r6, 0x406, r0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x100400) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x5b, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$VIDIOC_G_AUDIO(r9, 0x80345621, &(0x7f0000000240)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) add_key$keyring(&(0x7f0000000140)='keyring\x00', 0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='security.ima\x00', 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/149}, 0x9d, 0x2, 0x1000) r11 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000180)={'z\xc0\xab\xc81\x89?\xe6\xa1\x00\x00\x00\x00\x00\xff\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r12, 0x1, 0x0, 0x6, @local}, 0x14) r13 = socket$packet(0x11, 0x3, 0x300) r14 = epoll_create1(0x0) r15 = socket$inet_udp(0x2, 0x2, 0x0) r16 = socket(0x1000000010, 0x80002, 0x0) r17 = fcntl$dupfd(r16, 0x0, r15) r18 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r18, 0x1, r17, &(0x7f000086fff4)) r19 = getpid() r20 = gettid() kcmp$KCMP_EPOLL_TFD(r19, r20, 0x7, r14, &(0x7f0000000000)={r18, r17}) sendto$isdn(r17, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$FUSE_DEV_IOC_CLONE(r9, 0x8004e500, &(0x7f00000002c0)=r17) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=r21, @ANYBLOB="00000500000000007d1d476d4ca97250223e99849fd66cb2b0b331584855e7b61883f276da5e228f1ec8f999905b9f7c8ead42e47c5987f2bb4a592bc32930b7f95982e5e43931"], 0x20}}, 0x0) 03:37:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000f3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x2100) [ 663.541240] protocol 88fb is buggy, dev hsr_slave_0 [ 663.546432] protocol 88fb is buggy, dev hsr_slave_1 03:37:31 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x18, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000483500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x3f00) 03:37:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f00000015c0)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000018000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x1, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x80, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) 03:37:31 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00004c3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x19, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x4800) 03:37:31 executing program 4: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r0, 0x0, 0x0, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r1, 0x4008550d, &(0x7f0000000000)) 03:37:31 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000603500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x1e, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:31 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000086fff4)) r5 = getpid() r6 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r0, &(0x7f0000000000)={r4, r3}) sendto$isdn(r3, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r11 = socket$inet_tcp(0x2, 0x1, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r12, 0xc0502100, &(0x7f0000000040)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r9, 0x80082102, &(0x7f00000000c0)=r13) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, &(0x7f0000000040)=r13) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) r17 = dup3(r15, r16, 0x0) getsockopt$inet_dccp_buf(r17, 0x21, 0xe, &(0x7f00000001c0)=""/200, &(0x7f0000000000)=0xc8) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) sendmsg$nl_route(r14, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x244, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x21c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x20c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @ipv4={[], [], @multicast1}}, @IFLA_IPTUN_REMOTE={0x14, 0x4, @ipv4={[], [], @dev}}, @IFLA_IPTUN_LOCAL={0x32, 0x2, @loopback}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @rand_addr="6c188a44711625f7e8e5d070c39a513b"}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @dev}], @tunl6_policy, @tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr="26235e58cad1850f722a1b12de5fb0c3"}, @IFLA_IPTUN_LOCAL={0x14, 0x4001, @remote}, @IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @local}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0xfffffffffffffcdb}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_TTL={0xffffff75}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_FWMARK={0x8}], @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x8}, @IFLA_IPTUN_ENCAP_LIMIT={0x8}], @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_ENCAP_SPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_FLAGS, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_FLAGS={0x115}, @IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x51}, @IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_LINK, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @tunl_policy=[@IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_ENCAP_DPORT, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_TTL={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}]], @IFLA_IPTUN_PROTO={0x8}]}}}]}, 0x244}}, 0x0) 03:37:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000683500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x4c00) 03:37:31 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x21, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00006c3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:31 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6400) 03:37:31 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x22, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000743500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:32 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 664.874311] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 664.889919] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.2'. 03:37:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6800) [ 664.984094] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 665.008151] netlink: 428 bytes leftover after parsing attributes in process `syz-executor.2'. 03:37:32 executing program 2: ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fchmodat(0xffffffffffffffff, 0x0, 0x0) dup3(r0, r1, 0x0) 03:37:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = epoll_create1(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r2, &(0x7f0000000000)={r6, r5}) sendto$isdn(r5, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$KDGKBMETA(r5, 0x4b62, &(0x7f0000000000)) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x30}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) 03:37:32 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00007a3500050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:32 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6c00) 03:37:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x23, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003f00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x7400) 03:37:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x24, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:33 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000005200050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:33 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x7a00) 03:37:33 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) writev(r0, &(0x7f0000001640)=[{&(0x7f00000001c0)='E', 0x1}], 0x1) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) ioctl$SNDCTL_DSP_STEREO(r0, 0x8010500c, &(0x7f0000000080)=0xffffffff) [ 667.932282] device bridge_slave_1 left promiscuous mode [ 667.937812] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.002366] device bridge_slave_0 left promiscuous mode [ 668.007885] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.301270] net_ratelimit: 26 callbacks suppressed [ 669.301279] protocol 88fb is buggy, dev hsr_slave_0 [ 669.311407] protocol 88fb is buggy, dev hsr_slave_1 [ 669.316561] protocol 88fb is buggy, dev hsr_slave_0 [ 669.321695] protocol 88fb is buggy, dev hsr_slave_1 [ 669.326840] protocol 88fb is buggy, dev hsr_slave_0 [ 669.331946] protocol 88fb is buggy, dev hsr_slave_1 [ 669.337096] protocol 88fb is buggy, dev hsr_slave_0 [ 669.342193] protocol 88fb is buggy, dev hsr_slave_1 [ 669.781244] protocol 88fb is buggy, dev hsr_slave_0 [ 669.786365] protocol 88fb is buggy, dev hsr_slave_1 [ 671.753352] device hsr_slave_1 left promiscuous mode [ 671.807090] device hsr_slave_0 left promiscuous mode [ 671.847734] team0 (unregistering): Port device team_slave_1 removed [ 671.858679] team0 (unregistering): Port device team_slave_0 removed [ 671.870681] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 671.935745] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 672.010503] bond0 (unregistering): Released all slaves [ 672.058914] IPVS: ftp: loaded support on port[0] = 21 [ 672.144752] chnl_net:caif_netlink_parms(): no params data found [ 672.185806] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.192528] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.199560] device bridge_slave_0 entered promiscuous mode [ 672.207443] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.213993] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.221013] device bridge_slave_1 entered promiscuous mode [ 672.242266] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 672.252274] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 672.270252] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 672.278068] team0: Port device team_slave_0 added [ 672.287302] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 672.294853] team0: Port device team_slave_1 added [ 672.300655] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 672.355301] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 672.415484] device hsr_slave_0 entered promiscuous mode [ 672.458367] device hsr_slave_1 entered promiscuous mode [ 672.532291] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 672.539671] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 672.569859] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.576322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 672.583062] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.589428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 672.677895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 672.698850] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 672.717748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 672.729366] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.740230] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.762274] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 672.768395] 8021q: adding VLAN 0 to HW filter on device team0 [ 672.788300] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 672.804046] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.810450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 672.835077] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 672.843801] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.850168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 672.858599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 672.879817] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 672.889938] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 672.900992] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 672.908509] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 672.917388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 672.933197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 672.941000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 672.966245] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 672.975285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 672.991022] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 672.998473] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 673.006934] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 03:37:40 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x8000, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4002, 0x1, 0x11, r0, 0x0) 03:37:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x64, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000000a00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xbf00) 03:37:40 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xffffffffffffff08, 0x5, 0x0, 0x4, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) geteuid() mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001a000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6e217b91c3b0d873722b41afb8ed58f2109e448e6cc4bd0f11a26f4233e3ba1ff40e062a43f80b1bae2728316e63e58afdf284732bd1e1970081ddd3c9f310f827c195f3c5d57c67a08466517ba1300000000858003ffffffffffffffff3e26b5ca26bb434dbd0e4885c214e577bb081876e63e7c2834573925db8b54b33da7b9c7aefca1f9c49c6400000008000000000000000061e2448f23a7e49736a335440c5b7681c58dc647494f0dbc811becd7c487d283b2d0574510103af981adebcd7535c0b3a3df610d9975d1d957c3b410c2ab65977da598ffa069c01b3d386c15d34a5918d6909192ec97032c320044fa934bf944d61d91c17f1c4377a54c7febb46f83a7842816023b60417388196a22091c9f82e8e0291f4082d92d0ae76b94a18647bb44cbe9366a08fb3f0000644307c51085f7215fd44635e5967f21e8f59bd021f309d910cb5d37cb16450244ef261a37255a06c97f19fa0e68836543174745684037cc7bba99aa1cbefcdd62f799a5fb35abc5af3ab43a5fc40eb352e6ff078fad68182845f1f6b7ff6c200c103b64608404b41fce73186e55193d3d96faab588048349b35e431914bfde3c07f1419dac11995aded30b44ead7142a7b397a913f6bac2eac41c32d10863c3e6dd9e88d44842951e15d6d631995f07143416b73746d0833ff3a766a4b094bc6d5c69bd6b19e0043ba97cab8506b298a96b4707000000b77270f84d17c3d89c98aec479773696f16e5b80cfcdc183f09c28ca722200d5256a04cd2ff6008bd26f1fe85d60ce476bffc936ca19e9d003"], 0x18}}], 0x1, 0x4048000) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000180)=0x1, 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:37:40 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xc800) 03:37:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000000f00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:40 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 673.398477] binder_alloc: binder_alloc_mmap_handler: 26533 20ff9000-20ffe000 already mapped failed -16 03:37:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x65, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002300050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) creat(&(0x7f0000000700)='./bus\x00', 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r3, 0x1, 0x0) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000040)=0xe63) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000001c0)={r4, 0x2, 0x4, "f4e926e50cd0d3db9446b1d8efdbc82b669a3a14496f39d82ba189a733b20a132299c6e2c99772c35c56b67edd82f9ac8f800e62cc1b860966ef48f001cb00cca06ba1fc8c4e2b58120f291926d03d306a2f6695b7cd3de26bc60654f719f79938ef8b29bb797d75c25df34d2afd559cba7144df75610495d81fcb9eed82c7ea31cd05ee271acf40da4bdb032cab12cdbadb29fe56a87f"}) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) r5 = syz_open_procfs(0x0, 0xffffffffffffffff) ioctl$FIBMAP(r5, 0x1, 0x0) r6 = syz_open_procfs(0x0, 0xffffffffffffffff) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1d) ioctl$FIBMAP(r6, 0x1, 0x0) ioctl$VIDIOC_S_STD(r6, 0x40085618, &(0x7f0000000100)=0xffffff) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000000)={0x3, r5}) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 03:37:41 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={[{@resize='resize'}]}) 03:37:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6b6b6b) 03:37:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:41 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'bridge_slave_0\x00', 0x80000001}) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r1, 0x5453, 0x0) read(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2000000011000000000000440000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000001fe0000010079ae3aaf8d99de1d068482b66a5c4c150775a62041bab050a2694324834945a6ef0f123528e689c6e12f6b88bfd23524cbdd84b61308e30487f6a829085aeffc8a8100"/87], 0x20}}, 0x0) r3 = dup3(r2, r1, 0x1c0000) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000180)) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000140)=0x3) 03:37:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x8000a0) 03:37:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002b00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:41 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 674.198594] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 03:37:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x1000000) 03:37:41 executing program 2: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) close(0xffffffffffffffff) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000200)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB="00004f9c000010b9ad8de2289570d9ab13ded70d3d2f7cad98f86a572046750208dbd015c32b4959371a4c2aec470c75f518ae916b67bcbd05c325499018c9183f5dcfff3f"], &(0x7f000095dffc)=0x1) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000140)={0x2, 0x1, 0x1f, 0x9, 0xcd, &(0x7f0000000a00)="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"}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 03:37:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002d00050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:42 executing program 4: 03:37:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x71, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:42 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003000050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 674.700847] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 674.730243] overlayfs: workdir and upperdir must reside under the same mount 03:37:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x2000000) 03:37:42 executing program 2: 03:37:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x3000000) 03:37:42 executing program 4: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0xff, 0x0, 0xff, 0xff, 0x0, 0x81, 0x964031b3e032c132, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94, 0x0, @perf_bp, 0x0, 0x100000001, 0x6, 0x0, 0x1ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xd6) socket$kcm(0xa, 0x3, 0x11) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r1, 0x0, r0) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000001b00)=@in6={0xa, 0x4e24, 0x0, @rand_addr="398d9e1d76e1cd28cd0460a81e346335"}, 0x1a, &(0x7f0000000800)=[{&(0x7f0000000480)='\x00', 0x1}], 0x300, 0x0, 0xfffffe18}, 0x0) 03:37:42 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) setxattr$smack_xattr_label(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000005200050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x72, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x4000000) 03:37:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003502050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:42 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x1c0081) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x4, 0x1, 0x3}, 0xfffffff7}}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x0, [{}, {}]}, 0x98) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/exec\x00', 0x2, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x2) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f00000002c0)) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x541c, &(0x7f0000000300)) keyctl$join(0x1, &(0x7f0000000340)={'syz', 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000380)={0x9, 0x5, 0x4, 0x800, 0x0, {0x77359400}, {0x1, 0x8, 0x4f, 0xa2, 0x7f, 0x3, "374ac31c"}, 0x81, 0x1, @fd=r0, 0x7f, 0x0, 0xffffffffffffffff}) ioctl$BLKPBSZGET(r5, 0x127b, &(0x7f0000000400)) r6 = syz_open_pts(0xffffffffffffffff, 0x400000) ioctl$KDSKBMETA(r6, 0x4b63, &(0x7f0000000440)=0x3) r7 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(r7, 0x5607) r8 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ttyprintk\x00', 0x80, 0x0) ioctl$VT_OPENQRY(r8, 0x5600, &(0x7f0000000500)) r9 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nvme-fabrics\x00', 0x80100, 0x0) ioctl$SIOCGIFMTU(r9, 0x8921, &(0x7f0000000580)) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$TUNGETDEVNETNS(r10, 0x54e3, 0x0) r11 = syz_open_dev$mouse(&(0x7f0000000600)='/dev/input/mouse#\x00', 0x1, 0x81) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ocfs2_control\x00', 0x400043, 0x0) ioctl$BLKALIGNOFF(r5, 0x127a, &(0x7f0000000680)) ioctl$KDFONTOP_COPY(r11, 0x4b72, &(0x7f0000000ac0)={0x3, 0x1, 0xa, 0x13, 0x1ae, &(0x7f00000006c0)}) r12 = openat$zero(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/zero\x00', 0x20000, 0x0) ioctl$TUNGETSNDBUF(r12, 0x800454d3, &(0x7f0000000b40)) prctl$PR_SET_SECUREBITS(0x1c, 0x20) 03:37:42 executing program 4: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name, 0x10) sendmmsg(r0, &(0x7f0000001400)=[{{&(0x7f0000000100)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x41, 0x4, 0x4}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000040)="718a661797ed3f64afc18d70427a2bcbc1085c91a3540456bfea32323a24f1329ccf85", 0x23}, {&(0x7f0000000180)="81b9d17a442c9ea03411b2000ff38ffdc5b5e1a042f22f15e2b1a1797a83e26781e9a9e09293402b320e1559dda11dae7200c79d6f47282387083fd85a9ef5f27f583be15ae38a0734c96f7c942b8af6908ec0e5148c19a3d5a57526357fd9410794dfa4ba8c94fa91a7a954", 0x6c}, {&(0x7f0000000200)="290564fc0ab2e75472bf6b0e7cc9ea6361a8e2eeec97e0b90d9929bee64a80e9fdd7c7457788c72954350cda80022204a5369aa970787b03084e592aa10d683c0cc547f06c464414d529df02c83f0c4d48821e831bcd208f8ac5c50d46edbc1cc98d9be668b40ffbf22dacc7f78d4095e5a670c36c9ca72bccc9878a340711e1466f32b074bda770e646d2", 0x8b}, {&(0x7f00000002c0)="7003c54ccb5b0ff54d40011fc94b62145e342b3b369ed29a3079822edf4296e6", 0x20}, {&(0x7f0000000300)="5764f8e4342b0412324741f7904fc983c193278359f632f4a46d158d6671137859ef84c11af79a9d5f14aee4ee3998fedf428ae2eeaad0465afbe67ccaaf709938a04a3dcb6ce47b8e94d623ca3230f6e13c16159d625374a6f2e5e9b720fc045db46fd4adead524e8b553ab27df27b1f2a922e0c31013533af3aba4de92167cda0277d19d76ff41777f46681f1f99e5725f68add02091386c842a1049a3bed3686cc0ef814abe91986a4e3017d441825c11b2f9b1c5d4fd7d6feeb118600c1fe689c713189e6dd381d3419437601faa51efc8b06570de34d3eed99c7c0da87ae69432e78034da3cc7db8edf409c55ac306c43ef0eedbf7722704da9a0d4bf31a6c58f7372f2f291ce3735d10d975645fbed5ebf4a78153d35a3d1a70e273c09e77155b5f49c705dbf6576721e09c618cf19dab7f3541b8ccffbe3342d2aa619b7b1bdcf0e8d4b04570dfbf66f59ac364e1a418d2ffb82c72d300d51a7ac9ab2df8b1ca8a9de8d8582bc4cc28bd5ce6f052552df1bd50e5c2c288ead4a1dd1a70a2d8a7dc44d17481ca97040cf6889a70b9be78c5db71ad4e6eca57be7f961a0795104223a651a23df16d92c39d5cdc337647672d6d6bd7dfda6e6181b7a36e9654bfd4ad96ad26d263c553832015de3e62b014fdb41f3a2e05c5444b73b055645fa5f402b69792d8efe8fe604b9196ec1d700792c950a031ccaa3ceec8ee4d8cbb487100f9e77853d30b63b65bd9d4ccd8d2e43826ee4203d952ec312a37cfcb5bf5afa677545dec5c0d8d9b9f06eac3b98e5125c6482b72fe08397e221ce12e32a28cf0434563b561a5ef8936156e250568358ff88107ae39aa4e1e5c148049b47fe76b9340db40f6f289ea1712f5c45070f769edbd332f39749b2349e4d275f8ae66dd6b6736d71db0c7de7e21bb1ea941079289494714303263bef4002c14855d8b3f94233a869bd106fae18f043dc9067a1858ed9c116c5ff904c35d92b78a739245dacfaa63250520ef7432c2892882cc15aecbe0d60d2e034cb497e38e65efd9ec6da836a2126c57364502178b5aea82f61bda2e5b2b90ed98ac28d81da82c682c4ea26a26d6bfbbaa22d1041e97dad38d5e49bf5f52be1cf9b72dc84d694a146e2f04266f37f2a6524314ecdec7d6fc06b45aa18cc9f5c55e6626a54406e7f654736a04a92bec0c33338ceff7f271936bcc4ac79aba3c3ffcd5292fca8e0c9f64af219deb1186bb1793c0644f1f90748efce714258e01637c6dd7a17cd9abc03120f3992986a0a67bbfab71d403941dac2f2434269541039a78dfcd362a7631e077498eb7e3ef995949c7650dc8ae308ae7b0a60d8770fb81c48cacfcef938118013145c7d62878b651ba4df50cb8655f96b0827cec1fd9c2bc8ea36561c05f00f7134dbb7d112b09c54f089d3ceea5b56e0af6956c6a1ac6dc5f19bc9b9d0e3957ce082fb8be548ae5885c4e551f59d588167234954831635d816768ce7c787a3a851c1324b6414d0f856c3b0d7e47c87d59222c347c4e2a1298793c74bbe9b29e57338175c86600effd02c2c41e7acfa513abd14368cac51181099b4073729d5344ae9a962df29bd6b9e608ad6244c642e125774e0dc7d54f539bc034bf46ebe34ac370330bad027348ab6afb2ad196795c769731b01ed898a0d9b476908460f192e9a5cc84da39bfd704c29e60063a717ee7c852220de57dda01198db009c3cbb3019cf0015b0294ca410d7dd6fd7ed534507f4c715bc29b343036937385d0c6cd97902db3ee47e477ad4cb66962e85a3e378dedd0c01f09e1639dfac81e39e8989182767364fc45d09ce2b315b55716e3df647fb1b327d8783fe6b1f76524952289a739b637b5a6101a8feb8a8227461b6b293137f2f5d4f313c21ae76aa560a3fb44888bb2832c2a13c41707b1f59ccca25f2253610239b81abaef2c3ac9621f4a72810f12fd96259f91762400d0d702a3f148b317a9b99ef74f42b1c073ca69505d79f4600aea2c2253a730b60b4684d79d66085a0329289ca242f18f44f08e05a2733de3425578a8cc261a0c50bbb92d93e20c81af52efa182df3dc4a56c0f6a095f1d4991b5e22910b9f24ef6aaefe88f9e638db8da46371ab94e082e626e6dd71fe2ed1b7e1d0843dab11fb504faf43ce1215e6727b1bdc7c2f859da21d8e62b7d773a19d67eff2c3c2b4305fa8e96290371f53988f2dd7c76443db6985cbbb59cf86814d2267d4c9f27470be5179f65b71378e44459858c504a9b794a93c6d83a6c31c844ed8050a0c09cc8b0674967bea3428ee245d6bf51253109b394ec6b0d76de468a96067fda38f1b2dfe453dfcac262707efd9e6e0dfe9e3b65f325c8a799f0273f15da04bd8a8a4dccfc9584d9b81e72a35368a70f80f354527a164d65dc094a003beb50b0cdc134689c5f590b3df304c35f13e94fa8a75f955a43c3c1d4a8585938e85ee5140417968186b80716e288f541a25ddff0de22416e602b9b4b65f10185a132459ad4817ae8f59f873ebb75bc47c18ed45f220147eea0c0c1bb5b0e4e2c844c37c932db5909a1485d7b6ca7e3d7987cec45ef1ec8fc1b963a5e7499f3ca004b5373b302eae8dbf826e8bb0359126d00b024f80dd97cb7cd29a56b6d6be1a63bf5b322e5b77211a4b8fa7b4bb9a88b7b18cefa855141e9cfeb139f985f7f2899d5168c57fd93095c1cc0aeb6ceca7cb8673f6d86e5699b8d85f2781880998d79e89015d446c11c66f0aa9fd51a42e7e4ec283feae1c8311e009c4b4a9cb7277faec1868020f4c938a0c6de33021ae6da8cfb873343a31ee0582e3b993a62f08a0d40798e62395b9c76e97e61f750883b10a587de80e6eef0ac6721dca51795599e85fc14b7190bc623f54e8f19ae27f433c4dfd50f708b78cd7a7100fe5513f798d0afddca758282dd435aadedefbf538a0c7e9eeab302f055971d128a0cf8426f2b4c89fea18bb9f9b8175ed03ae4c9996ba2257148cffbdb03f42910615637b1dfda0d08cdb9a8ee780c831f19b979344f9d54ceadad8f1bf30451caa8d4b7a66bc4f503f77afd31e04d289b2cfbaede02cd14a4a948965484e570ed3c070bdfae3b42ae84cf42a10ed6bc621615ddc4741960780da946c33262d4b2aa9388b588e0f0423b3fefc1531b2d80737688a4efdb4a250d6fd6bf8f0d68c9188ac1138eae67179772d9a2ca9eaa86c8c0fe88ab7bdf7187f1f3266700ad87c15545b59ae354cb166bc8b8cad9c5201dcea4ea91ea4e9edd6661923d4f4ebb050ee8b1f4f948616ec996b6c08f4460024e5390403045380e39445775abb3e6d64e94778e140520616b1a07482002543c6ac8434d5d8df85edd26f55fa928d4817d3a546dfd1d0e76e8572a8689b070e1e02a96d3d121eba98e7b5449864abfa365e142672ae65e6fe5fb0a789af8395325b0fd857a8de12f8da54bb68a40f2ab785f229105b80d80916f8f0f983e835a3cc730d7bc04cf6641f8f80c7c42ae18520b90e769c0e289b252414e8e1c8d4e25bc47b00e42423c0b2b0360fb7aaca91d4b9f2137c8dd3e698ca75e35cc3345c0e1f0810593c0a32508cc1ad32f441442b98eae8fc2a08dfef29db63c2af06fb6416df575d52d0c347c54f405768c479d6d6661220b436806072870705159a1ef8bd449284ceb704f11b4e259b9b7508c5ba419ce927e839aa03dd5d793047f015f49ff5c94fc0f6217713914d529f996095e3f5204a6f424f11c43eec2c70c75a0ff3432fc9d89efa5c19b97781594e9890b36b19b977e3c6bbebef7643a7ef6efedb0f6059961504b92279b24f531a594ec4a1f793f6cd9776d63055a7bd76501cac4b67700cd7c7c737338b8afe991fe970ad4b4d2790f3060f49f9b5c5781865b2e3c286e8018de45459048c551f5cc181ca51239bd293d0b50898697a857eb4e5c45ec7225d4be019cdf23083a41a0903bd3b4189ff5c607a2d7453559e2073d980ef7d049d4b225009afec593f86bca4ee5c8105cfbf5cf702195f9f2d0324d41bb5718a33ec58635e93969e462f30a82a04fd46e59e1dc539ce082785f14f72ff9302a7086c1173e835f5469b4c6ea3d5427ab67d81ae25afe44e2e8ae709b488de0d20d55c72e6b82a9c7d5f537a5f87ca46b5710967650e0077a53f879c94b7be9a9d0b283d16a62ee4a79036e7e01c62667047b6783b239ff616ff9e8d249c807d80c83ded7069be9ebf911c96fb7d1c4ede9149702fd33b99a801428d2783cc06e60e46379e74f5f3ec248c3ed76049a88448b1356e04dd9abeb12f341929a8631c75274e395917c320ff77a7c4414436d138553cda9db627d44f182884c40931a5a88edd283e5755d875582fe9768e18182ac25f0a31d184cfb40401bd89128041b880f56caeace3f073e6f63851a9885723fe613cc021c8f3ac66384101660e30977160cbf72d0f4c531edb386e299ce19732487536973cf0aab12bc60127133dfd42d0ee7c17a9c705614e1cd53d158e8148e479ebcec5ba761d970ce356824aa78d578c01a975806af9c9387edfa7d4480f069b8fd775d4bd85d6dda96b225c92bec90988763e8f7695828345e7f0c0d0da012c5d952f6519a00fda2b47f4edd9ee6329a75494e84091f6f8403c43e9acca312615b79ce35b22674e37bae0be8901d4ae215330b41700f3d610bc9f30b3ebfe7f8f01d539701b23f32cb1500d99008c706527b4c1f43988d6d01131c198af9e2621f41ccef1db0b13abfc7619a60e16b90fbd27a32b7585cc0eacae52d48935fd041726686e28ccbb9618cbe5a303172e2ef0a56d0db66af57d42f00e8df8ec8e3f4b82ae6cc6f85b27ec2e392db982512523f07b7767561a22822de2fd5a39d307dcb6d6ca2a3569d146c8487ad9ac430d816d0ceaa6c5c211e19c67e9c552915a09d1fa71ba6bc8cb8087af405982eed1851d10202b29ac2024219fde40e479edd6a4c977804a0b625208c61c42c0ba57f9138eb894ff97a471fc66f64053712a1ff9d36fdc26aeb7dbd94f12e9e0d855f95f2d19420384b09d2b2775013cf74d186a3052a52490578d3d686ea15c673e2dc066560716a10f7b8fe156092f5fabffcfb50381600ba2d6f74008d04e121b14e0405a30b26c5c5481becbdb7d1a96a97cd8d3608eaf7471c8247a23c28f14c83826e016ed0dffccea043ae0ddb4e556c5f585363a2effaee8989d6a202ae59524f8069caf6ee9400458fb8dc4b423a9f2a57f7924df2da3c3e562f2c6e77febcc2abcc16286135a9eeb47dc166c64d574197222e8c729201133d84a9049be6a5524194cf2daf268621ee189cfb9860d76c7c24cf22ad333621ee2af2f6090969daa2ac59c1f4877e1890f01bcac891cb489ab50a1e3ed26bca4f34ecd541b9f9f64cd3915a48d5eaf215e188570b0cace1cb2f020acefd3fabde63f0bc46d8ca7e0c5d4286977474d0d426fcdb9fd6d93da0665e241e8036868cfb933d6b440e71047fa7aa148e6bfa30b39f763cab7f73b63c27fea263c120abf9f8a9e6ec65d93d8c7369f6b14a27c1078a35191e902a941030919be50da8304c75043db9918b92e0e0c0a3f307080483b91411f026315d311af5a6a6059ab661246d3724a4d1d1a0545338cdbf5986e98efcbffa6543b52887cf89fde3f42ef5f0b455d0a4282d0dc18650a192e9f2bc4d8cf954018c2ea11a81ac620a290d764daf4dc7788ed2f196715ac01165f791b82373d476d68d45f2f6d6611c05c63bb44ca2df6289f307012b2c48a8da66945df275ded9a111e38", 0x1000}, {&(0x7f0000001300)="150eef7be10656f5cddbef48db9c40d11173d8fecab8f89b12561f600fe08abc7f0e6a5003", 0x25}, {&(0x7f0000001340)}], 0x7}}], 0x1, 0x0) connect$tipc(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 03:37:42 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x75, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 675.381235] net_ratelimit: 28 callbacks suppressed [ 675.381244] protocol 88fb is buggy, dev hsr_slave_0 [ 675.391416] protocol 88fb is buggy, dev hsr_slave_1 03:37:42 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x5000000) 03:37:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003503050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:42 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup(r1) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000100)={0x4}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x8, 0x5, 0x9, 0x0, 0x0, r0, 0x6, [], 0x0, r2, 0x3, 0x3}, 0x3c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x88) ioctl$USBDEVFS_GETDRIVER(r3, 0x41045508, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, &(0x7f0000000080)={{0x2, 0x0, 0x0, 0x40, 0x8}, 0x2, 0x0, 0x0, 0x401, 0x0, "c73cd5f6c2f885f2fa9eeef34967aa1605516dea0000c5a33dc425b237fc379e984787b636950efafd34f54028e9f0cd4bd317ad31bc7fb59049e65919c4e8cb9398319dab031514bdbf58f4b52d00ba708c2a6cca31ac9a2e3893b7819a2c1002faf04bf0cb1b803ff521b0291b8226f601fa3f76e0f37052226357db0f293d"}) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]}}], 0x1, 0x4048000) r5 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x200000) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f0000000240)=0x100, 0x4) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r6, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x80800) sendmmsg(r6, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x445, 0x101000) recvmmsg(r6, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:37:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=0x0, @ANYBLOB="0200000000000000c4c74dce4f0d7cd3d5ba105aec30611abdc12cd280094b6d264dc0860605c2de939f4954c4b2733a5bb4d1315db5ac606d52f08fcc285156aae4e3c099134cb8d13475ff538b5c836cf3"], 0x20}}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1fc000, 0x301000) poll(&(0x7f0000000040)=[{r0, 0x80}, {r1, 0x20}], 0x2, 0x5) socket$kcm(0x2, 0x0, 0x2) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x74af374f84ed5671}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x14\x00\x00\x00\xf7\x00', @broadcast}) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsu\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 03:37:42 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, 0x0, &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x76, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 675.541231] protocol 88fb is buggy, dev hsr_slave_0 [ 675.546400] protocol 88fb is buggy, dev hsr_slave_1 [ 675.551564] protocol 88fb is buggy, dev hsr_slave_0 [ 675.556652] protocol 88fb is buggy, dev hsr_slave_1 [ 675.561912] protocol 88fb is buggy, dev hsr_slave_0 [ 675.569945] protocol 88fb is buggy, dev hsr_slave_1 [ 675.575123] protocol 88fb is buggy, dev hsr_slave_0 [ 675.580233] protocol 88fb is buggy, dev hsr_slave_1 03:37:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6000000) [ 675.642058] device team0 entered promiscuous mode 03:37:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003504050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 675.666715] device team_slave_0 entered promiscuous mode [ 675.700323] device team_slave_1 entered promiscuous mode 03:37:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x7000000) 03:37:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x77, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:43 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, 0x0, &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003505050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cfc7"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20042800}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@rc, &(0x7f0000000200)=0x80) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x8000000) 03:37:43 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$VFIO_SET_IOMMU(r4, 0x3b66, 0x0) 03:37:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x78, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003506050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:43 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, 0x0, &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:43 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xa000000) 03:37:44 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xf000000) 03:37:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003507050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x79, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 676.701846] sp0: Synchronizing with TNC 03:37:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x21000000) [ 676.740677] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecated and it will removed soon, use xt_cluster instead 03:37:44 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$VFIO_SET_IOMMU(r4, 0x3b66, 0x0) 03:37:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x3f000000) 03:37:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cfc7"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20042800}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@rc, &(0x7f0000000200)=0x80) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000350a050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:44 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:44 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$VFIO_SET_IOMMU(r4, 0x3b66, 0x0) 03:37:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x48000000) 03:37:44 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) ioctl$VFIO_SET_IOMMU(r4, 0x3b66, 0x0) 03:37:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000350e050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7c, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:44 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', 0x0, 0x0, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:44 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) 03:37:44 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x4c000000) [ 677.652784] [U] è [ 677.876787] audit: type=1400 audit(2000000265.310:161): avc: denied { sys_ptrace } for pid=26768 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 03:37:45 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) 03:37:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000350f050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7d, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x0) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x64000000) 03:37:45 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) 03:37:45 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) 03:37:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x2, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x68000000) 03:37:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003548050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:45 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) [ 678.087886] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecated and it will removed soon, use xt_cluster instead 03:37:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x0) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:45 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f000086fff4)) getpid() gettid() 03:37:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x3, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000354c050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:45 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) 03:37:45 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6b6b6b00) 03:37:45 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f000086fff4)) getpid() 03:37:45 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x0) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:45 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) sendto$isdn(r4, &(0x7f0000000600)={0xae6, 0x7b, "9b20027331d17935ffb584bd41d20483f402c671fb70d2b5fcfc9acf915f70973f850910291a84f8bd2b4ea04a1811070f3bb6c8849d3a2ee8b3a495aef9ca1e622e39a70c7262962e6e432222ec8a3425dac49a2626cbd3950717c23296a4c3c6a670368b32"}, 0x6e, 0x40000, &(0x7f0000000200)={0x22, 0x20, 0x0, 0x3, 0x7}, 0x6) 03:37:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x4, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003560050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6c000000) 03:37:46 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1000000010, 0x80002, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000086fff4)) r7 = getpid() r8 = gettid() kcmp$KCMP_EPOLL_TFD(r7, r8, 0x7, r1, &(0x7f0000000000)={r6, r4}) 03:37:46 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f000086fff4)) getpid() 03:37:46 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003568050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x5, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x74000000) 03:37:46 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f000086fff4)) 03:37:46 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f000086fff4)) getpid() gettid() 03:37:46 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277daca"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:46 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) epoll_create1(0x0) 03:37:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x6, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000356c050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x7a000000) 03:37:46 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f000086fff4)) getpid() 03:37:46 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:46 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f000086fff4)) 03:37:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003574050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xa0008000) 03:37:46 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x5) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:46 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x7, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:46 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) epoll_create1(0x0) 03:37:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000357a050ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:46 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:46 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xa0010000) 03:37:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x8, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:47 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:47 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:47 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:47 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500060ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xbf000000) 03:37:47 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:47 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x9, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:47 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500090ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xc8000000) 03:37:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xb, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:47 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:47 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:47 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:47 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 680.211542] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:37:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xf6ffffff) 03:37:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xc, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500250ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:47 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:47 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 680.474413] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:37:47 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xfffffff6) 03:37:48 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x1000000010, 0x80002, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x10, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500520ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:48 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) fcntl$dupfd(r2, 0x0, r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:48 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x1a0ffffffff) 03:37:48 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x14, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500630ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:48 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 680.930668] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:37:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x1000000000000) 03:37:48 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x1000000010, 0x80002, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500040ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:48 executing program 4: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:48 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x9ea3, 0x0, @loopback}], 0x1c) 03:37:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6b6b6b00000000) 03:37:48 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x1000000010, 0x80002, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:48 executing program 4: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:48 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:48 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:37:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500060ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:48 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x8000a0ffffffff) 03:37:48 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:49 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:49 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 681.621255] net_ratelimit: 26 callbacks suppressed [ 681.621263] protocol 88fb is buggy, dev hsr_slave_0 [ 681.631412] protocol 88fb is buggy, dev hsr_slave_1 03:37:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x100000000000000) 03:37:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500080ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 681.781554] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:908 [ 681.790611] in_atomic(): 1, irqs_disabled(): 0, pid: 8208, name: syz-executor.0 [ 681.798170] 1 lock held by syz-executor.0/8208: [ 681.799266] protocol 88fb is buggy, dev hsr_slave_0 [ 681.802885] #0: 00000000ef7bf1b2 ((&sp->resync_t)){+.-.}, at: call_timer_fn+0xda/0x720 [ 681.808090] protocol 88fb is buggy, dev hsr_slave_1 [ 681.816235] Preemption disabled at: [ 681.816264] [] __wake_up_common_lock+0xc7/0x190 [ 681.821416] protocol 88fb is buggy, dev hsr_slave_0 [ 681.825033] CPU: 1 PID: 8208 Comm: syz-executor.0 Not tainted 4.19.91-syzkaller #0 [ 681.831358] protocol 88fb is buggy, dev hsr_slave_1 [ 681.836289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.844076] protocol 88fb is buggy, dev hsr_slave_0 [ 681.848973] Call Trace: [ 681.848982] [ 681.858392] protocol 88fb is buggy, dev hsr_slave_1 [ 681.863357] dump_stack+0x197/0x210 [ 681.863381] ? __wake_up_common_lock+0xc7/0x190 [ 681.866008] protocol 88fb is buggy, dev hsr_slave_0 [ 681.868088] ___might_sleep.cold+0x1bd/0x1f6 [ 681.873137] protocol 88fb is buggy, dev hsr_slave_1 [ 681.876695] ? tpk_write+0x5d/0x340 [ 681.899537] __might_sleep+0x95/0x190 [ 681.903368] __mutex_lock+0xc8/0x1300 [ 681.907193] ? tpk_write+0x5d/0x340 [ 681.910851] ? mutex_trylock+0x1e0/0x1e0 [ 681.914926] ? retint_kernel+0x2d/0x2d [ 681.918831] ? trace_hardirqs_on_caller+0x6a/0x220 [ 681.923785] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.928915] ? retint_kernel+0x2d/0x2d [ 681.932826] mutex_lock_nested+0x16/0x20 [ 681.936903] ? mutex_lock_nested+0x16/0x20 [ 681.941152] tpk_write+0x5d/0x340 [ 681.944626] resync_tnc+0x1b6/0x320 [ 681.948286] call_timer_fn+0x18d/0x720 [ 681.952198] ? sp_put+0x60/0x60 [ 681.955482] ? process_timeout+0x40/0x40 [ 681.959559] ? run_timer_softirq+0x644/0x16a0 [ 681.964073] ? trace_hardirqs_on+0x67/0x220 [ 681.968399] ? sp_put+0x60/0x60 [ 681.971693] run_timer_softirq+0x64f/0x16a0 [ 681.976035] ? add_timer+0xbe0/0xbe0 [ 681.979751] ? kvm_clock_read+0x18/0x30 [ 681.983736] ? check_preemption_disabled+0x48/0x290 [ 681.988768] ? sched_clock+0x2e/0x50 [ 681.992515] __do_softirq+0x25c/0x921 [ 681.996332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.001890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.007461] irq_exit+0x180/0x1d0 [ 682.010940] smp_apic_timer_interrupt+0x13b/0x550 [ 682.015808] apic_timer_interrupt+0xf/0x20 [ 682.020049] [ 682.022307] RIP: 0010:_raw_spin_unlock_irqrestore+0x95/0xe0 [ 682.028029] Code: 48 c7 c0 c8 5b f2 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d 7a 1e a6 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 5c d3 fc f9 65 8b 05 65 b0 b5 78 [ 682.046945] RSP: 0018:ffff88804805fad0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 682.054668] RAX: 1ffffffff11e4b79 RBX: 0000000000000282 RCX: 0000000000000000 [ 682.062051] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: 0000000000000282 [ 682.069332] RBP: ffff88804805fae0 R08: ffff888048054500 R09: 0000000000000000 03:37:49 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x2, @loopback}], 0x1c) 03:37:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x200000000000000) 03:37:49 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 682.076697] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880837b0880 [ 682.076709] R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000104 [ 682.091305] __wake_up_common_lock+0xfe/0x190 [ 682.095827] ? __wake_up_common+0x610/0x610 [ 682.100165] ? copyout+0xb5/0x100 [ 682.103632] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 682.103653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.103683] __wake_up_sync_key+0x19/0x20 [ 682.118388] pipe_read+0x73c/0x930 [ 682.121969] __vfs_read+0x584/0x800 [ 682.125623] ? vfs_copy_file_range+0xba0/0xba0 [ 682.130332] ? security_file_permission+0x89/0x230 [ 682.135279] ? rw_verify_area+0x118/0x360 [ 682.139448] vfs_read+0x194/0x3d0 [ 682.142929] ksys_read+0x14f/0x2d0 [ 682.146495] ? kernel_write+0x120/0x120 [ 682.150521] ? do_syscall_64+0x26/0x620 [ 682.154508] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.159888] ? do_syscall_64+0x26/0x620 [ 682.163892] __x64_sys_read+0x73/0xb0 [ 682.167708] do_syscall_64+0xfd/0x620 [ 682.171519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.176715] RIP: 0033:0x414430 [ 682.179924] Code: 01 f0 ff ff 0f 83 90 1b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 3d 40 66 00 00 75 14 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff [ 682.198924] RSP: 002b:00007ffdadd7c698 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 682.206654] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000414430 [ 682.213943] RDX: 0000000000000038 RSI: 0000000000758040 RDI: 00000000000000f9 [ 682.221240] RBP: 0000000000000804 R08: 0000000000006000 R09: 0000000000004000 03:37:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x300000000000000) [ 682.228555] R10: 00007ffdadd7c030 R11: 0000000000000246 R12: 0000000000000000 [ 682.235839] R13: 00007ffdadd7c6d0 R14: 00000000000a6645 R15: 00007ffdadd7c6e0 [ 682.243246] [ 682.244871] ================================ [ 682.249268] WARNING: inconsistent lock state [ 682.253678] 4.19.91-syzkaller #0 Tainted: G W [ 682.259471] -------------------------------- [ 682.263875] inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. [ 682.270020] syz-executor.0/8208 [HC0[0]:SC1[1]:HE1:SE0] takes: [ 682.270518] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env [ 682.275976] 00000000efb3cdc5 (&tpk_port.port_write_mutex){+.?.}, at: tpk_write+0x5d/0x340 [ 682.276002] {SOFTIRQ-ON-W} state was registered at: [ 682.276015] lock_acquire+0x16f/0x3f0 [ 682.276033] __mutex_lock+0xf7/0x1300 [ 682.304078] mutex_lock_nested+0x16/0x20 [ 682.308234] tpk_close+0x50/0x95 [ 682.311691] tty_release+0x3ba/0xe90 [ 682.313380] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 682.315498] __fput+0x2dd/0x8b0 [ 682.315510] ____fput+0x16/0x20 [ 682.315520] task_work_run+0x145/0x1c0 [ 682.315538] exit_to_usermode_loop+0x273/0x2c0 [ 682.340320] do_syscall_64+0x53d/0x620 [ 682.344303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.349579] irq event stamp: 5169976 [ 682.353308] hardirqs last enabled at (5169976): [] trace_hardirqs_on_thunk+0x1a/0x1c [ 682.362967] hardirqs last disabled at (5169975): [] trace_hardirqs_off_thunk+0x1a/0x1c [ 682.372597] softirqs last enabled at (5169840): [] release_sock+0x156/0x1c0 03:37:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3, @loopback}], 0x1c) 03:37:49 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 682.381379] softirqs last disabled at (5169903): [] irq_exit+0x180/0x1d0 [ 682.382699] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 682.390209] [ 682.390209] other info that might help us debug this: [ 682.404150] Possible unsafe locking scenario: [ 682.404150] [ 682.410236] CPU0 [ 682.412830] ---- [ 682.415418] lock(&tpk_port.port_write_mutex); [ 682.420085] [ 682.422834] lock(&tpk_port.port_write_mutex); [ 682.427697] [ 682.427697] *** DEADLOCK *** [ 682.427697] [ 682.431954] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 682.433759] 1 lock held by syz-executor.0/8208: [ 682.433762] #0: 00000000ef7bf1b2 ((&sp->resync_t)){+.-.}, at: call_timer_fn+0xda/0x720 [ 682.433796] [ 682.433796] stack backtrace: [ 682.460553] CPU: 1 PID: 8208 Comm: syz-executor.0 Tainted: G W 4.19.91-syzkaller #0 [ 682.463548] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env 03:37:49 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 682.470010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.470014] Call Trace: [ 682.470020] [ 682.470039] dump_stack+0x197/0x210 [ 682.470060] print_usage_bug.cold+0x330/0x42a [ 682.498917] ? save_stack_trace+0x1a/0x20 [ 682.503080] mark_lock+0xd1b/0x1370 [ 682.506717] ? check_usage_backwards+0x340/0x340 [ 682.506799] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 682.511475] __lock_acquire+0xc62/0x49c0 [ 682.511490] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 682.511503] ? lockdep_hardirqs_on+0x19b/0x5d0 03:37:50 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 682.511515] ? retint_kernel+0x2d/0x2d [ 682.511528] ? trace_hardirqs_on_caller+0x6a/0x220 [ 682.511547] ? mark_held_locks+0x100/0x100 [ 682.547472] ? debug_smp_processor_id+0x1c/0x20 [ 682.552151] ? perf_trace_lock_acquire+0xf5/0x580 [ 682.552726] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 682.556999] ? perf_trace_lock+0x510/0x510 [ 682.567647] ? arch_local_irq_restore+0x4e/0x56 [ 682.572335] lock_acquire+0x16f/0x3f0 [ 682.576141] ? tpk_write+0x5d/0x340 03:37:50 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 682.578824] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 682.579771] ? tpk_write+0x5d/0x340 [ 682.579785] __mutex_lock+0xf7/0x1300 [ 682.579801] ? tpk_write+0x5d/0x340 [ 682.600268] ? tpk_write+0x5d/0x340 [ 682.603910] ? mutex_trylock+0x1e0/0x1e0 [ 682.607975] ? retint_kernel+0x2d/0x2d [ 682.611876] ? trace_hardirqs_on_caller+0x6a/0x220 [ 682.616832] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 682.621601] ? retint_kernel+0x2d/0x2d [ 682.625506] mutex_lock_nested+0x16/0x20 [ 682.629573] ? mutex_lock_nested+0x16/0x20 [ 682.633815] tpk_write+0x5d/0x340 [ 682.637434] resync_tnc+0x1b6/0x320 [ 682.641074] call_timer_fn+0x18d/0x720 [ 682.644966] ? sp_put+0x60/0x60 [ 682.648252] ? process_timeout+0x40/0x40 [ 682.652324] ? run_timer_softirq+0x644/0x16a0 [ 682.656834] ? trace_hardirqs_on+0x67/0x220 [ 682.661189] ? sp_put+0x60/0x60 [ 682.662757] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 682.664500] run_timer_softirq+0x64f/0x16a0 [ 682.670916] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:37:50 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 682.675207] ? add_timer+0xbe0/0xbe0 [ 682.675219] ? kvm_clock_read+0x18/0x30 [ 682.675232] ? check_preemption_disabled+0x48/0x290 [ 682.675243] ? sched_clock+0x2e/0x50 [ 682.675264] __do_softirq+0x25c/0x921 [ 682.705874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.711427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.717507] irq_exit+0x180/0x1d0 [ 682.720974] smp_apic_timer_interrupt+0x13b/0x550 [ 682.725837] apic_timer_interrupt+0xf/0x20 [ 682.730069] [ 682.732315] RIP: 0010:_raw_spin_unlock_irqrestore+0x95/0xe0 [ 682.738029] Code: 48 c7 c0 c8 5b f2 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d 7a 1e a6 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 5c d3 fc f9 65 8b 05 65 b0 b5 78 [ 682.757399] RSP: 0018:ffff88804805fad0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 682.765115] RAX: 1ffffffff11e4b79 RBX: 0000000000000282 RCX: 0000000000000000 [ 682.767576] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 682.772386] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: 0000000000000282 [ 682.772393] RBP: ffff88804805fae0 R08: ffff888048054500 R09: 0000000000000000 [ 682.772399] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880837b0880 [ 682.772404] R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000104 [ 682.772438] __wake_up_common_lock+0xfe/0x190 [ 682.789013] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 682.793365] ? __wake_up_common+0x610/0x610 [ 682.793378] ? copyout+0xb5/0x100 [ 682.793392] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 682.793409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.841420] __wake_up_sync_key+0x19/0x20 [ 682.845586] pipe_read+0x73c/0x930 [ 682.849146] __vfs_read+0x584/0x800 [ 682.852781] ? vfs_copy_file_range+0xba0/0xba0 [ 682.857377] ? security_file_permission+0x89/0x230 [ 682.862313] ? rw_verify_area+0x118/0x360 [ 682.866556] vfs_read+0x194/0x3d0 [ 682.870025] ksys_read+0x14f/0x2d0 [ 682.870680] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 682.873577] ? kernel_write+0x120/0x120 [ 682.873592] ? do_syscall_64+0x26/0x620 [ 682.873610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.880040] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 682.883980] ? do_syscall_64+0x26/0x620 [ 682.883994] __x64_sys_read+0x73/0xb0 [ 682.884006] do_syscall_64+0xfd/0x620 [ 682.884023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.919443] RIP: 0033:0x414430 [ 682.922620] Code: 01 f0 ff ff 0f 83 90 1b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 3d 40 66 00 00 75 14 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff [ 682.941507] RSP: 002b:00007ffdadd7c698 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 682.949203] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000414430 [ 682.956599] RDX: 0000000000000038 RSI: 0000000000758040 RDI: 00000000000000f9 [ 682.963856] RBP: 0000000000000804 R08: 0000000000006000 R09: 0000000000004000 [ 682.971116] R10: 00007ffdadd7c030 R11: 0000000000000246 R12: 0000000000000000 [ 682.978646] R13: 00007ffdadd7c6d0 R14: 00000000000a6645 R15: 00007ffdadd7c6e0 [ 682.985995] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:908 [ 682.994618] in_atomic(): 1, irqs_disabled(): 0, pid: 8208, name: syz-executor.0 [ 683.002096] INFO: lockdep is turned off. [ 683.006189] Preemption disabled at: [ 683.006207] [] __wake_up_common_lock+0xc7/0x190 [ 683.016067] CPU: 1 PID: 8208 Comm: syz-executor.0 Tainted: G W 4.19.91-syzkaller #0 [ 683.025158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.034496] Call Trace: [ 683.037064] [ 683.039206] dump_stack+0x197/0x210 [ 683.042824] ? __wake_up_common_lock+0xc7/0x190 [ 683.047485] ___might_sleep.cold+0x1bd/0x1f6 [ 683.051882] ? tpk_write+0x5d/0x340 [ 683.055494] __might_sleep+0x95/0x190 [ 683.059279] __mutex_lock+0xc8/0x1300 [ 683.063088] ? tpk_write+0x5d/0x340 [ 683.066739] ? lock_downgrade+0x880/0x880 [ 683.070879] ? mutex_trylock+0x1e0/0x1e0 [ 683.074963] ? retint_kernel+0x2d/0x2d [ 683.078848] ? trace_hardirqs_on_caller+0x6a/0x220 [ 683.083767] ? kasan_check_write+0x14/0x20 [ 683.088420] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 683.093247] ? wait_for_completion+0x440/0x440 [ 683.097817] mutex_lock_nested+0x16/0x20 [ 683.101861] ? mutex_lock_nested+0x16/0x20 [ 683.106081] tpk_write+0x5d/0x340 [ 683.109520] resync_tnc+0x22e/0x320 [ 683.113140] call_timer_fn+0x18d/0x720 [ 683.117007] ? sp_put+0x60/0x60 [ 683.120276] ? process_timeout+0x40/0x40 [ 683.124328] ? run_timer_softirq+0x644/0x16a0 [ 683.128806] ? trace_hardirqs_on+0x67/0x220 [ 683.133108] ? sp_put+0x60/0x60 [ 683.136385] run_timer_softirq+0x64f/0x16a0 [ 683.140690] ? add_timer+0xbe0/0xbe0 [ 683.144397] ? kvm_clock_read+0x18/0x30 [ 683.148353] ? check_preemption_disabled+0x48/0x290 [ 683.153437] ? sched_clock+0x2e/0x50 [ 683.157148] __do_softirq+0x25c/0x921 [ 683.160939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.166470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.171994] irq_exit+0x180/0x1d0 [ 683.175441] smp_apic_timer_interrupt+0x13b/0x550 [ 683.180268] apic_timer_interrupt+0xf/0x20 [ 683.184492] [ 683.186723] RIP: 0010:_raw_spin_unlock_irqrestore+0x95/0xe0 [ 683.192434] Code: 48 c7 c0 c8 5b f2 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 39 48 83 3d 7a 1e a6 01 00 74 24 48 89 df 57 9d <0f> 1f 44 00 00 bf 01 00 00 00 e8 5c d3 fc f9 65 8b 05 65 b0 b5 78 [ 683.211318] RSP: 0018:ffff88804805fad0 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 683.219018] RAX: 1ffffffff11e4b79 RBX: 0000000000000282 RCX: 0000000000000000 [ 683.226288] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: 0000000000000282 [ 683.233543] RBP: ffff88804805fae0 R08: ffff888048054500 R09: 0000000000000000 [ 683.240805] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880837b0880 [ 683.248075] R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000104 [ 683.255362] __wake_up_common_lock+0xfe/0x190 [ 683.259841] ? __wake_up_common+0x610/0x610 [ 683.264145] ? copyout+0xb5/0x100 [ 683.267595] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 683.272594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.278113] __wake_up_sync_key+0x19/0x20 [ 683.282334] pipe_read+0x73c/0x930 [ 683.285866] __vfs_read+0x584/0x800 [ 683.289475] ? vfs_copy_file_range+0xba0/0xba0 [ 683.294053] ? security_file_permission+0x89/0x230 [ 683.298966] ? rw_verify_area+0x118/0x360 [ 683.303108] vfs_read+0x194/0x3d0 [ 683.306545] ksys_read+0x14f/0x2d0 [ 683.310082] ? kernel_write+0x120/0x120 [ 683.314053] ? do_syscall_64+0x26/0x620 [ 683.318014] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.323363] ? do_syscall_64+0x26/0x620 [ 683.327320] __x64_sys_read+0x73/0xb0 [ 683.331104] do_syscall_64+0xfd/0x620 [ 683.334898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.340072] RIP: 0033:0x414430 [ 683.343271] Code: 01 f0 ff ff 0f 83 90 1b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 3d 40 66 00 00 75 14 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff [ 683.362243] RSP: 002b:00007ffdadd7c698 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 683.369947] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000414430 [ 683.377201] RDX: 0000000000000038 RSI: 0000000000758040 RDI: 00000000000000f9 03:37:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500090ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 683.384551] RBP: 0000000000000804 R08: 0000000000006000 R09: 0000000000004000 [ 683.391801] R10: 00007ffdadd7c030 R11: 0000000000000246 R12: 0000000000000000 [ 683.399051] R13: 00007ffdadd7c6d0 R14: 00000000000a6645 R15: 00007ffdadd7c6e0 [ 683.429622] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 683.436220] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 683.448398] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 683.457125] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 683.480035] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:37:50 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:50 executing program 2: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:50 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x4, @loopback}], 0x1c) 03:37:50 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x400000000000000) 03:37:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500250ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 683.524175] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 683.530659] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:37:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500520ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:51 executing program 2: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 683.589409] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 683.593775] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 683.604726] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:37:51 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 683.640583] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 683.648093] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 683.659107] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 683.666005] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:37:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x500000000000000) [ 683.716189] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 683.722888] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:37:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500630ad25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:51 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:51 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb88810874433"], 0xa7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 683.768279] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env [ 683.805147] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 683.819256] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 683.825971] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:37:51 executing program 2: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x5, @loopback}], 0x1c) 03:37:51 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 683.869067] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 683.875710] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 683.897118] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env 03:37:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x600000000000000) [ 683.936373] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 683.946776] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 683.947523] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 683.964732] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 683.975079] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:37:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000035000503d25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 684.009103] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 684.016443] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 684.026625] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env [ 684.033458] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 684.047663] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 684.054284] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:37:51 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 684.134194] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 684.140729] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:37:51 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb88810874433"], 0xa7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x6, @loopback}], 0x1c) 03:37:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x700000000000000) 03:37:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000035000509d25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:51 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 03:37:51 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:51 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb88810874433"], 0xa7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 684.231839] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 684.254553] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:37:51 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 03:37:51 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x800000000000000) [ 684.325555] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 684.341471] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 684.358735] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:37:51 executing program 2: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:51 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, 0x0, 0x0) 03:37:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000035000510d25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 684.435268] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env [ 684.462214] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:37:51 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xfa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 684.507023] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 684.528150] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:37:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x7, @loopback}], 0x1c) 03:37:52 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x238, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x298) 03:37:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xa00000000000000) 03:37:52 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 684.561778] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 684.569712] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env 03:37:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000035000516d25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xfa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 684.608417] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:37:52 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x238, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x298) 03:37:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xf00000000000000) 03:37:52 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 684.652234] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 684.675966] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 684.696266] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:37:52 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x238, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x298) 03:37:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000035000525d25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:52 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 684.744403] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 684.751011] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 684.850023] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 684.888143] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:37:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x8, @loopback}], 0x1c) 03:37:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xfa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x2100000000000000) 03:37:52 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:52 executing program 2: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e00000035000552d25a80648c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 684.923773] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env [ 684.946987] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:37:52 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a800a8c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 684.998947] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 685.014719] cgroup: fork rejected by pids controller in /syz2 03:37:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x3f00000000000000) 03:37:52 executing program 2: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 685.055669] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 685.075525] [U] `è 03:37:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x124) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:52 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 685.123209] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 685.171884] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 685.203735] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 685.224098] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 685.250485] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env 03:37:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x9, @loopback}], 0x1c) 03:37:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x4800000000000000) 03:37:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80238c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x124) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:52 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:52 executing program 2: openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 685.273495] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 685.288839] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 685.308182] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:37:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x4c00000000000000) [ 685.345163] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 685.370689] validate_nla: 3 callbacks suppressed [ 685.370699] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 685.373620] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:37:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80258c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:52 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:52 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 685.416857] ipt_CLUSTERIP: Please specify destination IP 03:37:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x124) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:52 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6400000000000000) [ 685.502487] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 685.506086] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 685.509210] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 685.529496] ipt_CLUSTERIP: Please specify destination IP 03:37:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xa, @loopback}], 0x1c) 03:37:53 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0x0, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a802a8c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6800000000000000) [ 685.553533] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 685.570632] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:37:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x139) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 685.625156] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env [ 685.654155] ipt_CLUSTERIP: Please specify destination IP [ 685.661785] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:37:53 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:53 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a802b8c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:53 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 685.661949] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 685.682698] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 685.743390] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 685.778246] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env 03:37:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x6c00000000000000) [ 685.787433] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:37:53 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a802d8c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 685.828222] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 685.890436] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 685.909079] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 685.923190] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:37:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xe, @loopback}], 0x1c) 03:37:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x139) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:53 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:53 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x7400000000000000) [ 685.935683] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 685.943953] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 685.961884] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 685.978894] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:37:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a802e8c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 686.016428] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 686.032837] cgroup: fork rejected by pids controller in /syz4 [ 686.050162] ipt_CLUSTERIP: no config found for 224.0.0.1, need 'new' 03:37:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x139) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x7a00000000000000) 03:37:53 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 686.065650] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 686.099624] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 686.110109] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env 03:37:53 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 686.118974] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 686.148805] kobject: 'rx-0' (00000000b954cdbf): kobject_cleanup, parent 000000003e122d3b 03:37:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80308c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 686.168631] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 686.175489] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:37:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xbf00000000000000) [ 686.212935] kobject: 'rx-0' (00000000b954cdbf): auto cleanup 'remove' event [ 686.227826] ipt_CLUSTERIP: no config found for 224.0.0.1, need 'new' [ 686.242641] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 686.256712] kobject: 'rx-0' (00000000b954cdbf): kobject_uevent_env 03:37:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x10, @loopback}], 0x1c) 03:37:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x143) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 686.269337] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 686.279701] kobject: 'rx-0' (00000000b954cdbf): fill_kobj_path: path = '/devices/virtual/net/sp0/queues/rx-0' [ 686.290746] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 686.297485] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 686.306556] kobject: 'rx-0' (00000000b954cdbf): auto cleanup kobject_del 03:37:53 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a803c8c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 686.313959] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 686.324162] kobject: 'rx-0' (00000000b954cdbf): calling ktype release [ 686.351430] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 686.359083] kobject: 'rx-0': free name 03:37:53 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xc800000000000000) [ 686.366257] kobject: 'tx-0' (0000000076babb48): kobject_cleanup, parent 000000003e122d3b [ 686.375756] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 686.405054] kobject: 'tx-0' (0000000076babb48): auto cleanup 'remove' event [ 686.411882] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env 03:37:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x143) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 686.412511] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 686.422271] ipt_CLUSTERIP: no config found for 224.0.0.1, need 'new' [ 686.437149] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 686.461457] kobject: 'tx-0' (0000000076babb48): kobject_uevent_env 03:37:53 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 686.487566] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 686.490293] kobject: 'tx-0' (0000000076babb48): fill_kobj_path: path = '/devices/virtual/net/sp0/queues/tx-0' [ 686.525460] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:37:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80588c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 686.536487] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 686.546258] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 686.560179] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 686.579586] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 686.587550] kobject: 'tx-0' (0000000076babb48): auto cleanup kobject_del [ 686.597493] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 686.608001] kobject: 'tx-0' (0000000076babb48): calling ktype release [ 686.615324] kobject: 'tx-0': free name [ 686.619291] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 686.626114] kobject: 'queues' (000000003e122d3b): kobject_cleanup, parent (null) [ 686.626227] kobject: 'queues' (000000003e122d3b): calling ktype release [ 686.649616] kobject: 'queues' (000000003e122d3b): kset_release [ 686.656563] kobject: 'queues': free name [ 686.661514] kobject: 'sp0' (000000001d1dd33a): kobject_uevent_env [ 686.667924] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 686.684970] kobject: 'sp0' (000000001d1dd33a): fill_kobj_path: path = '/devices/virtual/net/sp0' [ 686.690484] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 686.700580] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 686.710506] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 686.716986] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 686.727246] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 686.733757] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 686.743834] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 686.744050] kobject: 'sp0' (000000001d1dd33a): kobject_cleanup, parent (null) [ 686.750266] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 686.760840] kobject: 'sp0' (000000001d1dd33a): calling ktype release [ 686.768995] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 686.776232] kobject: 'sp0': free name 03:37:54 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xf6ffffff00000000) 03:37:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x18, @loopback}], 0x1c) 03:37:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80638c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x143) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:54 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 686.781307] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 686.795126] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 686.802507] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 686.833785] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 686.852723] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 686.857847] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:37:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xffffffffa0008000) [ 686.913470] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 686.920640] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:37:54 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x148) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80688c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x60, @loopback}], 0x1c) 03:37:54 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 686.988833] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 687.016702] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:37:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0xffffffffa0010000) 03:37:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80698c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 687.064072] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 687.097289] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:37:54 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 687.168086] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env 03:37:54 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 687.209755] kobject: 'sp0' (00000000f507f974): kobject_add_internal: parent: 'net', set: 'devices' [ 687.210783] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 687.237759] kobject: 'sp0' (00000000f507f974): kobject_uevent_env 03:37:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x61, @loopback}], 0x1c) 03:37:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x148) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a806c8c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 687.251492] kobject: 'sp0' (00000000f507f974): fill_kobj_path: path = '/devices/virtual/net/sp0' [ 687.274703] kobject: 'queues' (000000006d2eabae): kobject_add_internal: parent: 'sp0', set: '' 03:37:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, &(0x7f0000000040)={0x401, "0805129bec5204c7a6cd6f05468e25997755295bfec74cec7a2be44fd39247e8", 0x1, 0x1}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/\xe2trfs-Nontrol\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:37:54 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 687.305838] kobject: 'queues' (000000006d2eabae): kobject_uevent_env [ 687.315270] kobject: 'queues' (000000006d2eabae): kobject_uevent_env: filter function caused the event to drop! [ 687.328418] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 687.335013] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 687.344699] kobject: 'rx-0' (000000000fdef303): kobject_add_internal: parent: 'queues', set: 'queues' 03:37:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a806f8c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 687.384920] kobject: 'rx-0' (000000000fdef303): kobject_uevent_env [ 687.391619] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 687.408319] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 687.417851] kobject: 'rx-0' (000000000fdef303): fill_kobj_path: path = '/devices/virtual/net/sp0/queues/rx-0' 03:37:54 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8c000) 03:37:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x148) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 687.454428] kobject: 'tx-0' (00000000d4c9bddf): kobject_add_internal: parent: 'queues', set: 'queues' [ 687.467694] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 687.474364] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 687.485099] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 687.492669] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:37:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x78, @loopback}], 0x1c) [ 687.514321] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 687.522683] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 687.540640] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 687.546935] kobject: 'tx-0' (00000000d4c9bddf): kobject_uevent_env [ 687.547228] net_ratelimit: 24 callbacks suppressed [ 687.547235] protocol 88fb is buggy, dev hsr_slave_0 03:37:55 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 687.563464] protocol 88fb is buggy, dev hsr_slave_1 [ 687.590885] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 687.595111] kobject: 'tx-0' (00000000d4c9bddf): fill_kobj_path: path = '/devices/virtual/net/sp0/queues/tx-0' [ 687.614317] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 687.622843] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 687.634663] kobject: 'loop5' (0000000013227b33): kobject_uevent_env [ 687.642804] kobject: 'loop5' (0000000013227b33): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 687.653076] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 687.659671] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 687.676318] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 687.683700] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 687.693925] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 687.703624] sp0: Synchronizing with TNC [ 687.704027] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 687.733163] [U] è [ 687.734415] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env 03:37:55 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80708c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:55 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x14b) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') pread64(r0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x1, 0x0, 0x12, 0x16, "02cb456e6560ef352be3be71c73f2ec0029c395078e74ed917bc184ae6b652c8231716362bfbc4f05e5ab7500a0a575b4c19f2c714b8e75f456d52814a731f51", "772c5ec3f7e5f91593e93dea6a4a1ea3a2d2921b5fd938badb5544caf4ab0068", [0x9, 0x3]}) r1 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) 03:37:55 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) [ 687.750897] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 687.775657] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env 03:37:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfc, @loopback}], 0x1c) [ 687.807285] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:37:55 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setxattr$smack_xattr_label(0x0, &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000180)={'mime_typej:'}, 0xc, 0x3) write$cgroup_subtree(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00000000000000000000c6c4d7b2f84d5e6d1cdb9cba17c7a911a24a86975891a8e44b04f2841201b181dad516b7be8c911c03d11ae223f36ff35addbd81dc2790716d3494697e4021dfa00252a36b453e5aab70151e0b5c7d8058af1f54198c9f2a9f4a8748aa7a26e62252c7a8c9dc8a6a32e7c90f04cff65fcdcfe19257279f6a73a583263cb5d33dccd3423a15e257beff195e305277"], 0x14b) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:37:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80738c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:55 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x2800) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) sendto$isdn(r1, &(0x7f00000000c0)={0xfff, 0x6, "13dd9b034735a97bf1167638c89277fbdc6b9a371a8f2f2731839b18cafcd397eb029fcffe5d6330c8f3d5662f0b75ce3f31d6ae58ace62e24364d094b33a6c5acc55665d0dd2355a21e2bc5d62662e81a0e5714967908f81b92506ed56d79171eb9b85843c4d053c2e2469f216b3ba61b232dddf441872fa70496e59a8fec79b4c5ca2189611118d4b42286658d3f058ba4ace96f880730c6e40d671681699e1a3a99cbfd"}, 0xad, 0x8040, &(0x7f0000000040)={0x22, 0x1b, 0x4, 0x80, 0x8}, 0x6) [ 687.861215] protocol 88fb is buggy, dev hsr_slave_0 [ 687.861258] protocol 88fb is buggy, dev hsr_slave_1 [ 687.878133] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 687.878162] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 687.884981] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 687.885011] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 687.885424] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env [ 687.885452] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 687.887035] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 687.887064] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 687.887522] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 687.887550] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 687.887950] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 687.887975] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 687.916745] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env [ 687.916777] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 687.917131] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 687.917266] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 687.917673] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 687.917701] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 687.918041] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env [ 687.918068] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 687.918497] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 687.918525] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 687.918874] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 687.918901] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 687.919236] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env 03:37:55 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:55 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0xae36cece9d42946a) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'port0\x00', 0xef, 0xa120b}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) [ 687.919263] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 687.919737] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 687.919767] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 687.920132] kobject: 'loop3' (000000007f6e693b): kobject_uevent_env [ 687.920159] kobject: 'loop3' (000000007f6e693b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 687.920619] kobject: 'loop4' (0000000081c5bfdf): kobject_uevent_env [ 687.920648] kobject: 'loop4' (0000000081c5bfdf): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 687.925101] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env [ 688.031218] protocol 88fb is buggy, dev hsr_slave_0 [ 688.060017] kobject: 'loop0' (00000000b3dbd29f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 688.067518] protocol 88fb is buggy, dev hsr_slave_1 [ 688.074863] kobject: 'loop1' (00000000dbf11b66): kobject_uevent_env [ 688.083497] protocol 88fb is buggy, dev hsr_slave_0 03:37:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80758c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80788c6356c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 688.090027] kobject: 'loop1' (00000000dbf11b66): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 688.099644] protocol 88fb is buggy, dev hsr_slave_1 [ 688.107184] kobject: 'loop2' (00000000cbe23f87): kobject_uevent_env [ 688.115656] protocol 88fb is buggy, dev hsr_slave_0 [ 688.135705] kobject: 'loop2' (00000000cbe23f87): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 688.137931] protocol 88fb is buggy, dev hsr_slave_1 [ 688.157816] kobject: 'loop0' (00000000b3dbd29f): kobject_uevent_env 03:37:55 executing program 4: clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x12c, @loopback}], 0x1c) 03:37:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000003500050ad25a80648c0a56c10224fc0010000b400a000400090082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) 03:37:55 executing program 2: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) epoll_create1(0x0) socket$inet_udp(0x2, 0x2, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00\x00\x00\x00\x00\x01\xc0\x00\x05\x00', 0x2, 0x3, 0x260, 0xd0, 0xd0, 0x0, 0xd0, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x1c8, 0x3, 0x0, {[{{@ip={@local, @multicast1, 0x0, 0xffffffff, 'veth1_to_team\x00', 'veth1_to_bond\x00', {0x7f}}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x53, 0x0, 0x38], 0x0, 0x4}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, '\xff\xff\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x02\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a]}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2c0) 03:37:55 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$