&(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2402) 20:00:24 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:24 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000000)='./file0\x00') 20:00:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xbb8) 20:00:24 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400a8aaaafffeaa", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:24 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) ioctl$UI_DEV_CREATE(r0, 0x5501) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:24 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:24 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x2040000000000c0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc020000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00022dbd702511000000140009000800010001000000080002000300"/39], 0x28}, 0x1, 0x0, 0x0, 0x4005}, 0x8000) write$P9_RREADDIR(r0, &(0x7f0000000080)={0x49, 0x29, 0x1, {0xec3, [{{0x80, 0x4, 0x5}, 0x8001, 0x100, 0x7, './file0'}, {{0x1a, 0x4, 0x2}, 0x9, 0x4, 0x7, './file0'}]}}, 0x49) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r2, 0x40049409, r0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x2d, 0x7, 0x8000}, 0x4) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) uselib(&(0x7f0000000300)='./file0\x00') 20:00:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xe00) 20:00:25 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:25 executing program 2: r0 = creat(&(0x7f00000000c0)='\x00', 0x200400000000040) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0xfffffffffffffff2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x7, {0x2}}, 0x100000160) uselib(&(0x7f0000000300)='./file0\x00') 20:00:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000ffff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:25 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000086400000000000017c89a29d346d637098d7bd672525b0706866cad9eee1f31432d82"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:25 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) uselib(&(0x7f0000000300)='./file0\x00') write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1, 0x5, 0x100000001, 0x81, 0x2, 0x3, 0x7, 0x199, 0x40, 0x32e, 0x7fffffff, 0xff, 0x38, 0x2, 0x7, 0x4, 0x1}, [{0x70000007, 0x2, 0x5a2, 0x3, 0xff, 0x1, 0x80, 0x3}], "051087b474bee5266d956ea98471ba55d4da78dfc73aef3e5a762c71de32dd92"}, 0x98) 20:00:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x1100) 20:00:25 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:25 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x46) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000000)=0x400, 0x4) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000040)=0x4008, 0x4) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:25 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000000)={0xf, {0x1, 0x4, 0xfffffffffffffff9, 0x4}, {0x100000000, 0x8, 0x8, 0x400}, {0x0, 0x48}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x1c00) 20:00:25 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000007fff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:25 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000000000009cc160928d41b74cb936df3c0010b49abeb498ce37d22abf74e8c350165c6221ff236af15ce37785c7b7eafeed104f1c8c3ce930746df9bd850aa37d7939e55371e3e9a25e10342e7d3c46d9602f74e779c6a5fd53c8622e7b0790ee27d019f8cda456f52801dc129d9d62bf24985c13c331c087bb3b6b6783946125c89623424e70c2240bb673a96c7edfc6280145c661b45feac66eb16d198b482537aa718b8df78a83c1b5b8c00915faabfbd4cdc11eeda2b4aeadcd9bbe77ed9082deffbf031b10396ab8a1a92687e0c6c48961d32e4da151561eeaeb53eb4cd4544958cc4eaa1cc50d5cc4cd80134eeff8ac4a86f7ba3bd958e0038413311e0a0eb572f5ff40fda56956787403e64ce3b50104b0a6ce379aa1b3532b9c1694c1af7f985bc1f5d3d96b61dd2fa9ede14ed36b1615a3e8b93908f6ab9b3554411fe71e6853f630e39e39233c63176ddd7969336488156b0fd2e662c2f1e6cc904d90e4ee772f4172cd8f5fc6ae434c2d012fb32d0e3a9a0cd1e59f06404060"], 0xa) r1 = dup2(r0, r0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x48000, 0x8) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:25 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x2000) 20:00:25 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000ffff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:25 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:25 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0xfffffffffffffffc, 0x0, 0x7f, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x16, 0x1, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x3f00) 20:00:25 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000000)=0x24800, 0x4) socket$isdn_base(0x22, 0x3, 0x0) 20:00:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000200000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:25 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x5) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:25 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000000)='./file0\x00') 20:00:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x4000) 20:00:25 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:25 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x5b22, 0x7, 0x7, 0x0, 0x0, 0x0, 0x80, 0x0, 0x8000, 0x3ff, 0x5, 0x2, 0x0, 0x3f, 0x0, 0x81, 0x8000, 0x24, 0x7f, 0x0, 0x2, 0xfffffffffffffffa, 0x4, 0x8, 0x3, 0x5, 0x1, 0x401, 0x7fffffff, 0x101, 0xfffffffffffffffc, 0x80000001, 0x100000000, 0xc68, 0x10000, 0x20, 0x0, 0x7259, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x440, 0x8001, 0x4, 0x2, 0x3, 0x95, 0xe5df}, r1, 0x0, r0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') socket$inet6_sctp(0xa, 0x5, 0x84) 20:00:26 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000300000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:26 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x5) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x10) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000080)={0x5, [0x0, 0x79b, 0x80000001, 0x5, 0x8, 0x0, 0x87d, 0x7, 0x7ff, 0x8, 0x8, 0x5, 0x5, 0xe3, 0x1, 0x2, 0x8, 0x800, 0x401, 0x20, 0x8000, 0x7, 0x4, 0x3f, 0x2, 0x400000, 0xfffffffffffffffc, 0x5, 0x9ca, 0x2, 0x38, 0x5, 0x6, 0xffffffff, 0x2, 0x9, 0xc52, 0x7, 0x28, 0x6e0, 0x7f, 0x9, 0x1, 0x5, 0xffffffffffffff8a, 0x8, 0x6, 0x43fbe2aa], 0x7}) 20:00:26 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="23216413fd37f3a743654cae762724dcf7fec49536e84a3366b9e88d3bda8e63955145a158492739946bcd8f55f2b8e46df4136ed1e824100551e9f6f416ed20f5440400"/80], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000080)={0x90002011}) setsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000000)=0x5, 0x4) 20:00:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xb80b) 20:00:26 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x20000000000003f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:26 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000400000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:26 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="2333f32d502094df7c4f808705370440a580135aad986b1697aabd046702802777992a387b3717a0cbdb02fac30000e2d1906d212aca6fca6f03d97da81850924f563c592c77a68d33ccab353c6ee830a6f2f287ad1e9a92769e6983fde826bb27c5980a9386bcf4d6441cae1f6a7dee83660f5dcb3b59c30e8a331d52ca6d527c9d206a0900fce1c9276860d8936519f2261b38808aa3cca89af7323e3fece77a68122f0b3e55b6b6c59dd0632a526a862b1487b03f37e3eed31eb87ba49c1a399f7caad1e429260bee64c15ec250f0b66f4f2bc2f58c56cb92144711ddb605dcdf96db00000000003be966aeb4d8de2639c85b3b2db75cf070091c281f137a46aff057abad"], 0xa) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:26 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:26 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) getsockopt$netlink(r1, 0x10e, 0x6, &(0x7f0000000180)=""/116, &(0x7f0000000200)=0x74) ppoll(&(0x7f0000000080)=[{r0, 0x1}, {r1, 0x8}, {r1, 0x40}, {r0, 0x8000}, {r1, 0x8000}, {r0, 0x82}], 0x6, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000140)={0x40}, 0x8) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000240)) 20:00:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xe803) 20:00:26 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x1, 0x4) 20:00:26 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000500000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:26 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:26 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') uselib(&(0x7f0000000300)='./file0\x00') uselib(&(0x7f0000000080)='./file1\x00') 20:00:26 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:26 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000600000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:26 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="2333f32d502094df7c4f808705370440a580135aad986b1697aabd046702802777992a387b3717a0cbdb02fac30000e2d1906d212aca6fca6f03d97da81850924f563c592c77a68d33ccab353c6ee830a6f2f287ad1e9a92769e6983fde826bb27c5980a9386bcf4d6441cae1f6a7dee83660f5dcb3b59c30e8a331d52ca6d527c9d206a0900fce1c9276860d8936519f2261b38808aa3cca89af7323e3fece77a68122f0b3e55b6b6c59dd0632a526a862b1487b03f37e3eed31eb87ba49c1a399f7caad1e429260bee64c15ec250f0b66f4f2bc2f58c56cb92144711ddb605dcdf96db00000000003be966aeb4d8de2639c85b3b2db75cf070091c281f137a46aff057abad"], 0xa) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:26 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in=@empty, @in6}}, {{@in6=@empty}}}, &(0x7f0000000080)=0xe8) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xf401) 20:00:26 executing program 1: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:26 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400480, 0x0) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000040)) creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:26 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000700000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:26 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:26 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [{0x20, 'cpusetuser'}, {0x20, '\x00'}, {}, {0x20, '\x00'}], 0xa, "cf05f45f2906720c9496df9225c41a3fa0780fe037aedf186266482a970d13c98afc36fdfdfe991a08fbb1203810503acb312e44b5dd7e531f622df91a0eea4577dc91529d617dc377ac389120a17f00f2625462d3ae359decd77096b952a65b4244ba78c48f6c3a5bd3680a2f6a9bc04bca22638f714c63ee0d2da8b081ec756f7f1af047b4309c2d2cde1fa68a729d5406664ac591292c85a8cd4636e29b6ed7302e6407dc1d395fe95173104723d365143b61915ff9779a0ab035611a65c393ac8454e5636855ac2a4ee4a4"}, 0xe8) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000080)=0xba4b) 20:00:26 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x34000) 20:00:26 executing program 1: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="2333f32d502094df7c4f808705370440a580135aad986b1697aabd046702802777992a387b3717a0cbdb02fac30000e2d1906d212aca6fca6f03d97da81850924f563c592c77a68d33ccab353c6ee830a6f2f287ad1e9a92769e6983fde826bb27c5980a9386bcf4d6441cae1f6a7dee83660f5dcb3b59c30e8a331d52ca6d527c9d206a0900fce1c9276860d8936519f2261b38808aa3cca89af7323e3fece77a68122f0b3e55b6b6c59dd0632a526a862b1487b03f37e3eed31eb87ba49c1a399f7caad1e429260bee64c15ec250f0b66f4f2bc2f58c56cb92144711ddb605dcdf96db00000000003be966aeb4d8de2639c85b3b2db75cf070091c281f137a46aff057abad"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:26 executing program 2: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) sched_setattr(r0, &(0x7f0000000000)={0x30, 0x0, 0x0, 0x6, 0x1, 0x9, 0x5, 0x7}, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x10) r1 = open$dir(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mkdirat(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r3, &(0x7f0000000080), 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000180)={r4, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0x100000000, 0xfffffffffffffff7, 0x7, 0x0, 0x5, 0x74, 0xfffffffffffffff9, 0x400, 0x1, 0x0, 0x6, 0x8, 0xfff, 0x100000000, 0xc63c]}, &(0x7f0000000280)=0x100) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x0) ioctl$GIO_SCRNMAP(r3, 0x4b40, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x406, r5) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000440)=@fragment, 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) memfd_create(&(0x7f0000000600)='\x00', 0xffffffffffffffff) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r3, 0x0) ftruncate(r6, 0x7fff) creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) 20:00:26 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000800000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:26 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fdinfo\x00') mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0x0) recvfrom$unix(r0, &(0x7f0000000000)=""/96, 0x60, 0x2001, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e) uselib(&(0x7f0000000140)='./file0\x00') ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000100)={'veth1\x00', 0xffffffff}) 20:00:26 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = socket$inet6(0xa, 0xf, 0x100000001) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000200)={'hwsim0\x00', &(0x7f0000000140)=@ethtool_rxnfc={0x30, 0x0, 0x8, {0xf, @usr_ip4_spec={@rand_addr=0x859b1fa, @remote, 0x713492cf, 0x1000, 0x1, 0x14000000}, {0x0, @local, 0x6, 0x56, [0x8, 0x1]}, @udp_ip4_spec={@local, @loopback, 0x4e22, 0x4e20, 0x6}, {0x0, @link_local, 0x64f, 0x0, [0x3, 0x2]}, 0x0, 0x1}, 0x1, [0x6]}}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) r2 = dup2(r0, r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b22743a6a59413680f05b748212533585bc0df8a864ef6e494fc5f91d8a90eb5ad97", @ANYRES16=r3, @ANYBLOB="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"], 0x1d0}, 0x1, 0x0, 0x0, 0x1}, 0x40084) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:26 executing program 1: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x40000) [ 735.725738][T14666] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 20:00:27 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x5, &(0x7f0000000040)) uselib(&(0x7f0000000000)='./file0\x00') 20:00:27 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000900000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:27 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x400300) 20:00:27 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9e0, 0x400) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r1 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="23210700cf3326f741da2e00000000000059ab5446fd48a602b88bedfd858c5c16b6f409b427504f6abb11e83dfb30c9afb9d9722a1e573740c43b5b081f4450a3b1bcb33db6204ba71a1c9c715437e475b3d2399244ed46951fd050ed965704fffb05ade4afaf08945b6965f77d6c"], 0xa) r2 = dup2(r1, r1) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040), 0x8) arch_prctl$ARCH_GET_CPUID(0x1011) inotify_init1(0x80000) 20:00:27 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x1000000) 20:00:27 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) keyctl$set_reqkey_keyring(0xe, 0x3) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x401, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e21, 0xfff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3e}, {0xa, 0x4e24, 0x200, @dev={0xfe, 0x80, [], 0x27}, 0xd6}, 0x6, [0x4, 0x9, 0x7fff, 0x40f7909, 0x3, 0x1, 0x87, 0x5]}, 0x5c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000180)={0x7a70, 0x6, 0x40, 0x2, 0x2}) dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:27 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) prctl$PR_SET_TSC(0x1a, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)) 20:00:27 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:27 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = dup2(r0, r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') r3 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r1, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x10000, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x10000000000000}, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0x80000000, 0x0, 0x8}, &(0x7f0000000100)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x6e2a}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r3, r2, 0x0, 0x9, &(0x7f0000000000)='eth0]&)<\x00', r4}, 0x30) 20:00:27 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000a00000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:27 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23258808000000000000"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x2000000) 20:00:27 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400001000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:27 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:00:27 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:27 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:27 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r2 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) lchown(&(0x7f0000000080)='./file0\x00', r2, r3) 20:00:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x4000000) 20:00:27 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400001100000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:27 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x20) clock_gettime(0x7, &(0x7f00000007c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc2c45512, &(0x7f0000000480)={{0x2, 0x6, 0x1, 0x80000001, 'syz1\x00', 0x2fb6}, 0x0, [0x8, 0x100000001, 0x79, 0xf6ca, 0xf000000000000000, 0x7ff, 0x6, 0x8001, 0x7, 0x7, 0x1f5b711f, 0x2, 0x22, 0x0, 0x7, 0x8, 0x8, 0x8, 0x3ab, 0x8, 0xcd3, 0x80, 0xffffffff7fffffff, 0x3b71424f, 0x39, 0x7ff, 0x9, 0x4, 0xfffffffffffffff8, 0x5f, 0x6, 0x2, 0x4000000000000000, 0x3f, 0x6, 0xa621, 0x401, 0x7, 0x80000000, 0x9, 0x2, 0x100000001, 0x25, 0x1, 0x3, 0x2c, 0x9, 0x7, 0x80000001, 0x2bab092d, 0x6, 0x3, 0x5, 0x8001, 0x1000, 0xfffffffffffffff9, 0x800, 0x2, 0x0, 0x1, 0x40e, 0xfff, 0x30, 0x2, 0x10001, 0x0, 0x3, 0x8001, 0x0, 0x9, 0x5, 0x40, 0x5, 0x2, 0x2, 0x7ff, 0x7fff, 0x8, 0x100000001, 0xffff, 0x1, 0x7, 0xffff, 0x0, 0xffffffff, 0x1, 0x3, 0x5, 0x15, 0x80, 0x3, 0x7f, 0x6, 0x825, 0x7a, 0x6, 0x423969d6, 0x1, 0xfff, 0x100, 0x7, 0x401, 0x52e3, 0x0, 0x7fff, 0x1, 0x2, 0x7ff, 0x9, 0x4, 0x2, 0x1, 0x5, 0x40, 0x0, 0x7ff, 0x3, 0x5, 0x10001, 0x7, 0x401, 0x3, 0x7, 0x7ff, 0x8, 0x6, 0x8001, 0x100000000000], {r1, r2+30000000}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x48, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x100000000, @ipv4={[], [], @multicast1}, 0x4}, @in6={0xa, 0x4e20, 0x10001, @ipv4={[], [], @local}, 0x28d}]}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={r3, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f00000002c0)=0x84) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0186415, &(0x7f0000000280)={&(0x7f0000ffd000/0x1000)=nil, 0x5, 0x5, 0x5, &(0x7f0000ff1000/0xf000)=nil, 0xb9}) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000240)=r3, 0x4) uselib(&(0x7f0000000300)='./file0\x00') ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80785659, &(0x7f0000000040)={0x0, @data}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x280000, 0x40) 20:00:27 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000000)='./file0\x00') 20:00:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x7000000) 20:00:27 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x8, 0x840) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000180)="5d0d3ca1a822b538f6192ae6302492b17807bea0b79bdba62367b73f170e6b7b37f9cbecf3d3533ae26f8cf77b39198e7604e108e7273cb7ebbbde64fd", 0x3d) socket$kcm(0x29, 0x2, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ce\x00'}, 0x58) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9053449fdb45def594da845e502000"/26], 0xa) r2 = socket$unix(0x1, 0x5, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000100)=0xc) r3 = dup2(r0, r0) io_uring_setup(0x248, &(0x7f00000001c0)={0x0, 0x0, 0x5, 0x2, 0x208}) execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:27 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, 0x0, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:28 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400002300000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:28 executing program 4: rmdir(&(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x21, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000040)='./file0\x00') 20:00:28 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r1, 0x9}}, 0x18) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x4}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000100)='./file0\x00') 20:00:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x9000000) 20:00:28 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = dup(r0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000000)={0x1ff, 0x8001}) r2 = dup2(r0, r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:28 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000aa00000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:28 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, 0x0, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:28 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(r0, 0x0, 0x3d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000000)={0x70}) clock_adjtime(0x7, &(0x7f00000000c0)={0x6, 0x2, 0x1, 0x5, 0xffffffffffffff29, 0x9c8, 0x9, 0x1f, 0x1ff, 0x7, 0x4, 0x6, 0x9, 0x9, 0x0, 0x3, 0x0, 0x0, 0x6726, 0x2, 0x7fffffff, 0xa74, 0x85, 0x6, 0x80, 0x8001}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x2, @mcast2, 0x9}, @in6={0xa, 0x4e24, 0x0, @remote, 0x72}, @in6={0xa, 0x4e22, 0x2, @remote, 0xa251}, @in6={0xa, 0x4e20, 0x87, @dev={0xfe, 0x80, [], 0x1a}, 0x2}], 0x70) uselib(&(0x7f0000000300)='./file0\x00') 20:00:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40802, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x6, 0x30}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x1, 0xfffffffffffff800, 0x9}, 0x10) creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:28 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000003000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xa000000) 20:00:28 executing program 2: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) chown(&(0x7f0000000040)='./file0\x00', r1, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000280)) uselib(&(0x7f0000000300)='./file0\x00') openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) ptrace$peek(0x2, r3, &(0x7f00000000c0)) 20:00:28 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040), 0x1) creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000080)="54f109edd0ebbec2bc390cb012883949bcb4fc34fa0f15071f3f99cd52f3c0ec40f473291baff5ac88b2fc4337faabad011eca775520d3a66a9f4d0cde89288d871d69cf2e5698c180a5b82876dfaa2919eaf342d62357205709b6e3e30d55ac0a4edf233a975941a34613698f89966191c40191dec44f18f6101251d77f9e2665d2c2f91e94dadfc67b36da8f8c055756313c94287a625a4d54f4c13eb8f2d47e17259c3a95018fae9c95e2", 0xac) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:28 executing program 3: lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:28 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, 0x0, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:28 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000005000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:28 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8100, 0x0) creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xe000000) 20:00:28 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000040)='/dev/null\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r1, 0xfffffede) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) 20:00:28 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0], 0x363) r1 = dup2(r0, r0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffffd}, @in={0x2, 0x4e24, @broadcast}], 0x3c) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:28 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000006000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:28 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$int_out(r1, 0x5462, &(0x7f0000000080)) 20:00:28 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000000)=0x7fff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) uselib(&(0x7f0000000300)='./file0\x00') 20:00:28 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='sysv\x00', 0x20000, &(0x7f00000000c0)='\xb0}$\x00') 20:00:28 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:29 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000007000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x11000000) 20:00:29 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="232164133c68c5673c08"], 0xa) r1 = dup2(r0, r0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000080)=0x6) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:29 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x20, 0x0, 0x1}, &(0x7f0000000180)=0x18) delete_module(&(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', 0x800) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="1f00af006dfbf3e66c7d2643aa025662829a3d7b1386c25a30f1f25ac76b0708aa0f4205f5908d76f10db98c868928b02598e976a5e99271231e544779f037a0cf9f8acd9eb19b0406fcac9c4b114413c271cdeeb22bd6919c08bbd45de5389e600429a90b1e7803a8ef585182e1a912a8fcc71f51d5c9eea58ee65e346fa7bb29ea7cbb5133d33b82e957be8d8e7ec28e87ad08caa6a03c40bc9ca9e49c1ff83626f2c787d5a87d936028d84573aff090bf94"], 0xb7) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) prctl$PR_GET_THP_DISABLE(0x2a) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000480)="7f288eb3b566ec6901960348ec1d2a1210678c314e356b26abe28a408f0ec0b1f8a8109706ce1499fb27f06f078d53fc9d50603499570da441a5d4d4d5552a086d99817bf128fdcc0a3bed07540e879d8943e5382aaceffb731fb77e5084b00da8feade04cd14668dc64c8052ff8feeff9d63b658f1f8f5c395fac63f041d973267f878914eb96a5519928f2139ee38e2d4311be34323a55a0ac77621e569e77422e99ca0c4c2dc6c3af8b9b0ec1e20e23ee7b18cf9d67d414c543467fbe96379edab00737fd84b323ffc1c58801e76b938a76642f4c", 0xd6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x85, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104}, r1, 0x0, 0xffffffffffffffff, 0x8) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) uselib(&(0x7f0000000300)='./file0\x00') 20:00:29 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000}, 0x4840}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) uselib(&(0x7f0000000300)='./file0\x00') 20:00:29 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000009000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:29 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:29 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000a000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x1c000000) 20:00:29 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)={0x6, 0x1, 0x0, 0x8d11, 0x3}) getsockopt$inet6_tcp_buf(r0, 0x6, 0x3f, &(0x7f0000000040)=""/187, &(0x7f0000000100)=0xbb) r2 = request_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='#\'^\x00', 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000200)={r2, 0x7e0, 0x1000}, &(0x7f0000000240)=ANY=[@ANYBLOB="656e653d706b63733120686173683d736861333834000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002358e1a63ff056e600000000"], &(0x7f0000000340)="c7c8d0e24b30688d1c34ef02575c1504be5cc330a7605a53dbfcd92b812913360022df6b6c1f1ae668e58211f677dbbfe9b29b0a6419da4ef51cf440b5949e1d83a114d49ce6cf97475de360ee8a231c4bb1c7c295977513ba43ecfd664e7c2a4da9c6f7", &(0x7f0000000480)=""/139) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 20:00:29 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') fanotify_mark(r0, 0x0, 0x2, r0, &(0x7f0000000000)='./file0\x00') 20:00:29 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x10000) ioctl$VIDIOC_S_EDID(r1, 0xc0245629, &(0x7f0000000140)={0x0, 0x9, 0x2, [], &(0x7f0000000100)=0xffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f00000001c0)="80dc91107a57df23cff5b05aa098bdba02289a8db9286e7acddfb2280a09463347b92d480de3c25f52546a9462eb6dcb7885ccb273824b5325a32b66c9fca1cd301bb6f5574ef5a996fd4256a78886df0a830b98f09c54f4e42c07e5ede13b2aeab1357d19f69e0d63d79a4c86c6b42962c304473df758f4afa6530f6e77b17229e8ce3da77acb873505eb6c126107bd", &(0x7f0000000280)=""/230}, 0x18) r2 = dup2(r0, r0) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:29 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x20000000) 20:00:29 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) open(&(0x7f00000000c0)='./file1\x00', 0x0, 0xc) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') mknodat(r0, &(0x7f0000000080)='./file1\x00', 0x442, 0x8) 20:00:29 executing program 3: r0 = memfd_create(&(0x7f0000000000)='\\eth1eth0*\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f0000000080)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESHEX=r0], @ANYRESHEX=r0, @ANYRES64=r0, @ANYPTR, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16=r0], @ANYRES16=r0], 0x37) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:29 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000011000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:29 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstatfs(r1, &(0x7f0000000000)=""/241) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video0\x00', 0x2, 0x0) uselib(&(0x7f0000000300)='./file0\x00') ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000140)=0x43) 20:00:29 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:29 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000023000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:29 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) 20:00:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x3f000000) 20:00:29 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x00\x00\x00\x00\x00\xf1\xff\xf5\x9d\xdb)\xab,\xe5\x97', 0x10000004) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000004000000000079ede30941c1ae645a9f2ac3082b40484a39ca8076af08ba950218da110becb42f8c5da03edc8cebd7eac060ebcefec57967d0270bd13de7e5"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xffd) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f00000001c0)=r1, 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000080)=[@in={0x2, 0x4e23, @multicast2}], 0x10) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000140)=@v2={0xa294914a345667ce, 0x1, 0xe, 0x7, 0x2f, "c77266390161342b3b80daa553154481f65faae131845537df6224a700a55f338c613d5da3968dd8fa1463d4952846"}, 0x39, 0x2) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000180)) 20:00:29 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(r0, 0x0, 0x4a36000e1a8c1db6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') getsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000000)=""/168, &(0x7f00000000c0)=0xa8) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) 20:00:29 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000003f000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:29 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:30 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\x00'/10, 0x4) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000180)={r2, 0xc9b, 0x30}, 0xc) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00 \x00'], 0xa) r3 = dup2(r0, r0) execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x40000000) 20:00:30 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000040000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:30 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = geteuid() fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') close(r3) 20:00:30 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x80) write$P9_RREADDIR(r2, &(0x7f00000000c0)={0x2a, 0x29, 0x2, {0x100, [{{0x0, 0x2, 0x8}, 0x3, 0x6, 0x7, './file0'}]}}, 0x2a) uselib(&(0x7f0000000300)='./file0\x00') fallocate(r1, 0x31, 0x2, 0x5) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x9, 0x80000000, 0x6, 0x6, 0x5, [{0x100000001, 0x8, 0x80000001, 0x0, 0x0, 0x800}, {0x3, 0x0, 0x29bd, 0x0, 0x0, 0x2004}, {0x9, 0x4, 0x6f7, 0x0, 0x0, 0x1000}, {0x70, 0xff, 0x7232, 0x0, 0x0, 0x8}, {0xef, 0x8000, 0x6, 0x0, 0x0, 0x2000}]}) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x1) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000100)) 20:00:30 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:30 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000fe80000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xb80b0000) 20:00:30 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') write$P9_RLERROR(r0, &(0x7f0000000000)={0x9, 0x7, 0x2}, 0x9) 20:00:30 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x6) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r1, 0x9) ptrace$setsig(0x4203, r2, 0x5, &(0x7f0000000140)={0x37, 0x0, 0x8}) uselib(&(0x7f0000000000)='./file0\x00') faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x44, 0x0) fanotify_mark(r0, 0x205c, 0x4000000e, r0, &(0x7f0000000100)='./file0\x00') 20:00:30 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="2333f32d502094df7c4f808705370440a580135aad986b1697aabd046702802777992a387b3717a0cbdb02fac30000e2d1906d212aca6fca6f03d97da81850924f563c592c77a68d33ccab353c6ee830a6f2f287ad1e9a92769e6983fde826bb27c5980a9386bcf4d6441cae1f6a7dee83660f5dcb3b59c30e8a331d52ca6d527c9d20"], 0x83) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:30 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000080)=0x4) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup2(r0, r0) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xe8030000) 20:00:30 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000080fe000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:30 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:30 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = getpid() r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000080)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000000)={{0xffffffffffffffa9, 0xffffffff, 0x4b3, 0x0, 0x80, 0x8}, 0x2, 0x17, 0xffffffffffff8b20}) ioprio_set$pid(0x2, r1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000000040)={0x4, 0x0, 0x10001, 0xf2}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40106435, &(0x7f0000000080)={0x1, r3, 0x10002, 0x8}) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:30 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000040030000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xeffdffff) 20:00:30 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000000)=""/225) uselib(&(0x7f0000000300)='./file0\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x1ff) 20:00:30 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321641bfd33f300ee9cee8272e7b33bb57dfa9177060bff784be263266d0e4b426ad82c80772c3713c1c3c78d9696079cece047fd56965e7cac4e9cbe76ba3f58c5c6356041d0574752394917ec1796c64083c5f3c6930854f42405d227070000003b3b"], 0xa) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=r2, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000280)=""/191, &(0x7f0000000000)=0xbf) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x4) r3 = dup2(r0, r0) execveat(r3, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1000) 20:00:30 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:30 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffffffffffffffff, 0x800) 20:00:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xf4010000) 20:00:31 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000100000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:31 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000080)=0xffffffffffffff81, 0x4) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:31 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"/304], 0x130}, 0x1, 0x0, 0x0, 0x85}, 0x48000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000200)=0x10) 20:00:31 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xffff0000) 20:00:31 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:31 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x1a) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}}) perf_event_open(&(0x7f000001d000)={0x1, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) uselib(&(0x7f0000000300)='./file0\x00') 20:00:31 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000003400000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:31 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0xfffffffffffffc68) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:31 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) socketpair(0x1, 0x8000a, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0xfffffffffffffee6) 20:00:31 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000100", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:31 executing program 4: r0 = creat(&(0x7f0000000600)='./file0\x00', 0x200000000000842) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000340)={r1, @in6={{0xa, 0x4e21, 0x2, @mcast2, 0x140000000000}}}, 0x84) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x9, 0x80001) mkdirat$cgroup(r0, &(0x7f0000000400)='syz0\x00', 0x1ff) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000040)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) quotactl(0x8, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000180)="29c66461c392cef18574cfaa0ac3fa484e6d2d0742da08ce6a23fe3f064f975b6c269b50a702009eed51dc986b46552560430417bc520457058b1074accbfb430f4c590716c33ee7") mq_timedreceive(r0, &(0x7f0000000480)=""/251, 0xfb, 0x9, 0x0) uselib(&(0x7f0000000300)='./file0\x00') ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000580)={0xcd, "c711a0efaab5379fff2080ea1f6197315b86279e101682e62b37a4f07171c0b4", 0x1, 0x20, 0x0, 0x0, 0x3}) 20:00:31 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200800, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x100000001, &(0x7f00000001c0)=0x0) io_cancel(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xf, 0xf32d, r2, &(0x7f0000000200)="1a7ba80e0cb747099d438b6abf23c586a17ad299059774d262010ea1ff10b1ea1387b36d5933e3f30bd09b740c5d1f4613175764491ac7d5b416289d5da8606e689f8867df41763aa65b9c166e7a3fb69c1053b3bc018f1b62bfcdce87901b8c614ead674e28d26f75b67f55a14587d5254509733a3b73f3c66cf3", 0x7b, 0x7f, 0x0, 0x1, r1}, &(0x7f00000002c0)) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000340)={0x4001, 0x9, 0x1ff, 0x200000000000100}) write$UHID_DESTROY(r0, &(0x7f0000000380), 0x4) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000540)={0x3, 0x2}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)=0x0) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)=0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() fstat(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f0000000b80)={{}, {0x1, 0x2}, [{0x2, 0x4, r4}, {0x2, 0x0, r5}, {0x2, 0x1, r6}], {}, [{0x8, 0x2, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}], {0x10, 0x2}, {0x20, 0x1}}, 0x54, 0x0) r10 = getuid() quotactl(0xf98, &(0x7f0000000780)='./file0\x00', r10, &(0x7f00000005c0)="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") uselib(&(0x7f0000000580)='./file1\x00') ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x668) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000003c0)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a45352, &(0x7f0000000040)={{0x34, 0x6}, 'port0\x00', 0x0, 0x0, 0x8, 0x9, 0x6, 0x7, 0x7, 0x0, 0x1, 0xd519393}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000c00)={[0x4000, 0x6000, 0x0, 0x4000], 0x37, 0x10, 0x364041ec}) 20:00:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xfffffdef) 20:00:31 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="2333f32d502094df7c4f808705370440a580135aad986b1697aabd046702802777992a387b3717a0cbdb02fac30000e2d1906d212aca6fca6f03d97da81850924f56"], 0x42) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:31 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x10) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000180)=0x4) 20:00:31 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000200", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:31 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000000c0)=""/103, 0x67}, {&(0x7f0000000140)=""/71, 0x47}, {&(0x7f00000001c0)=""/76, 0x4c}, {&(0x7f0000000340)=""/239, 0xef}, {&(0x7f0000000240)=""/137, 0x89}, {&(0x7f0000000480)=""/73, 0x49}, {&(0x7f0000000500)=""/80, 0x50}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/203, 0xcb}], 0x9}, 0x100}, {{&(0x7f0000001700)=@isdn, 0x80, &(0x7f0000001800)=[{&(0x7f0000001780)=""/121, 0x79}], 0x1}, 0x7}, {{&(0x7f0000001840)=@rc, 0x80, &(0x7f0000001a80)=[{&(0x7f00000018c0)}, {&(0x7f0000001900)=""/48, 0x30}, {&(0x7f0000001940)=""/13, 0xd}, {&(0x7f0000001980)=""/246, 0xf6}], 0x4, &(0x7f0000001ac0)=""/243, 0xf3}, 0x9}], 0x3, 0x2140, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xffffff7f) 20:00:31 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {r1, r2/1000+30000}}, 0x0) 20:00:31 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#'], 0x1) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:31 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xfffffffffffffee6) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0xd04, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x20040041) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000080)={0x400, 0x4}) 20:00:31 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000300", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:31 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000042) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x4000000000000) 20:00:31 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000000)={0x1000, 0x5, 0x8b, 0xff000, 0x80}) uselib(&(0x7f0000000300)='./file0\x00') 20:00:31 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#'], 0x1) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:32 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000400", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:32 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:32 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)) 20:00:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x40030000000000) 20:00:32 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000500", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:32 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:32 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23215113fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') lsetxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280)=@sha1={0x1, "744f8587df4d1619eba1fdc04e38eb2dd238affe"}, 0x15, 0x3) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r2, 0x300, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) 20:00:32 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x100000000000000) 20:00:32 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#'], 0x1) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:32 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000600", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:32 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)=0x3) uselib(&(0x7f0000000300)='./file0\x00') 20:00:32 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000140)={r2, r3}) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r4 = dup2(r0, r0) execveat(r4, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000180)=0x7, 0x4) 20:00:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x200000000000000) 20:00:32 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000100)=0xe8) r2 = geteuid() r3 = getuid() setresuid(r1, r2, r3) 20:00:32 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="2333f32d502094df7c4f808705370440a580135aad986b1697aabd04670280277799"], 0x22) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:32 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000700", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:32 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x400}, 0x4) 20:00:32 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="231c00000000000f5d29bc050000204b64fd893e797f50b8a358cfb8b745badf26625005"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xa0e4, 0x4800) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000080)={0x9, 0x20, 0x3}) 20:00:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x400000000000000) 20:00:32 executing program 4: r0 = creat(&(0x7f00000002c0)='./file0/file0\x00', 0x10000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') futimesat(r0, &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x7530}}) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=[&(0x7f00000000c0)='trusted\x00'], &(0x7f0000000240)=[&(0x7f0000000140)='procppp1\x00', &(0x7f0000000180)=',[wlan0-@bdevprocposix_acl_access~selinuxmd5sumkeyring\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='*\x00'], 0x1100) 20:00:32 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:32 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000800", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:32 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{}, "22fea07620fdd5e9", "ebd63efabfb4cd5ecfd1813ff743fbc9", "1b64e0c7", "53cd9c86274fd46b"}, 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:32 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') r0 = socket$isdn(0x22, 0x3, 0x12) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000001c0)=@generic={0x1, 0x6, 0x10000}) 20:00:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x700000000000000) 20:00:32 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000900", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:33 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="232164f0fd33f32d50e6"], 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x4, 0x6, 0x3, 0x88fc, 0x0, 0x6, 0x420, 0xe, 0x7, 0x7fffffff, 0x5, 0x7f, 0x1, 0x0, 0x57, 0xbeb, 0x9, 0x400, 0x306, 0x6, 0x2, 0x687, 0x100000000, 0x7, 0x2, 0x4, 0x3, 0x68, 0x6, 0xd8, 0x1, 0xc11, 0xea, 0x5, 0x2, 0xfffffffffffffffb, 0x0, 0x101, 0x4, @perf_config_ext={0xa2, 0x8000}, 0x11100, 0x7fffffff, 0x3, 0x7, 0x1a, 0x7, 0x6}, r1, 0x8, 0xffffffffffffffff, 0xa) r2 = dup2(r0, r0) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:33 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:33 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:33 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000000c0)=0xa4b) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r0}) uselib(&(0x7f0000000300)='./file0\x00') 20:00:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x900000000000000) 20:00:33 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="05000000000000001b0317f88b250c0ce2f35ff58d3736e32a803b3d67c9f403a72205bcba01737a24b9cfd232444010acae39005a64068cafd4e3813ec7e513f2376e6f3c24ef2d0bfbb57b93aca2b6570db07ef85efeef"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:33 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000480)={0x1, 0x1000, "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:33 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000a00", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xa00000000000000) 20:00:33 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:33 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)={0x8, 0x8, 0x1ff, 0x0, 0x3, 0xfffffffffffffffb}) uselib(&(0x7f0000000300)='./file0\x00') ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f00000000c0)={0x6, 0x103, 0x2, {0x100000000, 0xfff, 0x7160d510, 0x4}}) r2 = gettid() ptrace$setregset(0x4205, r2, 0x207, &(0x7f0000000140)={&(0x7f0000000100)="1e564db6557ecc0ce2baa2b2861853507dd3c9cc3b53ced9061dad9d1bc4354884dfdb920119b250", 0x28}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xb3b, &(0x7f0000000000)=""/29) 20:00:33 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 20:00:33 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:33 executing program 3: r0 = memfd_create(&(0x7f0000000180)='\x00'/10, 0x7) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xa) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x80000) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) connect$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @rand_addr=0x3f}}, 0x1e) 20:00:33 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000001c0)=0x28, 0x4) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1f) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x100010, r1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2820008}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa0, r2, 0x1, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4df0}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x619a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40}, 0x11) uselib(&(0x7f0000000300)='./file0\x00') getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) 20:00:33 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000000)) 20:00:33 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xe00000000000000) 20:00:33 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001100", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:33 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xa) r1 = dup2(r0, r0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000100)={'yam0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000080)=0x4) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000180)=r2) 20:00:33 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000000)='./file0\x00') 20:00:33 executing program 4: lsetxattr$security_evm(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@ng={0x4, 0x5, "d8c8180d14d98bfb9e"}, 0xb, 0x3) creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xb0f0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x1100000000000000) 20:00:33 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#'], 0x1) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:33 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000002300", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:33 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) getpeername$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) write$rfkill(r0, &(0x7f00000000c0)={0x3, 0x7, 0x2}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:34 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd42c0de806cff6ae) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x100000000}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={r1, 0xd46, 0x30, 0xfffffffffffffffc, 0x7dcb}, &(0x7f0000000100)=0x18) 20:00:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x1c00000000000000) 20:00:34 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x3, r1, 0x0, 0x0, 0x1}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:34 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000003f00", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:34 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#'], 0x1) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:34 executing program 3: r0 = memfd_create(&(0x7f0000000200)='$pp\x04\\VF\x97P\xd3\x98\xfb\x00\x01\xab\xa9\x89\x8aelf\x00', 0x7fffffffffffe) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.opaque\x00', &(0x7f0000000140)='\x00', 0x1, 0x3) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23ff7f00000000000020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x2000000000000000) 20:00:34 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46c00) io_setup(0x2, &(0x7f0000000300)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 20:00:34 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:34 executing program 3: socket$inet(0x2, 0x8000e, 0x5) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fdfb73822b20"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:34 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000004000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x3f00000000000000) 20:00:34 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#'], 0x1) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:34 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYRESOCT=r0, @ANYBLOB="e0551bfcadb7663e50caec990cacad6a44fd41a91b0b03d01e0657e04be606ac6f7811a47a00c3537387e29b8c03d6a609c612cd5fc348572f6e8e5431cc06c6a7bef652cdbc7ac32ea7adb79971d93c756dec376eb577c9045eba721393fcd64f115cf8ae4b6781938a403f212751ac93f2261a9010a56ed40d162371ced179c9c583a8db903c3689d1a04531b1abef9072ca626de03da72f2909687c9bb5c2466597d5dbaab6164c2b06addab623914c449b33ab1c71e18b5753c8e20801022bb68cf29e94820f"], 0x1f) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000100)={0xe, 0x0, 0x6, 0x78, 0xa5, "8f21e0422a2aa34aca944b2d3756947065b658bcee1a7d22cd0260a0c3b44e54af4419da16665dd38c1efbed3df9c6a952661204b36a709bd4948deb705bd2e4ea58750a8cc3e9dd7079584c6a5c5e1365d1c54eae7d7a1131677beeea4c0503aef76601758f205f758d272fbcca35fb44c6369863bad246a1e27315018aa1331a50fe9ebb4c43a51fe0156739435676039dc1e44ab3d84ef9a7bd19816589f513d6f131d2"}, 0xb1) 20:00:34 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000fffffff500", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:34 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) r2 = getegid() getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)=0x0) socket$nl_crypto(0x10, 0x3, 0x15) setgroups(0x3, &(0x7f0000000380)=[r1, r2, r3]) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) close(r5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000100)={0x6, 0x1, {0xffffffffffffffff, 0x2, 0x8, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000440)={0x6, 0x118, 0xfa00, {{0x100, 0x200, "c7eefefbc79dc7d10401cd02ac6d73f14f17b74fa051d69a17cd226311940dcbf1ebaa31525909b11919f5692055688b4e55f7baaf49c27df893c93682a6f39cad10fe237e7c9c74c774a31076846ff8759079c6c8f00e56db9788247d6405c3e51429eaf796affc4053e3e38a5695034da880d93dfa2111e45442ad229ff495145e9f4c96e6e42a12572beca0c9938618997fe52be307135c42ecb56e7b531a1f4f12579c402294da36bbcc444f93fb919e46c31e6541690ea17f30430481ea916af0e14ea782c075650fb8c6f81c0c1a1ec778392e8251a45c9765e7fdb3be5ffc918c461cffe85afc2733632c442bb7a407d55946bda866c348eb8f1f81d9", 0x4a, 0x7ff, 0x8, 0x5, 0x2a1f, 0x3, 0x0, 0x1}, r7}}, 0x120) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000240)) creat(&(0x7f00000000c0)='./file0\x00', 0x200000000240042) mkdirat(r5, &(0x7f0000000580)='./file0\x00', 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r5) uselib(&(0x7f0000000300)='./file0\x00') sync_file_range(r8, 0x7, 0x9, 0x4) 20:00:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000002c0), 0xffffffffffffff94, 0x0, 0x0, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f0000000140)="84", 0x1}], 0x1) close(r2) 20:00:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x4000000000000000) 20:00:34 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="0da8b7e9fa4b93a904306c92da8fccd8e34a6e633b910bec0e5bbdb3", 0x1c}], 0x1, &(0x7f0000000480)=[{0x100, 0x10d, 0x7ff, "5f295fe1ca193adc81f3dfb4eeda889b0260bb6f9ba7a29ba7676c7b2c2c195f08ec7915ea07f95c227c898968a54d00715952114b2eb769e65b308c2bd0fceba342786ac5f07d1b8eb86b75b66b0f3f39c8ee5698d8e93ee2fa7b86019dd7455da6205d087a9e27141446cd50c0997fc8d99fb57bf988b27a6dfd0bc127f26729353c7f565335e2498c3fb6f70417a30b9507c94968f18a4177d50008bbaeeebafabf2b879e898fb95d55b881a1eb08cfdc9c910c91cdaba5fa09f65297282fe3200c8e7b66cc59ab7700d21f1792632ac5575f9cadc98263f4fcc3e51fb77456a47c4bf8d3f64ba3d9fade9fd65726d06127"}, {0x44, 0x119, 0x8, "d8ae25513a77ab9e3afd99b683f328874d976eb2447e30dd71d61da487baeaa9a7ccea965b4d0de26ac100e9d07a1cac5d5c6489d70a7f"}, {0x20, 0x117, 0x4, "f88d656d2f13a7f19868acd5e8c336e3e95600d7"}, {0xac, 0x84, 0x3f, "736b7ef4a5fb9fae4284a0a3e2494a896665df7f84ea9755d57d16d468ec919ea720f692941b5b746ab6a663dfa1704fb96e34e21d00557f1d67f4505dcda72ab5ba2109df70b440f0a7909b6f2bbebb3e28bd0889db47b54f19e34b5071ad15b41fbc6a981ef76e74d8acba63e50d53e97a1360a774bd5e82fd4aa1e286b18e1a9f0223151fd49537a64ae4c209b38549a734d6231ad843912263c7d393"}, {0x28, 0x10c, 0x6, "95830e5f318166a2958ac23e3c277e3c59a3a78f3d13600f4d0c2b"}, {0xd0, 0x114, 0x800, "8ed4a9b745e9e5ae6a1a8a22aafa34642321dcc9ee3e19a4e3632557ab3f3649ebfdd31bc7579f84c201c856612e4e476c12b6950c4838cbf1a032feb717438fa1fa79a1d327ed904d9d3a55a9f11bcf0e63a99253def46a8ce3f4775207a03c0d3a9210017308dec3d3c55ac6e7338eb09d5cf2fbe69fa70d7e700dd6d36a06c9dde6647ea877a1b759f323eb22179d0d020419e4481a11047a6fca635fb09c110a2ddd8dbf71e692a6aae8e1d5b87c8ad7747c1fb792b6fbaaa0a70f3d0098e69e55"}, {0xe4, 0x0, 0x9, "af7c4aed7db8a23f43665f5ec1a468fcef781b49757f2dcd1cc446684c66c73a7d175584188ed278aacecdb78d4a95051aa8615c2af27278d18347d676253d0caad4641be34648005bc135dd8160662dfca5d9d33a7b48ad2a162d070f09dd56ab398e2080c4acf86d02cf4a22fcff610ce52176ceb9a9254851c669a863764fa33fd12e3848c764372f74fa72b85e3b3e7a6b387b6cbf0d1b2be97346742bf81c8f058fb46b4e8a9d66e038f16bc45dc372bc1b51e6804549fcbe05fd8a42a89c779adce5685052e2724e7241659b78c38e0561e796"}, {0x5c, 0x117, 0x6, "ece137c89d2eb0b24dd420538d410711618f44b55aecd991e2b101d5920c7ac8079c5f9bcd4011530fbcb9853c21bf0205664aec76ac39f6cbfd4cf03ba577f381e03bc88cf68a334d8a865c6560ba"}, {0x18, 0x18c, 0xfffffffffffffff7, "764274eccc934fbb8ae8"}], 0x460}, 0x0) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') getpeername$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond_slave_0\x00', r2}) 20:00:34 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000080fe00", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:34 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x2, 0x2, [0x7, 0x6]}, 0xc) r2 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r3 = dup2(r2, r2) execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x8000000000000000) 20:00:34 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(0xffffffffffffffff, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:34 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x6, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x8, 0x1, 0x7, 0x400, 0x0, 0x7fffffff, 0x10080, 0x0, 0xdb, 0x7, 0x438, 0x3, 0x8, 0x8000, 0x1, 0x6f47fb48, 0x101, 0x7ff, 0x1, 0x6c, 0x7fff, 0x7, 0x0, 0x9, 0x6, 0xffffffff, 0x4, 0x800, 0x9, 0x7f, 0x1ff, 0x7a, 0x10001, 0x58596043, 0x5, 0x7ff, 0x0, 0x8, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x400, 0x24000000000000, 0x8, 0x6, 0x7, 0x7ff, 0x46c8}, r0, 0x2, r1, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x20000000080003e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') write$P9_RRENAMEAT(r2, &(0x7f0000000000)={0x7, 0x4b, 0x1}, 0x7) 20:00:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xb80b000000000000) 20:00:35 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400007fffffff00", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:35 executing program 3: clock_gettime(0x0, &(0x7f0000003200)={0x0, 0x0}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/snapshot\x00', 0x420000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000004a00)='westwood\x00', 0x9) recvmmsg(0xffffffffffffff9c, &(0x7f0000003140)=[{{&(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/11, 0xb}], 0x2, &(0x7f0000001280)=""/32, 0x20}, 0x100000001}, {{&(0x7f00000012c0)=@nl, 0x80, &(0x7f0000001980)=[{&(0x7f0000001340)=""/53, 0x35}, {&(0x7f0000001380)=""/117, 0x75}, {&(0x7f0000001400)=""/156, 0x9c}, {&(0x7f00000014c0)=""/192, 0xc0}, {&(0x7f0000001580)=""/82, 0x52}, {&(0x7f0000001600)=""/213, 0xd5}, {&(0x7f0000001700)=""/158, 0x9e}, {&(0x7f00000017c0)=""/172, 0xac}, {&(0x7f0000001880)=""/219, 0xdb}], 0x9, &(0x7f0000001a00)=""/223, 0xdf}, 0xffff}, {{0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b00)=""/230, 0xe6}, {&(0x7f0000001c00)}], 0x2, &(0x7f0000001c80)=""/29, 0x1d}, 0xff}, {{&(0x7f0000001cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000001e40)=[{&(0x7f0000001d40)=""/50, 0x32}, {&(0x7f0000001d80)=""/165, 0xa5}], 0x2, &(0x7f0000001e80)=""/86, 0x56}, 0x100000001}, {{0x0, 0x0, &(0x7f00000030c0)=[{&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000002f00)=""/209, 0xd1}, {&(0x7f0000003000)=""/145, 0x91}], 0x3, &(0x7f0000003100)}, 0x9}], 0x5, 0x100, &(0x7f0000003240)={r0, r1+30000000}) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000003280), &(0x7f00000032c0)=0x4) r4 = memfd_create(&(0x7f0000003480)='tC\xb9\xd6\rM\b\x00\x00\x00\x00\x00\x00\x00\x05|\xce\xb5B\xb0#\x01\xcay\xfe\xfa.\xae\xdd\xee\xade^\x9fv\xa0\xeb\xf3\xd5O]\x9c\x85\xd2\xeb\xe9\xb7\x1d\x1f\xec\x14\x7f\xde;H\x8em\xd1\x96\xab\xfd9|\xd4u\xb6\xbd$\xcf\xfd\x8a\x84\x96\x83\x9f\xcfP\xc7\xa0t:\x80p\x15G\xa7\xae\xee\xc7\xefO\xb5?L\x15h\xbaI\xbe\xb3D\x87\xc2\xa1#\x1f\xf9\x9a\r\x12\xfe\xde)\xc9\f\x00\x82\a\x03\x00\x00\xbb\x02\x11\xcb\x06RF\xbbJ$\t\x927\xf2\x94\xaa\xaf\x11\xcd', 0x7) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000003340)=""/236) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5b20"], 0xa) r5 = dup2(r4, r4) execveat(r5, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000003440), &(0x7f0000003540)=0x4) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0086426, &(0x7f0000001c00)={0x4, &(0x7f00000000c0)=[{0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r5, 0x40086425, &(0x7f0000003100)={r6, 0x1}) getsockname$unix(r5, &(0x7f0000000100), &(0x7f0000000080)=0x6e) ioctl$RTC_RD_TIME(r5, 0x80247009, &(0x7f0000003300)) 20:00:35 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(0xffffffffffffffff, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xe803000000000000) 20:00:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_emit_ethernet(0x140, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70, 0x5c}, @dev}, @icmp=@parameter_prob={0x8, 0x2, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 20:00:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='memory.events\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da802003f000000, 0x5000027) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000080)="70880cc5b23436c73bb6d2ee3b551ba813d9308790dadd7ca515224c8a1e4371d6376e1f0ca0a08fe760b59afb73aea9f9281fb7ccf21afb84ec7b0258c5d5ed", 0x0, 0x1}, 0x20) 20:00:35 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000f5ffffff00", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:35 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(0xffffffffffffffff, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:35 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0xfffffffffffffffe) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="373bf520"], 0xa) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40246608, &(0x7f0000000080)={0xfff, 0xa3, 0xc3d, 0xffff, 0x1, 0x7}) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:35 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(r0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x6) r1 = socket$netlink(0x10, 0x3, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6gretap0\x00', 0xe) sendmsg$nl_generic(r1, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="4800000014000700000000000000000002ff0006667e279639a91d1397917daf4204a00b32eadc2828417f000001e3d8960f6542360c00000015739d53d500"/72], 0x1}}, 0x0) 20:00:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0x20000000}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_wait(r2, &(0x7f0000cd8ff4)=[{}], 0x389, 0x0) 20:00:35 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xeffdffff00000000) 20:00:35 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x5, 0x800) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r1 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x4) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1', "e5d4ddba8dbc36fe437ddfccea24034711ade7a065cd19c483057185c5b5efead033984b85770e060fc58e9b569c46693844b3e5feae8721148e2e9fe56f6a36a7f914ace85268ef91a3c0a02d21f0efdbcf2bbcab3167fafd27273422935fbf17a2c8cb42cf1b82fb00c83134fc832e8f714cfb4af0c8d694a82250841025cf76d13df14eb52cea4a8a82aa78561f08709e192690efcd7023"}, 0x9d) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="23216413fdaab95c33f32d5020"], 0xa) setxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@sha1={0x1, "442bb30b4d5ab3f8969fd157825653f2e10aa169"}, 0x15, 0x1) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x52399796641a982a, 0x0) r2 = dup2(r1, r1) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000000000)={0x1, 0x4, 0xd4, 0x5, 'syz0\x00', 0x611a}) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:35 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(r0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:35 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x64}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2, 0x4000000032, 0xffffffffffffffff, 0x0) getsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000180), &(0x7f0000001080)=0x4) 20:00:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xf401000000000000) 20:00:35 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(r0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:35 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:35 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) dup2(r0, r0) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:35 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:35 executing program 2: r0 = socket(0x400020000000010, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") write(r0, &(0x7f0000000000)="1f0000005e000d0200000000fc07ff1b070404fb0c00000007030100010039", 0x1f) 20:00:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xffff000000000000) 20:00:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000200)) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000040)={0x11}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f00000001c0)={0xfffbffff80000013}) epoll_pwait(r2, &(0x7f0000dc7fc4)=[{}], 0x1, 0x0, 0x0, 0x0) 20:00:36 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) 20:00:36 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) dup2(r0, r0) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:36 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000002c0), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r0, &(0x7f0000000240)="a6b9d948f68b3cd77faec08c57e055fa87c38e6bc0821a6531658dec4e986470942285e981e381474aff4805bd57e5e47ddcf4b0fb52fb2057822e25176066c23cff533c439526914e078817a82cb13518e9c644fa53119da2c110210d7ed4af32c3fdab27c59d1c3fb4ee1fa2ba15a8c9763808758bd7bc0aefd8f38a98d6e93396122c65ac17a0fb7a82a16f03d3d2b3440cf0793a5bea2d458e631327d7ef7182b9435fd277049d", 0x0}, 0x18) 20:00:36 executing program 4: mknod$loop(&(0x7f0000000440)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x8, 0xffffffffffffffff) clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000740)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0xfffffd83) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x0) 20:00:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0xffffff7f00000000) 20:00:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_execute_func(&(0x7f0000000fc0)="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") ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000200)={0x180000000, 0x0, 0x1}) 20:00:36 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) dup2(r0, r0) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:36 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:36 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x41, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/snmp\x00') ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r1}) r2 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r3 = dup2(r2, r2) flock(r3, 0x1) execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x100, 0x448200) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x30840, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r1, r2, 0xb}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:36 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(r0, r0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 20:00:36 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:36 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0xfffffffffffffec4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:36 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="23216413fd33f32d50207b015a23172f60e7c1d9ec849b5bc69b9e3f580bf2f4b486b10fd4800451167c1d050f0b8a1dce7a0927361a0746120c49fb3570b688b5951c0631441328fd6608919106"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:36 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(r0, r0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 20:00:36 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x5c, r1, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xf}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc840}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x48}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:37 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:37 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:37 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40186417, &(0x7f0000000100)={0x64b, 0x2, 0xc9be, 0x6, 0x12, 0x9}) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xb9, 0x2, 0x3, "fbb1c0006195666967f1e8e44c310dd7", "28374270b05d9fd5d469a80248d16f1367591a3ec65a52b969d29a574e91497d37cac100da0a324097ba87a45ea523829a22ada251891e779a07f88ce593545bb42a98deebf517ca0ca41ac4455050d69da81841478c2d959c667f4014881445c9b29d4b462132ff1806d83dbe1952a9989883165236dae3dea358c13a99db6493d76e3562dd2a50531c14b0bc412c0fdd2bf0b7f5483744100285d0db1940a3a837a79e"}, 0xb9, 0x3) chmod(&(0x7f0000000080)='./file0\x00', 0x58) 20:00:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040)=0xfffffffffffffffd, 0x3) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x4, 0x100000001, 0x1, 0x1, 0x8}) 20:00:37 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(r0, r0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 20:00:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x408000, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x6c}) 20:00:37 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) 20:00:37 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:37 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:37 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write(r0, &(0x7f0000001100)="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", 0x82c) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23d410e5bb33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:37 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) 20:00:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_LINK={0x8, 0x4, [@TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_BEARER={0x4}]}, 0x28}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:37 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:37 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:37 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r0 = semget$private(0x0, 0x2, 0x0) semctl$GETZCNT(r0, 0x6, 0xf, &(0x7f0000000280)=""/201) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x20, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) 20:00:37 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='#3'], 0x2) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) 20:00:37 executing program 4: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:37 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:37 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:37 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x14, 0x40000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x80000001, 0x402000) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) recvfrom$packet(r1, &(0x7f00000001c0)=""/51, 0x33, 0x10000, &(0x7f00000003c0)={0x11, 0xa, r2, 0x1, 0xb911}, 0x14) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x1) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f00000007c0)=0xe8) connect$can_bcm(r3, &(0x7f0000000800)={0x1d, r4}, 0x10) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f0000000080)={0x6, 0x0, 0x2, {0x7, 0x9, 0xfffffffffffffffe, 0x1}}) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r5, 0x54a3) 20:00:37 executing program 4: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}]}]}, 0x40}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:37 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:37 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') unlink(&(0x7f0000000200)='./bus\x00') epoll_create1(0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x1c, r1, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x45}, 0x800) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40047602, &(0x7f0000000280)=0x3) ftruncate(0xffffffffffffffff, 0x10000) r2 = open(&(0x7f0000000300)='./bus\x00', 0x610002, 0x4000000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r2, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000080)=ANY=[]) ioctl$KVM_DIRTY_TLB(r2, 0x400caeaa, &(0x7f0000000040)={0x0, 0x8001}) 20:00:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000040)={0x1}) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:38 executing program 4: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:38 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSIGACCEPT(r0, 0x801c6d02, 0x0) 20:00:38 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYRES16=r0, @ANYRES32=0x0, @ANYRES16=r0, @ANYBLOB="eee6c3ccf03a09c4fdc4903b5c614f78e9e611becc255cfe260e1bb73d78d8655bdc6d2daa369d4ccd4f754aeafe334518832d12325517ee571dd716a7d0d3f9c988ae606bc88e9594b417260bc46eb9da7acb8d53af84d996319f1b3e955282eff3587a670fdaeaf1d42a1441b766b95de5a0bf9090072814a7d57962a668fb3de692bec2ce45ae59d8a9b5d1d91792bd793bd9f9a3173c9722755fd7212b1aaf8c61cdc31c595a0f91758df8c85bf3eceeb76e50a377a3ab08ef5fef7ab072f5f560b62f8094c7b54b037dfe26c8b74c55f8c36fa963cb68fd26bbfa2c", @ANYRES64=r0, @ANYRES64=r0, @ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYBLOB="2f384a810d441a1ed836cc67972e4bd47a0413e2a3d2bf14e462b1c56b2b4548879df6aff82b0fb5a1b2f3a69aee6692610d34f5bc7399ebd1407f409921c711d6cf6ccd75182cfd47c89c5d6d13214eeab7f431bf8d7a60b4ce44a78a707fdbfd7dbf65b6a423da7867e2645b6d40de0f611e155371ff8847b4551f7e5ee55fe759a17f914b721c03b5035e0a57e696739f8c5179f8931353b9a71c6a027ed118e982f1a1cc999a", @ANYRES16=r0, @ANYBLOB="c86b3d8e23b3440aae1acb6d9999cece0e3ca4b1c93c635586e3bffbd9f1a9e1313a8166b0422c779793616e58ab44d870b27ba9089ab21f56f6a5b838f1b49b9b1a5b0978eeeb80dc8956a4e4e00335769cb5f35b613228d708c2d2813a751f16938a39f0ba6cbcfaa291", @ANYRESDEC=r0], @ANYRESOCT=r0], 0xffffffffffffffd7) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:38 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:38 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x10000, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast1, @multicast2}, &(0x7f0000000440)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000480)={@rand_addr="6a3b0051c915d8ede2cb9b362f5ed5ee", 0x73, r2}) accept4(r0, &(0x7f0000000300)=@nfc, &(0x7f00000001c0)=0x80, 0x80000) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x7fff, 0x1, [0x200]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x2}, &(0x7f0000000180)=0x8) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x8000000000000a0, 0x0) 20:00:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4000000000004e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000803, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) 20:00:38 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60b409000049210000000000000000000000ffffe0000002ff020000000000000000000000000001880090780509040066b680fa0000000005000000000000000000ffffffffffff00000000000000000000ffffac14ffbb"], 0x0) 20:00:38 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000000)=0x6, 0xfffffffffffffeb3) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x5, 0xa, 0xc6, 0x1, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={r2, 0xa, "6a0794d5c011cd2ebf8f"}, &(0x7f0000000180)=0x12) 20:00:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x74, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x74}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:38 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:38 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 747.265497][T15947] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:38 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8040, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000100)=""/80, &(0x7f0000000180)=0x50) r2 = dup2(r0, r0) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x8000, 0x0) r2 = open(&(0x7f0000000440)='./file0\x00', 0x10000, 0x8) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000480)=0x6b55) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20c}, 0xc, &(0x7f0000000540)={&(0x7f0000002dc0)=ANY=[@ANYBLOB="b0a40d003461dfa2f66896b645426c671007d52480a1841c9c650000000077b77408969145cc43de721c9cd32618b586aa31a3db67799ece05f1cb5ae644776b2d5dab76bd9c5553be2e58fd33a28666027aa36057d67676b731fc0b795e8b90af3af54a6484e07e7b5f2d89d7450945826b0c6499433c7411b221efb92e19210b28f03dd92c1364", @ANYRES16=r3, @ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r4 = add_key(&(0x7f00000005c0)='encrypted\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)="d93e3832fcdfc742dddc66efca755242fcf98f9273a87e2e2ab386357a5d4ef6d51f61991471726fbe786dc438a69a158a9090b4caae2ba6e9f00eb97a667f9b53fe970b6cc3055c4a35befb1617bacb21f42385321b0163dc4509a712e60a550064dd9f0c3d8f89b8c0ae7124782df751f89ea7d691aaef5324e7650008015ce0c987f689d6b21333704280eba4f47d9c2fb0904d6bdae957a74a80d7f598b688b3f08a91a38b6ef55a5f22259ea00b1e908b4cb6838b65335d32d53c241501488d8469ac5047d9751f891c0b24c4b7b4fab3006707c3822c04de3992d2003513b7d1", 0xe3, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000740)={r4, 0xfffffffffffffffa, 0x9}, 0x0, &(0x7f0000000780)="30feaabbc5709117d2bfa32723f1a593e1eb203d1de78fff7791721522fa5b328f28343852d514c41f3891df082c606a3082492a4e6ae0eb7825063084279f534a", &(0x7f0000000800)=""/184) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f00000001c0)=0xffffffffffffffff, 0xfffffffffffffc3b) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f00000004c0)=0xfffffffffffffe17) getsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000500), &(0x7f0000000a80)=0x4) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000bc0)={'team0\x00', 0x0}) getpeername$packet(r1, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000c40)=0x14) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002ac0)=[{{&(0x7f0000000c80)=@isdn, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000d00)=""/10, 0xa}], 0x1, &(0x7f0000000d80)=""/21, 0x15}, 0x9}, {{&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000e40)=""/99, 0x63}, {&(0x7f0000000ec0)=""/255, 0xff}, {&(0x7f0000000fc0)=""/12, 0xc}, {&(0x7f0000001000)=""/135, 0x87}, {&(0x7f00000010c0)=""/79, 0x4f}], 0x5, &(0x7f0000001180)=""/4096, 0x1000}, 0x134}, {{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000002180)=""/5, 0x5}, {&(0x7f00000021c0)=""/228, 0xe4}, {&(0x7f00000022c0)=""/236, 0xec}, {&(0x7f00000023c0)=""/47, 0x2f}, {&(0x7f0000002400)=""/151, 0x97}], 0x5, &(0x7f0000002500)=""/111, 0x6f}, 0x6}, {{&(0x7f0000002580)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000002700)=[{&(0x7f0000002600)=""/58, 0x3a}, {&(0x7f0000002640)=""/169, 0xa9}], 0x2, &(0x7f0000002740)=""/56, 0x38}, 0x2e9}, {{&(0x7f0000002780)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002980)=[{&(0x7f0000000380)=""/142, 0x8e}, {&(0x7f00000028c0)=""/170, 0xaa}], 0x2, &(0x7f00000029c0)=""/220, 0xdc}, 0x9}], 0x5, 0x41, &(0x7f0000002bc0)={r10, r11+10000000}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002d80)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002d40)={&(0x7f0000002c00)={0x11c, r6, 0x110, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r7}, {0x100, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000280)={@mcast2, 0x5, r13}) 20:00:38 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:38 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc) [ 747.596945][T15972] encrypted_key: master key parameter '§æ [ 747.596945][T15972] U' is invalid [ 747.617396][T15977] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:38 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 747.659900][T15972] encrypted_key: master key parameter '§æ [ 747.659900][T15972] U' is invalid 20:00:38 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:39 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x527b}, 0x28, 0x2) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 747.734388][T15989] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 20:00:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x1e9) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) ioctl(r0, 0xffffffffffffffe1, &(0x7f0000000000)="78639e9c88ce396d4b020fe00defc4b51553163bae0318e94c8221c700cdd0701831da61a2e811985560f49fa831d2fae039049d7d89a0ee39d4bfad1bf9492ecaef9a206a705f322158f8ee32e601f2bc7b72be578d5965f623a46fd2d7055d5de29c9cd5e26b5ebe01733d2419c3f2a70aefc5ed3e86e610eb194440520b97fff57d26f97795a624fab0737b72bf7b75fe4c1a9d0f5f9fc45e99c9d1e16b59fb91102a64500394cf7ddafcd6490f5c6e4013a1986642f7037db146b746cc691a360ed3815e1bc218c63e2d14c51b4046ec004ee6b708c0e9b9f6b44d0591ca37") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000340)) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x36d) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000400)=@buf={0x5f, &(0x7f0000000180)="b86da34ddd4092653846dabbc7a67c44a9454ea3d7adcbe95ec241653783ad45ebc5ac367beaa6a7eb40b123cbd8798c8563d069813f892b02675861a0e93fa57a107c580a7fc8de97cc5cb0b007f77a82ef5070c22d1463374b7621238fdb"}) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:39 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 747.843383][T15998] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 20:00:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0xa8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x4}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0xa8}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:39 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) [ 748.060526][T16017] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:39 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:39 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000aaaaaafeff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:39 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) alarm(0x3) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f0000000100)=0x10, 0x80800) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:39 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x4, 0x22002) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000003c0)={0x0, @reserved}) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffffd}, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x400003, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x7, 0x1, [0x800]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000300)={r3, 0x7f, "2315b83bc12c50304e58f277bad50dd1a83227a47482e514c922e01de816f9cd94600da1e08bfb7202a3bd21ae1208526db47c53e444859b3f0245fbba8a3e846282fc283499416dd655b373ac9a81d0c377718446a118bfc3e00589eaec85da71d6761594ad29903a29fb2c7b8d1e8558a573aab78755c0ea497fb8592d35"}, &(0x7f00000000c0)=0x87) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f00000001c0)) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x4}]}, 0x38}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:39 executing program 4: socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80000, 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000040)) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x3, 0x4) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:39 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 748.355695][T16046] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. 20:00:39 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x1d, 0xef39774f758ad1ce, 0x9c, "aa288f9f64e64c8230caca6d465fae7d", "c7d75e09414dbf93"}, 0x1d, 0x1) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:39 executing program 4: socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:39 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @local}, 0xfffffffffffffdb0) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0xb1, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0xfffffffffffffd50, 0x0, 0x0, 0x0, 0xfffffffffffffd58}}], 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x88, r2, 0xa, 0x70bd28, 0xffff, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x5e6, 0x5, 0x5, 0x4, 0x14]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1f}, @SEG6_ATTR_ALGID={0x8, 0x6, 0xfffffffffffffff8}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x7fffffff, 0x81, 0x7, 0x7]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x98e}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="2796e2b0e01209131f4d9f8bc11c3270"}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = dup3(r0, r0, 0x80000) ioctl$VT_RELDISP(r3, 0x5605) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000000)=""/250) 20:00:39 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000a8aaaafffe", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:39 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:39 executing program 4: socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b0000000200000000003dfced6e6c"]}) 20:00:39 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x1000000000002e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x104) 20:00:39 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0xc00) 20:00:39 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000000ff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000300)="fe36f11fb54fae5aa441f16567f5dc4a739bd6372e44a501f8aa283da7b05dac6dceb29c90431674473924ada9525260ae0cf3f9fc1ecfab6ecf6f5fa318590190415653caa3a86df1c451d88954ec13c73c1be1988bb1b0e1191eac41380aa4abf7caecd455919257582336c7e3bae066f9031a6e532fb71888597c2f0623785a45f7a568998f08a941bb72c5bb33053b9da30bf8ea9315ab1ce309144b670ea1f4b75b7036aebd3b98312f802af641410976578d8ea70d7387492ee7f0", 0xbe, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000080)='$+security[eth1\x00', &(0x7f00000000c0)) mq_notify(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x41, 0x0, @thr={0x0, 0x0}}) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r2, r3, 0xb, 0x1}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:40 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:40 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0xb, 0x6, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 20:00:40 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 20:00:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0xffffff1f}, 0x14}}, 0x0) 20:00:40 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:40 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000080)={0xb13, 0xf7b, 0x2ad6, 0x5}) open_tree(r1, &(0x7f0000000040)='./file0\x00', 0x100) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NODE={0x4}]}, 0x40}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:40 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 20:00:40 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:40 executing program 1: r0 = socket$inet6(0x18, 0x3, 0x0) r1 = dup2(r0, r0) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000300)=ANY=[@ANYBLOB="fb182e66696c65300000"], 0x1, 0x0}, 0x0) 20:00:40 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 20:00:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000280)={r2, 0x0, r1}) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000040)={0x100, {{0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x1a}, 0xf9e}}}, 0x84) dup2(r0, r0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='bond0\x00') getgid() 20:00:40 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000007f", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:40 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:40 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00'}) 20:00:40 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000000ff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="23d0ed4c3ec5db91675b0e4d0790ddca", 0x0, 0x0, 0x0, 0x5}, 0x20) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:00:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xfffffffffffffec1) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:40 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:40 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00'}) [ 749.530880][T16167] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 20:00:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:40 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000004dc0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004a80)=[{{&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)=""/245, 0xf5}, {&(0x7f0000000080)=""/14, 0xe}, {&(0x7f0000000180)=""/108, 0x6c}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000000400)=""/134, 0x86}, {&(0x7f00000004c0)=""/253, 0xfd}, {&(0x7f00000005c0)=""/134, 0x86}, {&(0x7f0000000680)=""/132, 0x84}, {&(0x7f0000000740)=""/252, 0xfc}], 0x9, &(0x7f00000008c0)=""/230, 0xe6}}, {{&(0x7f00000009c0)=@ipx, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001a80)=""/144, 0x90}], 0x1, &(0x7f0000001b40)=""/226, 0xe2}, 0x6}, {{&(0x7f0000001c40)=@ax25={{0x3, @null}, [@remote, @null, @null, @bcast, @default, @null, @remote, @null]}, 0x80, &(0x7f0000000280)=[{&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/168, 0xa8}, {&(0x7f0000002d80)=""/201, 0xc9}, {&(0x7f0000002e80)=""/171, 0xab}, {&(0x7f0000002f40)=""/240, 0xf0}, {&(0x7f0000003040)=""/182, 0xb6}], 0x6}, 0xdc2}, {{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f0000003100)=""/116, 0x74}, {&(0x7f0000003180)=""/146, 0x92}, {&(0x7f0000003240)=""/96, 0x60}, {&(0x7f00000032c0)=""/251, 0xfb}, {&(0x7f00000033c0)=""/117, 0x75}], 0x5}, 0x5}, {{&(0x7f0000003480)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004a40)=[{&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004500)=""/196, 0xc4}, {&(0x7f0000004600)=""/230, 0xe6}, {&(0x7f0000004700)=""/216, 0xd8}, {&(0x7f0000004800)=""/168, 0xa8}, {&(0x7f00000048c0)=""/201, 0xc9}, {&(0x7f00000049c0)=""/14, 0xe}, {&(0x7f0000004a00)=""/53, 0x35}], 0x8}, 0x8000}], 0x5, 0x10000, &(0x7f0000004b40)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000004b80)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000004c80)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000004cc0)={{{@in=@multicast2, @in=@multicast2, 0x4e23, 0xfffffffffffff800, 0x4e23, 0x5, 0xa, 0x80, 0x0, 0x0, r2, r3}, {0x3f, 0xffffffffd55594f1, 0x20d42363, 0xf7, 0x1000, 0x1f, 0x7ff, 0x69}, {0xfff, 0x2, 0x0, 0x81}, 0x7fff, 0x6e6bb2, 0x2, 0x0, 0x3, 0x4}, {{@in=@empty, 0x4d3, 0x3c}, 0x2, @in6=@loopback, 0x3502, 0x0, 0x0, 0x7, 0x100000001, 0x2, 0x8}}, 0xe8) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0xffffff8c, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x15f, 0x0}}], 0x2, 0x0) 20:00:40 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:40 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000002000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x58}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:40 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00'}) 20:00:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:41 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000003000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:41 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:41 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[]}) 20:00:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x6c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x6c}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:41 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000004000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4, @multicast1}, 0xffffffffffffff4f) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x1, {{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}}}, 0x84) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 20:00:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:41 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000005000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:41 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[]}) 20:00:41 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) 20:00:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 20:00:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:41 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[]}) 20:00:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x5c}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:41 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000006000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/192, 0xc0}, {&(0x7f00000003c0)=""/100, 0x64}], 0x2}, 0x100) setsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000000440)=0x6, 0x4) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x1, &(0x7f0000000080)=0x2) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000c80)=0x0) getresuid(&(0x7f0000000cc0)=0x0, &(0x7f0000000d00), &(0x7f0000000d40)) getgroups(0x9, &(0x7f0000000d80)=[0xffffffffffffffff, 0xee01, 0x0, 0xee00, 0xee00, 0xee01, 0x0, 0xffffffffffffffff, 0x0]) getsockopt$inet_buf(r0, 0x0, 0x26, &(0x7f0000000e40)=""/196, &(0x7f0000000f40)=0xc4) sendmmsg$unix(r2, &(0x7f0000000e00)=[{&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000480)="2a56df0cf2cd4cb27c192726a4523a83c876dad28f3cf8250a4bad86799021213dec32c93e3ad09a6a164ec21883c2bd8bdce0ad255ec104e1e4bbf464271624f5a47da4d201ce1b311ab82fcfe02ee32bdff058f740101ebad228c351a3a1e08b8804abf73a670683add3374dc7e4046bae703b", 0x74}, {&(0x7f0000000500)="f1afcd0fac5bd4d542e57f87df59c0a37234c855db233610018cf7c2fe3dd6a1719a2384194a6555570db768ac7e39b3fd01550d72fb31860edd1e068dc21dff2cfc728beab4a8f83e60cf628f3872b4fd738ee65488f64dcd82e37a34a3fb566783b3c65d5e7c20c61d2ba59bf6d0b505bab9cf6a163f97a99cb1dec29b2f2ecfe32af7e641d93e1e5483ea0e11ed9d406a5cebb8033cf07c9a859a303ae5c66843f2d97e210b1e3fe0d8a8305147726ffd36667e50f285dff46f56a96e10223533220f35a4786359354a9ecf2f369b082c60fe906aa3898752e833812c954367519628c1b414c53f3285dfb0a6f9b37c0aa01f3c28", 0xf6}, {&(0x7f0000000600)="d50824364a50f04040ccb29003f5e0b1fa9b6775371f43ce269f6339fc3d44076e050cceb0d819cc44ffae857c33786c8ef3739bc01517e35503aa447441a8c887d38767b3e7b98ddcdc1b3cfc8b15b36328c37dda5da703ae13217786059ba90fa888817e2de8aaa2e70768aba20e0f2ceed939751ae37e1a21883d7910379595edb11ea30a5c2253bdeff4e63e54d5d7e89f53705e626332bed44ea905dbea0fb04987d170e68debc20f2622d655e3f99ae1beb150535455e6bc9a819f6f7f123f0dd7b0178ba00748c822adffd825266edcc74f70d055045553602f643c", 0xdf}, {&(0x7f0000000700)="2fbbea4a2c941ae25d845cef17b3dd31f4264e7948bf8079bdcd13ee978db60d586eec9f1fbec7b82798cc499fd1cb07d263711beb5a568f8eca13c6b26b8edb488cd4f92324b2e294c86013623aabeca9dfd07ff34be6fd", 0x58}, {&(0x7f0000000780)="aa17a44b7e4b6bdcd034d1b67ec6fbe8162234518c7e7ea11bee3c3bb0136803e18f8161d463fb44d04e57d1bec07d4b5b4881299787e242229f1c72f8c22b9fbba49a06eeec170f178b7da29e3ad3a3ce67444dfe9a305756075e776030ea256d4d31f4dd75", 0x66}, {&(0x7f0000000800)="8a5ed5bda988f7a1443cba713f82f9866d591cd216981c70a4d8c674cf84ba07b7d7081c431b17a2668dabb8db03a8651c4659d6b2df6145a974d7043077f77d3fb37ffc3c95396d83911d636741a9878b97f1059b61c14c6cb23978612e0b14e18cb25af8ded8322e78665e3da9b65f", 0x70}, {&(0x7f0000000880)="2d36788b5129944122b1417494501f7d66c43342761fe8b62daa78c26f014f85b173fe6ce99ab422df6ed67513e645e20fbee3912be949292a2ff2648f4c3f72d5baef797cf5f83c76c3c9cf925b2e08ed40175de4928a1cc8499b1a889f75f735f7bdba9062b786366638ba5beee41c207d3f5f1728338e798aac2d27fbe1814ce3af144b96ef17d4654e1710e3e43a929d2c763b20b05ab85a50bf19733872f7342f8e924b53e542f3beafe2311040233ac23b2b7fd0c6a0ae449e9d85d2f89059bc2b4e37fc7a5dd67e0d0487700449cb991eb61b805c7758a1d55ae07172534be59a1558924166ea38b18f15765a002cbe37", 0xf4}, {&(0x7f0000000980)="4d1a36127f5f6937726ff5797e48b140b77336eec142001664bd50e47863774f021dea00b144e95574d1c6f4987f109841e6e895c2ef031c32e336cfee839d78e51705bc4fbed367be9fdcd1d229b9a05681991c91834e14f79a6d8639194dc1000ed935e4ba", 0x66}, {&(0x7f0000000a00)="97b853dd1050216565551d943dac51578cfe58d01cca0ea32f1537b7aea7d5e14b9ee4e976bc73b1d9e4667d62f8b15f4848cbc5377fe87b96530769064c1f944efaa00d06bc8284beb49f200d7145f63374808ad61474eb6d2435e04fffa308034fd97edfc686beb2b8be5c2a1b28703363fd8b939384fa158d2ed41563ffd13433f1066be7105ed2d9c9115fb9b62f1bdc4287df52120481e8e4bf1fe931487198492fdbeff7db1c9ef01a36367153b58a0c1ce5d55df89277df54dd88", 0xbe}], 0x9, &(0x7f0000000b40)=[@rights={{0x20, 0x1, 0x1, [r2, r0, r0, r0, r0]}}], 0x20}, {&(0x7f0000000b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000c00)="ce44f71c5b36d6f1464611d1304a86c1b77eb50400a220fe942b507ba19f43422e12", 0x22}], 0x1, &(0x7f0000000dc0)=[@cred={{0x18, 0x1, 0x2, {r3, r4, r5}}}], 0x18, 0x80}], 0x2, 0x40000c0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) 20:00:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:42 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB]}) 20:00:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 20:00:42 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000007000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:42 executing program 3: socket$kcm(0x2b, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 20:00:42 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB]}) 20:00:42 executing program 1: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:42 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000008000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 20:00:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x5c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x5c}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:42 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB]}) 20:00:42 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000009000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:42 executing program 1: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 20:00:42 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002000000"]}) 20:00:42 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) 20:00:42 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0xff00000000000000, 0xa6610900, 0xffffffcf}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) 20:00:42 executing program 1: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000003c0)=[@text32={0x20, &(0x7f0000000100)="b805000000b9260000000f01d966b856000f00d066baf80cb8b1cb2388ef66bafc0cec360f352ef20f44bea10000000f35b9800000c00f3235008000000f3066baf80cb8b0b85389ef66bafc0cb8922c0000ef0f011f0f09", 0x58}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:00:42 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB=';']}) 20:00:42 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000a000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 20:00:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8000, 0x177e13ad62cd81d2) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000040)) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:43 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB=';']}) 20:00:43 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000010000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 20:00:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) getsockname(r0, &(0x7f0000000240)=@can, &(0x7f0000000300)=0x80) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x5c1201, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000001c0)={'veth0_to_team\x00', {0x2, 0x4e22, @remote}}) r2 = shmget(0x3, 0x1000, 0x800, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x20}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000080)=0x1d1) unlinkat(r1, &(0x7f0000001800)='./file0\x00', 0x200) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r3, 0x6}, 0x8) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000001880)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000001940)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x10004}, 0xc, &(0x7f0000001900)={&(0x7f00000018c0)={0x1c, r4, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8001) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) r5 = gettid() process_vm_readv(r5, &(0x7f0000000480)=[{&(0x7f0000000340)=""/32, 0x20}, {&(0x7f0000000380)=""/200, 0xc8}], 0x2, &(0x7f00000017c0)=[{&(0x7f00000004c0)=""/104, 0x68}, {&(0x7f0000000540)=""/139, 0x8b}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/111, 0x6f}, {&(0x7f0000001680)=""/170, 0xaa}, {&(0x7f0000001740)=""/125, 0x7d}], 0x6, 0x0) sendmmsg(r0, &(0x7f0000000a40), 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/rtc0\x00', 0x800, 0x0) 20:00:43 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000011000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x64, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x64}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:43 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB=';']}) 20:00:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 20:00:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3f, 0x200200) read$FUSE(r1, &(0x7f0000000a80), 0x1000) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r2 = dup2(r0, r0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000000)={0x7f, 0x4}) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r3 = request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)='lo\\+^vmnet1securityposix_acl_access\x00', 0xfffffffffffffffc) keyctl$setperm(0x5, r3, 0x10040000) 20:00:43 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:00:43 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000023000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 20:00:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:43 executing program 3: 20:00:43 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB=';\x00']}) 20:00:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:43 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000aa000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 20:00:43 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:43 executing program 3: 20:00:43 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB=';\x00']}) 20:00:43 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000030000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:43 executing program 3: 20:00:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 20:00:44 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:44 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB=';\x00']}) 20:00:44 executing program 3: 20:00:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x1000000000, @remote}, 0xffffff80) fgetxattr(r0, &(0x7f0000004a00)=@known='trusted.overlay.upper\x00', &(0x7f00000052c0)=""/78, 0x4e) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) sendmmsg(r0, &(0x7f00000051c0)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @mcast2, 0xffff}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000080)="e5361fa1c322ce09fd8ff9b218a8785fcd58ac814e6764b0b7acec9055f5da7a96a3f6922dde9d78c3edebf4b36f79221cd6400397a9a6fc561075daee519a7e9ba4732b43557da82e7f1bf4b77088b3d9a24ac98337d22f951d18f105072b70ec1b3bced79bca47acbe", 0x6a}, {&(0x7f0000000180)="591b4e40f9d0670fd1cddb122495f20133eb482799ed4372fbfaf1a358faea85824d85278d5affe21050a0b1e7ae880ad3cdaa8b964d", 0x36}, {&(0x7f00000001c0)="00955b4857551403b2bdc20f9bcfbe014db2faa8e6f790314abc299b77fa728abc1963a57d0a1de02bfaeef08ebb29ccdadfa59699c775", 0x37}, {&(0x7f0000000300)="9d9231be89e2929c126bddad36f07fe4d9a8459e3731459bd832fb582560625dec371346a16f1f2c6fc13550dc7d3b1315e3800d799f881607e228408e386a4f09857efcd74f6d03269d77e1a6e77c735ab4835e5fe0b1194363e5f758c0c206b9d82f3f47364a3614ca0c1d86aac41a42e886463f7e4188bd044937ca5c8c25f7164e7d68881a14dfc70fa30ee307cd51c49ac6d8697dde106fac4d8e0ae8757ff6cff51de4ce18e0b2aa2997c89d93bf9d9be92ce4a78c7a1c576671a6496472a05fe22442f36b26ee6267789b48856a7fd7ae46e23e1d4dd4ccf15c29a832a04a3ab697a7441cfecea367b918e7e24fa49a5c8d2b30b647", 0xf9}, {&(0x7f0000000400)="53ad66487957556e4092097cb0a62879a75a8423de32a272807f51ece7936e066b7b6dce34ce6b142228a28ff4971f173a7e1fd1b03a8fd8d4d623e8619dd6a997194b82f108024da7abdd51044380bc25fbc68dd1df65c08ef608953a8009da0269dd4e770f", 0x66}, {&(0x7f0000000480)="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", 0xff}], 0x6, &(0x7f0000000a80)=[{0x50, 0x1ff, 0x8, "1c64f6282d1a6e8e6e3e7f7a0be5a3134fcd0f390cba8d31472a8dd07003eaf1238f2140f6469a4a93c5dffca16fec51cf606f38acfe4c155cb753f3a6b7a9568e25a4b2"}, {0x100c, 0x115, 0x7, "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"}, {0x38, 0x1bb, 0x1, "bddb5c1fe5ebc3f530333d47b9a50aa55c31cbfface10c1ad7f6d08af560ba5a79f3caf23d61aeb6acc7"}, {0x6c, 0x0, 0x936a, "8d56c6aac896cbfc7b619a3b82d228315205cd9be0dc291c20cef55a418bdfc596905a62283990076ca77d9f2af246607bfe472913373359797da6904e8b21745b5a7088f058247ad399a81ca9747dadb60db056c0256c8538f6e98580"}, {0xfc, 0x119, 0x100, "8676c2db904842e857afb03376a6fbc0f5b2526e312f7b44614e77fe5182b46defb1203b4bf6838e76c225b255ce5d4923eeafb92bc8e1ed78a3f4aaebd8ad1498b0ed8e0b0b4047e660821cae8ed28032c5a2aeb6b224dda33df28a6c19d00d6f15845f752316a56498a0713c637715da9bfed97d22450279336b389bbfcd66fb9dc939ae235ebfbc3d2466af61abc14b2d057ef9a03f10f556166aa415dbf7beec27e0761791e0fb325504e05d0880a61b55c16791a79d8628ab35190216cd6850af19061ea41ecf63caa8bb60c3b7c66a277ef509a381aabdcdf5acf67dc1f6a97c5b0a8c4542c2fba29b7bfc38"}], 0x11fc}}, {{&(0x7f0000000580)=@llc={0x1a, 0x317, 0x81, 0x7, 0x8000, 0x80, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000600)="8dee98dcebb9531d12350c9a1f8db0e7b7c274bf288b6fc6b6461a9566812345368fbdea32589a85bdda60e64d48afc67505459e4af440f2cdf3f8e0086013592b32e7b0dcd01c70246b547b8928a1e20193e58276b11b6a8ddfd1f7e0199ed808dc56c6902a2dc0fcd7e21c627a6baa81c754f5c23be16c51dc6b906de3fb3271a40c699811cb02fea188a0de7fe58160f86be75892dd0189fb0bc948ebbcefe8ac292bd3323d", 0xa7}, {&(0x7f00000006c0)="a653549dceb966f2efbe0cbc29991cafc5e72abff5c633559e1b1a1d30b9341abc56b7592d71abbb8014f1685fe6e0891597e9d39989a56b3247f8b349affebb4dc1f291074ea8d102c7e23a53e6ccd5004033303a58ab2e3157e97713411d34ff38d64bbc14d1a125cc366536f9ad61c12d0f7be8", 0x75}, {&(0x7f0000000740)="1b983afb2418e260ba97431c8ed49cf6b52a6f6b4e830a3d0db4f39d7a91e0358e8d8dd16a02cd5d3b3ac95f0fc48ca2d9e370d2826fdf559acfbfeb7719e0521699f065623ca6d9d6558657dcc48a5eabb310b318dc7a28a0c30ada1e5f546ca001095aeccffb5de7acd853447e4f2032dee9cbd76eb0b554ac7d82bdd70ccd113bf5c8a76260fe1e226fac845d602510a040adce3c5bf698ec55ced139f101b2bd250859f3d3ca", 0xa8}, {&(0x7f0000000800)="e7fd1a2ce3b64add664a36382ebafb66adb043db4fd05b0caf5487c756a0a777e406ef8e86c83ac79ecf9f70664cf55f78b9b284c1d419944a8b0300d3f3a45f03930401678ef40fafe23ac0133da2ba80098a097d97a38d2c0eb354b8ed066fd1768abceaa453814ebe5d937b21f999c4297ffa39bccfb060dde2f86baca75df1e6808aa71799fa5150740fc0d40bf995079db2257ec49cc3ef95a5ebefba5d6fd22fdb55123e", 0xa7}, {&(0x7f00000008c0)="1982c06e3dd6aa9d13534848dd0caa39d6b7db0eee0cb9a093649a0aebf5494cb9c2f33df00cecad6fb036d0", 0x2c}, {&(0x7f0000000900)="3cfbda0430de", 0x6}], 0x6, &(0x7f0000001c80)=[{0x10c, 0x101, 0x1ff, "3c0d848d39b6eba0ca6e6ecb143d13fa67c078520145f774f80775abd03e5b4008a21a6ebe394c4f5ca96849d8c0cf997b4c2f103b473629edeab0dd82d220e89234d3ee9bb7b19c6d0520481417b9a1932d3220a47480e1d5bee4a7b3c6bb1d6455c9c759a083a9123f6917557c6af5fce7f2b4458992890bed12ee3d694fd6da085a1cf5ee319d07cbfdbd18e13d138aa113d251fd009e090447aab7f8acdfd7984a92aebcff00110d926da80ff9ab57b6aad93fd8f1b529d3bd9df76619ff35459042d7f7ee4c3a49780e793d58b15a657e39090872b7485b2e4313c48f018b874b81c9f32797bc604c1a17fe2e07501cb03a12891941e132761b5074d4"}], 0x10c}}, {{&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x3, 0x4, 0x4, {0xa, 0x4e23, 0x3, @remote, 0x400}}}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001dc0)="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", 0xfe}, {&(0x7f0000001ec0)="a8f62041bcd19f5f00c73d572ff21d2f0b426c80f88f2c2dd56f3c24ca8e42d19f319c1aa4cbeaff4d2261b80756b951a66bcee8b7696919cb2aad5edb81f5cdc6f2051fcf2d", 0x46}, {&(0x7f0000001f40)="460977a64e6114a9f41dd2bd67153a3fd388e93df6ac65c6a3fb8fcf93a0545a96fe5c1e7f85dd066acabd64f70c1406ed53cd3cbb0d39c90160ad32f6ec7ce6c34e190a9dcfebdaae9b1e14863de85f876bf426c47ba5bb47922bc8c63b5e", 0x5f}, {&(0x7f0000000a00)="98b7bfecc8aec1938a5635767465e1265fcff51f5b9f43853e04b69128e09e2f7c7a7c6bd49761de4731f93b51467689c26ebe8120406578efde53", 0x3b}], 0x4, &(0x7f0000002000)=[{0x100c, 0x108, 0xfff, "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"}, {0xd8, 0x1, 0x5, "8b8bdf47f2578916198f196dbd3ece0b4e91a7ac2685ec4c78d93ea6ab9c1f6bff60429ebdd24510fbcdda872e9e5a38647e3f80de292ab75f857cf14478887264519b95eea50d6628752c3400be154e62229ea1b656adc6e19807a222652f8204eddef0b76d862a08b6433608ea8570813ee75bb4676154588f8da5497ee46656bcacd912da16a99c3dcf10b384d0259659a4548c55e1d883d436813bf344df8b4c11e83cee936809678da1410e3a01e613a2cd976684d7a8c187817701f7d300aacaf2f3bab7b65165291c"}], 0x10e4}}, {{&(0x7f0000003100)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003180)="59a0973d3ff15ae43c8e3d07a6aca05ffcd2e095390d4987dabc1590823b5ce8569fc7502d8bcd45c046465bf8ad672dbbee4eb80e60777c0826d8e0a5c7c55fcb47f2808e9fff773d9c4d8cead423b1dc35dd77f60290ea6b9065037c1f09c891144dd95ab6c782fd6f00f80a243b4159d9444c26e28f", 0x77}, {&(0x7f0000003200)="7303777875710d5268f26c8b19f044c7b180eff1e8175aa9bf92f26a9596397c9abbc5d0576c05ff8ceda469a1572be70d03b4b50ba97eb4d16ad0f3921f5a29aa2f79e17266ea10", 0x48}, {&(0x7f0000003280)="9a816b26802d8655e2256de55216be7fcc0e2a29580fdbc097fcb42136790df3c7414298f68270fd4ffa41ce1e49a3c3063aefe3c18e19cb79bc926051f3239dbcf1ff8b2636bd922815a48108fa52f7b893d2de78aa2d70ba1acdcab37fdfca345372713af34b6822e93a988913037837d3ec9d6b31957490c819d4cfe21b5057c2148133f40ae96bdb4b328987ec541d9c8de74815f65a976bde569eb3a74e722bd865d46b0759f35ae61080", 0xad}, {&(0x7f0000003340)="e542a7c9f0c78a0f24b354af171712577473360b2ece604fef51b418b8ef885d6beb5b8f029af690eabec39e89481acb57e9d41717a6c5732555d45d4978156008bb3ced198c1b69dd2b37dd7e72e6b8321531c1108058f65a7a7a090d75966eb187605cddedb4b05d9968a3ed3c9b2e000af685dec070301926895a6bb55e744a83ee1caad19919998dc95182a21ac85960df436f1770f14e4ef2149c443703290803e8c8", 0xa5}], 0x4, &(0x7f0000003440)=[{0xec, 0x0, 0x8, "cb359f75de2e04197ca24f42b477b2cbde1d6464f5aa02b987125698915d8a1abe5912ed1462556587b2b1599fb0e5850900efd64f2bfc1fe335ebcac7c6ddaf01d91b2450bca2fbf667b03733edb498fa05947a64ed43b5dcb086d8d19906722b02ed104bc03776516f43fdcf2673cef17c5de40f7328154f1cfc0a397e285de328f8dc8f84cbb49b9af97c013f1d5b4155647d1a22e47dede7e8ab22d3cc288bb9acee12973fa51e851121ca99c947921d7a3513f7d06ccc87cc72ffe22287a2cc270d5edca69974f31263802f06c4974472209a864188852b89e6595a"}, {0x5c, 0x109, 0x1, "24420b7d23ed730e5b79ba09ed9e905264b539027b88f1d285942f83154e6aac4b0975f55c8195016208f58eae519fc501ce9dd9c84fa83ff30d7614e7d4f2fafcfb5631a03b5463c409a21ba106df"}], 0x148}}, {{0x0, 0x0, &(0x7f0000004880)=[{&(0x7f00000035c0)="7d3c6cd68495262693e15311c3643de61cbf7f7081e051c552c076bdc9c11b3017fe21070a6b4088c6cd102cf0743a9adc4ad0d95fc96e1fa5c050008f263e25191f7d35e373b051eff8df046082a683f68e9bc4eacb710dd3ea1c3792f238ad234fb14833a729cf8574163f64fe675425c8b90ecf55a9737821bbf3f9ce9c2934210e3c7e9e4b489662e72120e43fbcfa5d4e0ee332cfc104efc7645c137d5b7e4c86ef98", 0xa5}, {&(0x7f0000003680)="e50dab965ce37501fcb96283528fc8624518637a5c2089f009", 0x19}, {&(0x7f00000036c0)="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", 0x1000}, {&(0x7f00000046c0)="9992964316b3f733e904b18619bcc9ad7605b96f5b386724cc580dcaaf335c625902d011d53f261015245e2642efaed0706f11b9d8705285de33e9fcdaf933f1d1da74ae50b0c501", 0x48}, {&(0x7f0000004740)="ac4319ac859aa9e44cba10f94eadb6948dfda7774278f79dbf70cce9b1bd851b67d9a1de0d3018c3cc939c2eff30c8dfb201ac02c530ead39bf8aba7c1507713a6bfda3cfaad25c6992f61", 0x4b}, {&(0x7f00000047c0)="59b6fb8c28d1bc901a16a72fe81cc9d2721b962a1a85b43a11de2a6991e9162b1c0710e3218822a339660e454293ea59c7c47ffb0af16eb1e046d7aa9ffa49ff69a4b3da246032f824984eaa6f63f23fad056fda23ebc6165a7be2c29e1d11e6184a0cb3ce764913a8b066d5f9db1cd2364d338eec8a233665eefc1ae31dd1d077410b88254a75260cb6623e05de68d6d07f07fa0823b60c61729d5b5196bb3f7bf92e03b247bf8d86cf777d37b3f60e691c414601592b", 0xb7}], 0x6, &(0x7f0000005340)=ANY=[@ANYBLOB="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"], 0x130}}, {{0x0, 0x0, &(0x7f0000004a00), 0x0, &(0x7f0000004a40)=[{0x108, 0x112, 0x9, "a5db917455b1b56a27514f6d6a25b797b49eb1c34f66afdf06a22b0d03f7cf20b05117c1d9198df0def88769302ee5aa10878db13403b35e22e34c3cbf2e5cff1179b42718d7283bd158ae613b13305584933d25fb5536876e80084e8f18dd88990238793529db465aae6c57313740164d58e399d0cfef2e91c8e620fbc542c006fb8afc390636dcfb81142b32cbdac0d54b127e9aa62a1cc31211fce5fab4df01d338766bfca7a074d2d02bc026077395c296ce6836b9275d8433dc71c19d05ca9a0b4c888015899d851baf66813efe6c6a529f355edefe938784ba03310298b307d346d526d58802468058ac5f3f32bcb0d2a792107ab5a4"}, {0x44, 0x29, 0xc5, "42fbc4d06443f42fd55932bd90611a0c6e83b468b2e6dfd53de1a3ee4aabad1adf91acb139316e0c47efe09e66fda48338779bc4e5382d"}, {0x98, 0x3a, 0x5, "c9423439d384cf12d279ad277a62713f9a9350a819cfb01a406275492814f9a6f9e128e7e0a11051ceff032d31cc91a6c30b5b4e321afa4e82cb4e78f648f8594e877a8f03d7e9550c2ded0ab7a8f8fa4ad2f9815a44f95bc8eb216ecd3368b6b37512e6f327ce8fe0c2ecf5c703f5bb92d71a5b5fa73d6e3b7626cea0d4db6a306ef7c67d636851ee49abd0"}, {0xe8, 0x0, 0x4f, "bc20956e73e6cefde8e63099ce6c55067029a09fea7761ae50f16ba939a64dc0cfb580f9b7c920745486940cccf05b9a7c6bacb8c934483ecf73a8ac83d5ba2e93ab36a88b29174c6c379da0f2d9c438a901dcb98def5a33a0617b09cffa2cefd031968dc0a0954ea975c9d1e6a851981dded18d6c90ad3d61569083c021a2e78be93e7352020bd6c6f150fe77f9683c1a3ff7f92ae8d9d7480da9c12e890caf13499d20b47e488e6ac051fc3946ba832a7d68765eff84fa2d5c02e69d724f14a883682dff846bcf11d2720ecbd908a5356ff940a5020a5864"}, {0x104, 0x10f, 0x4, "007d2ae56e1d740accff6fa57b8c7426836dac391f9d898e63836316310ab2cb484ff1828f28f16377e10b87fa5644bff84d978f104d5ce07e51eb6ade80a1beb0d81a4c990b1e0c767981f6bdf48e7a5fefdd8b40bc6a5024370c3e09b282644094c75089314a08f1699515ea3415f67bb681cb169c33795d7f3bda03746d94c3a109c637030b167b859c2f70c94971723de0b9ef7e75a8b2caae6f003937274ee5805c1b61e80416d2bde51cfc04b31d18444aa6b9b05dd93e79fce2e644d595f4b7d9b95afa5ff718f603293c86b222ccc6e25b16e17274b5f3ed9711bbd96d11c36f903bba214262e722318fa761f5ab6aa5221b279a"}, {0x84, 0x11d, 0x3, "4d445eabeb7b538aa7413640bc508f051b813bf3f483bc1fddbc34b4afa06078b88f91043cc15ac4429ac47b1182365dd2a9f7a869237727ae000da2f74084af0d32ae57d447a5b36c6af166f56bc54ae4b4f71d8b946356c91f4c820639cdb9752655e9d970d51cbbed12466c9400e1ad892b835e1ae4"}, {0x50, 0x11d, 0x4, "1393747070a959d64b3a1d2927926ae5c7c375c6bc6fd1422f355b27ca6e7f661e5928099e37a232a97ef38da8251bff8a50e2ea98927596834056b570d69f09365532"}, {0x9c, 0x10d, 0x7, "e9dc1b00cc418fb442be330a9294c57a03a16917ce6754f2515c5c09cd4c25958392b338bc9cbba3991490d6a462dd920f2b429143befb076259ead28b96e27e5f69c4e1f56793337a030a132f98eab152f408b74c3abf1a5122f075203cf8bf04c12c2ad6140cd246ea8bdb9341a3384e6c2dcf8cbae90a235e3cfb0eb5f0f8ddcc4822de51d90edbff37c4b98a3084"}, {0xa8, 0x100, 0x100000000, "511d8c585f9ba5b8250d3e7d3b38d00be1ed358481c71d13318bf4aeffc1c588da6b38865c1bac9ca75d602c808e7d20d25742f811b7a1f259c3520432300c94094e6d3f0daa2eae142d6ee25a53a6280cc8be6828a29ea0d28156667f1e11eff4d15d44ca2305994012fc8c36ee9fd0abecf7b956da5a4e59e185310e29ea71fdb90195ffb12bf04e972a82b5da55732ec7b269229a36b0cc7d0642"}], 0x5e8}}, {{&(0x7f0000005040)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000005140)=[{&(0x7f00000050c0)="1d785501c25102c98ec01e04128c91a7d7c3a914ec78c0061c2ffb6c2b61197abbcbfad47364525c426d876666b6d7957b3727fae074adc12b26e6a10868de21d2eebae846d68a40", 0x48}], 0x1, &(0x7f0000005180)}}], 0x7, 0x40000) fallocate(r0, 0x8, 0x0, 0x952) 20:00:44 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:44 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000050000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:44 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB=';\x00\x00\x00']}) 20:00:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 20:00:44 executing program 3: 20:00:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, 0x0, 0x0) 20:00:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000000)=""/149, &(0x7f00000000c0)=0x95) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:44 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000060000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:44 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB=';\x00\x00\x00']}) 20:00:44 executing program 3: 20:00:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)}], 0x1}, 0x0) 20:00:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, 0x0, 0x0) 20:00:44 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB=';\x00\x00\x00']}) 20:00:44 executing program 3: 20:00:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x6, 0x80000) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000040)={0x0, 0x8f, 0x1002, 0x1}) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:44 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000070000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, 0x0, 0x0) 20:00:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)}], 0x1}, 0x0) 20:00:44 executing program 3: 20:00:44 executing program 4: 20:00:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 20:00:44 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000090000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:44 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)}], 0x1}, 0x0) 20:00:44 executing program 3: 20:00:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06055c8, &(0x7f0000000180)={0x1, 0x1, {0x57, 0xd5d, 0x4, {0xe0000000000000, 0x8000}, {0x7, 0xb9f}, @cond=[{0xfffffffffffff35d, 0x10000, 0x0, 0x2, 0x101, 0x4675}, {0x4, 0x7f000, 0x3, 0x1000, 0xfffffffffffffffb, 0x4}]}, {0x56, 0x7fffffff, 0x9, {0x80000000, 0x20}, {0x9, 0xfffffffffffffffe}, @ramp={0x100, 0x3, {0x4042, 0x1, 0x101, 0x3}}}}) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000a80)="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", 0x1000, 0xfffffffffffffffd) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000540)={'hsr0\x00', 0x5}) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000480)=[{&(0x7f0000001a80)="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", 0x1000}], 0x1, r3) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f0000000640)={@multicast2, @empty}, 0x8) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x0, 0x0) kexec_load(0x7, 0x4, &(0x7f0000000740)=[{&(0x7f0000000680)="31156374f03daad1641f40e7aa16bd683b151d741bf314de75abadb9a0a7b69026e6a8b6cb", 0x25, 0x10000, 0x80000001}, {&(0x7f00000006c0), 0x0, 0x3e7, 0xad}, {&(0x7f0000000700)="515f0e1663b565864c14cba3a245b6b98ae4a0cc4b0fff3070da716171a6bd0bd75d94e9b5", 0x25, 0x2, 0x91}, {&(0x7f0000002a80)="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", 0x1000, 0x20, 0x7c3c}], 0x3e0001) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000300)={0x1, 0x0, 0x1, 0x10001}) ioctl$DRM_IOCTL_SG_ALLOC(r4, 0xc0086438, &(0x7f0000000340)={0x6f4, r5}) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000380)="401147b6363a1c60f1db06ca8d710fa656b59976eef78c7bff02aa2812194c571fa9fa201358d3368b066848f70a55cc96339dd6432f81cfad1c57317c329f82d8f11a1a9e7374501fd03c8ab719109ebe3611e49aab9d1cd95113d319612122ebc04439114b57f6480b99697d34eb31a5d01910051d2f4d5109117ae12d92d86e95554d204010cca3007a494ac01f2e1c2c59d10dd27c1ba2ba047c42824bfc116e27ede33e59eb5da2212318808fb8d2f036beecfabfb9f8e0a0", 0x38a) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x100ffe, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000580)="02fb09183a0d36935392db5b2575d48435e00b71119d32010cc919ea110fb066c27fc0d2597a9fcebcebcddd3e4cf994b548669917984b9ffbe2bab5a91944dd236eb22d89ef6f4215b81d48badfa6a17c7dd5626a6ef82190b74be34c52ecf5eb5e847edb813e674c7d878d90b7cef6dbd585981ef120ea826ac49465e79184dca329030761d14b906f4c3db61c1ffe92cc16933fa5c1bab3680289584b4c40") sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000000)={0x557, 0x8}) 20:00:45 executing program 4: 20:00:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 20:00:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080", 0x17}], 0x1}, 0x0) 20:00:45 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000a0000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:45 executing program 4: 20:00:45 executing program 3: 20:00:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:45 executing program 4: 20:00:45 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000110000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 20:00:45 executing program 3: 20:00:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080", 0x17}], 0x1}, 0x0) 20:00:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffff0001, 0x200000) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000300)) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:restorecond_var_run_t:s0\x00', 0x2b, 0x3) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) shmget$private(0x0, 0x1000, 0x78000023, &(0x7f0000ffd000/0x1000)=nil) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0xffffffffffffff9c) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080", 0x17}], 0x1}, 0x0) 20:00:45 executing program 4: 20:00:45 executing program 3: 20:00:45 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000230000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 20:00:45 executing program 4: 20:00:45 executing program 3: 20:00:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003", 0x23}], 0x1}, 0x0) 20:00:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 20:00:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x501101, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000003c0)={0x7f, @dev={0xac, 0x14, 0x14, 0x23}, 0x4e22, 0x0, 'ovf\x00', 0x2, 0x1000, 0x23}, 0x2c) ioctl$UI_SET_PHYS(r1, 0x4004556c, &(0x7f00000001c0)='|+Y\xd3\x00') ioctl$RTC_EPOCH_READ(r1, 0x8004700d, &(0x7f0000000280)) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000300)="cad15f5662c789a423c30f0f96be03861ff4e1c53c5c391a58d780fe4199fc2a9e20d6e8eb87d37256914e8cd3cc8f9c8a817a4f3369f5ea636288c28fe124ddbb36965b67e2882c10b7242c82324fde7fb11ce3adc74aa0096ecdc9e67c3fc02aaa0cb21b11bc2ae8a2aabc048501652ec7830578639dcd5606d026f78609178ca8cc18efeb62", 0xffffffffffffff2e, 0xfffffffffffffffa) keyctl$instantiate(0xc, r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='updatl default trusted:+systemmd5sum.\x00'], 0x26, 0xfffffffffffffffc) setsockopt$sock_int(r0, 0x1, 0x1f, &(0x7f0000000080)=0x44, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:45 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000003f0000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:45 executing program 3: 20:00:45 executing program 4: 20:00:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003", 0x23}], 0x1}, 0x0) 20:00:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 20:00:45 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000400000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:45 executing program 3: [ 754.680264][T16609] IPVS: set_ctl: invalid protocol: 127 172.20.20.35:20002 20:00:46 executing program 4: 20:00:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003", 0x23}], 0x1}, 0x0) [ 754.749678][T16609] IPVS: set_ctl: invalid protocol: 127 172.20.20.35:20002 20:00:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:46 executing program 3: 20:00:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x500000001, 0x982) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0)={0x2}, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040), 0x1) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'bcsh0\x00', {0x2, 0x4e22, @empty}}) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:46 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000fe800000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b48000001", 0x29}], 0x1}, 0x0) 20:00:46 executing program 4: 20:00:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:46 executing program 3: 20:00:46 executing program 4: 20:00:46 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000080fe0000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b48000001", 0x29}], 0x1}, 0x0) 20:00:46 executing program 3: 20:00:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x7ffffff9}, 0x14}}, 0x0) 20:00:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f00000003c0)=0x32) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000400)={@empty, 0x0}, &(0x7f0000000440)=0x14) sendmsg$kcm(r1, &(0x7f0000000940)={&(0x7f0000000480)=@ll={0x11, 0x1f, r2, 0x1, 0x1, 0x6, @remote}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000500)="6f900fb433f68faa44206a15be74bc2f14ad8a4cbdd3418a8cc2e16bd81248b59bc7285602597ced909eac69f576b317407738150dcde1489f1f76e581e44eb39d541cda2eef15e363ab07f5b670167fbb50f0a6b3f87b908dc8f214bbc2bf8d23065b2d9abcd59e11348b1b6436381d642c493da8c0cc4700e74f660b4dffab2e315671528e5d05960d8c453ee78d8d678f7887c35ba5139a425fd2a6f299cc4febd8c028f3b57e34241df089a80560a4", 0xb1}, {&(0x7f00000005c0)="7bb82518c2d5ee72224643f1ced44d312ef9386c4c0d225109dab5403aaf1e742f96732b004bec50fee0aaf57a0422477b98b9b4a9ef1f8536ff7da127c03b6252a7908e52c27b30eda9658b33557da4db83e1de6dad466e398250b2449cc9a76d98edb1bec78221ddf47fc5730940ad9edbe2532c5e16cc4b05a66e5a36a3136e73ea68e9233e01ea19be165c3ed81e22261de3f5bc565d0365c34238d00cc4366e3d4cea17e1b922045fe6", 0xac}, {&(0x7f0000000680)="69805cfd1161417cd8da3f0da836c8ebd1fcc002d3410c5c37e7ff37ef2bcf2d6503e0a3c2d443be77b038e9ee9940dc400fd2543ab685f4d5643699c5f1657658136886246981f2e1c11b81f9ab8bc0d006547826d45807b4aa5d6f271984e4120738b89799907c3b6446721e234b447141538aa01e64", 0x77}, {&(0x7f0000000700)="ff42bf8cbb862346e1ba21efd15d55c65935ced5371b263ea7e029e73f717bcd542cb33bf4f7addac3f3925e975544c86cac29067e270bb08356ffa5f7092d44f6652809920045276ba5baa86f281f7d32567bac81cf332751c1790af2f27bc7c1f13e1c1ec760c3c241b66f3e8d5f55add703a3", 0x74}, {&(0x7f0000000a80)="ec1ac64059f96bdbd0f51732d2488440bbc518826d542ca02ede337494d91e353dc1e78ad342ad54ea22f5a9705e1fee2a79ae9372ee7551ae9b16786664e53b32e42842e24a293f5bfeeb8643b61a0a3025b6b8e6bd7baa467ab55516e10b2a518ef813ed5c95aea381a8a5ff06b85b8ddcf38a5a5f736bebe27bd35362c18dd3d47fb97ee9f7878864f1a04f7abd96009e5921aeaba97c7a018ca94f0542497eebf554644fa40448602685baadf8441af426154e042ffb24d2b4d0af60a17266ffdcb6674c09788a0b5d7afe54b05504e8f0a20dc7481308fa379fd7280630dc9b97a50595c027ff2828d180cfc94acbe0056b692a77297b446318ff5780190753509479ea6e7a09ba390a5820e33992cdf934ee9f68a55d21a85ccf9cf0f1d8a877d749ef760a94aea3a77dd587bc111f1413e8ea0ef85991914fe013718d6215e297b6b0ef606b6cb172b63f82086150c81eff38a72da51f4024564f7a50796e71a0d0c7769dafa66104278d4b8c864ea05a5469346feeb129de6eebd7b51b90af3496b6975b6a22d2a6a281c7c46d779653fd3d60a7c071538be02bbacd6855d90fa7a2810db314c77d0ec55d55b204105fd55630651fc959d1107a7efe98931afa6d55b9d95993f9ce559373a8ab1e967646e3876dbefc2a81c642c5f1a98e880f064b5abd124abac45b5e4b4d1196bc867763ea868135f7fe089bf507f1ac0aedaadba6457da7f79e0df6055addfbe5ae2bce2e37e7b5e43f89802b93bde9cd9f2bf8cdac9bc349b2eecfe2175d7e622046720ef43deb2a50284c08ae0ed3991f06db65d5ba4bcfad6da774354fa3cc51d64410450d427054b1144f6e22289022176b147823bc52136cdb8f361692f0def5fd67a47ce21af6de45c3884d6dd8739c01bd1f92e35a9a3d8ed9022ec92322220b0845f6819b390a88bdfaa996b9789d267cbca6acf89641fa36ebf21f0ebfcc224dc7876969dd5f1af0afe4ab17fdbb6b05d4e6c76f59d8c8d60bdb8b1d7559e1c0a5bcd4664d301621467d2ad815603e6b10d2b09d79fb83d9c68f03b037bab0c8d5bf9ef409c99da7ca3907eb20d51b6732e7a7bab1ac01df10fb17c158f2d9d6ca173278a6feae696b5abab14dfb3447b943452fe29439d6307cae8bdb66740bd6a6d36321daf5ffbeb2f42468b507990e1c65bcaa1ff197d48f133e024a7e04e0191d64cf05eec17c88a038453b44be19ff474cc975944ee23c1c5c7fc17f107299cb1921af5ccd68de8d6939ce6c07fc531f8a97cb6502d4a86281c15eaafa17b123333aaeaf1b3b181161dad2126c73b2a8f351798c901e4a71b4b8b1455421dce7d04fe5bc4baf5963bfde8743c0fc6de96d916baaa677fd85056c66f0dbf38510a5de45af7ef19b8ac0b42cf13d2bc88f7a09cff8da8ebd137ed553c1e62b82253b7da5b651411b691357d93cbd7be9871c02cf26f35ace4966c177068086fc4079ca2c2aff78a316122faeacb32f5d1100cd3a7257148af130f83183a205b56dc6f625592a80bf05bd9226c1321d216197be7f264211556f7b9bcba08d1a431363c54515f989809901e9ddf1c3818811bc71c50a499e776e4e63146a7ca6cfe386d64aa1280bcb0abb87778f2cac35e37e07f191742ae741aeb0abdc6045e87d70b2e4d31410a84182879cc480b56281d0a0e222e46bdfe462371ee3577ab523fda566c8fab246db93cc23c6bd77de2efa3d2a75f261424942b5dbeee83cde87df4cd72f33f3e4d6f9a26e240f6dd7e0abe26c1fb2adbbbfade2c0343634ac63c885918cf28324778c1cfccf7d8cd87abb7d78dba143612928df7a260345e453657b1dbfd6d806e647212d7dda674d6c9a51930236da03c08b6b116f516f04c45f31e35bb8d43f620690369c9375b652e7c179fe1fba836f3c7842ef96f2bc156a615c27f07b18409051b632d374c2fec50fc62525f4a142f2f3c3b4bbdbb400b8bb202f75a35829bb4a985b23c0ecffc61b0f20d1a4ba57e522fc8366d27f980459fdf150271f0baa63b845eb7caaa5278fa47ca8a424e644cc05a0a599d3c650d58fa39e6c0b17299d7cddfd57c102ec7239b4aa37cfa35a554b33385643f74faa99f7ded1efac831021e3eb3b5c691faab2d904dc566697574c693bc1900a1b5992875bcabe1d9a7ff52ca7e8dca0b5411221ab3df5d9303e6150f15974a8c9a139c38bfaa72107b0233a22712e52e4d126c336d35e0b53ae1108706078f34adf0112f3d265c474b75c4f9a19fe7fce2f29beea76e8bd3859511cc8159af2d08c77ca403b2496c715b4006b8079d81739885081bfc57e02085737b8cfb53cc8f13ac69dc90ab372a09f76e419ecb4cdf22d7844ff948921edcd3b61d92eb2f5eb743aa090a977ea0ce32ea087331756847f4002a5979aa6750445602f900e6a6da49d06293d25d022bdc9222dab8f3816dfd84216db5a7b3d08f984cc3b48d8361361c076418a2bd2e577df6e39c1ff403b0e21c5139d5c2fed8228d3b8cc1b047ec7e9ac1ed8ee331ccd1e9e4261abfe7c76f23aae2054b8634da65d0bd9451b0a0cd4f21889a554041fc7cf876ee5f4172c25cd43e9d6e29f0b7601f90d9fbb005ab71baa57aec1d22176484123d6b6feb3bfaf9112a734eb9383477cc7045fbc1c420fee75d93429cfa9a090566f4967180ea1644d76413cb84550d4df5335f95e2887a50da02f85319f063b508e5cf370a1a189951f830ff0e6e8dd4ce5b14ee64c83629b19588a60b0172c15746fe994f52400e5f02dfb7a205d9c9e79b3ab6fbb1be627eb5da7d7ba222d561e3193ca91a76b2f1993d779a4d62e634b5946557b9b3f97a413992bb970cc0263e857e5067ace26ac27554b4a5f063e1afc328c3641d1bd001474d9ffd378e05bbf81266b0e9363a5f4d4c167f16593373aa21ae3fe52d8bed19660a5675ff84c7fcfb544a39573def1873d750bc7d7197febf6fd1479c6faf8c58a46d36a19b8519505360d8141aefb2a0ee206525d7d683e597d7ecc2b929c60937c60e731091681675937e81eb43a851a281d495af7a90df212b5c26cfd997c5f2974a3b8b07af82f318693f8bbb138f69117f9852f8f6ee7420665fe4c7cd2aa0ae568ab7c0f6f395c35409bf56b7552764a09fca2ec3a29cf19bbc7fba52d66fa9935b4d701032d2f819ae82f429460a7705ff64759f730939c5bddd0b809bb92908bfb5678d18a5510246184714ffa04e722c1edd722f876aff2b8328f55f6d27e775dc29a3c3431cddb7732055ad40890e2e34e005c874fa833638562bdf6ef12819da91712e531be58ce16c6ca1a2de0af382f60e1902c852ec045c46867abafccc718558e0dbb10b1d6f5e77aee5eff9f861d36187fb154e57075cac848ac2568fd5bf9de30942c9e21e4f5ea07f0883a2d4c1323565972c18e72b8594deab08c2f4e0fd532c0569e994f9ca4f36122824274b0d4b04bdcdd41ba8ed3ae3ed33bcf3c2e422d96d3190c33380f56f186ac6c0b382bb1484aab1ad01e3a1ef306a17946090448cb34663109375d73b7ce7889e9d05f2bb5d48e3a18b5743466e2c0ed523bc999d21d327b61e0a9efa470dd71aca55e1e0eb8ac3eba0ed2ff1130fc9730d76c181c7694e2e62e0a75536f1cf0106d0af85017f4c7d5dadc15f736e60115e1cbee2fbbd84cf65ddc61cd1d76ccf7ef6c8e807155fde2aff2848af9e212208645e70afaabdae89a0fb3c7b1eee7c34ae1c44e8dcdb2eb6ac079c1d7e0fb469e5c838d45b78a64498c2f3a11b89f37fd14c12fe7055df27a568f6e508087ad1cc967faefe5a07ffaf5cf58b288a5ae3905d246391c99911526ebc6cc3b3a930ab60abdcd1d8c3ce49cb6b59130b9377a88c0ab63ffaca994cb8bb7d9b8b5838d9f85e931695f555539633c3d61982253fc17fd8da164ca859787e85a872903e20091b249cd49ec50ab064c6068f07cc0220b9f371c7ff7348ab3d40d1b59801cdebb534f53a1aa2f61494a1b2d9e836a013c32d73e8f881494040f8823f4f1139b397aeb00240a6a3a8386572c2d5a0d125f8b8b98a90500186ef25919cc45c87ac29ea5d3d96f31a9f66badbad0ea437ebc97fcb3de693d91e2313f0fb081007f12912a04ffb7463fc909a4ba2efba326ac2cc1a83ded21407b41bcaf62b64ae2457f87b61b24bd94836f1d88afe78facf5ed28af2a64e861a17f2579a0fa3c47c1e3f80f12800c0385eb65525971ac89675fa33d9257052d49db1d8e8bb216ab1ded4a84e4a2939bbc13f10605c9a7e4f8f7aabfdb17aea32414c86cafa8f785bc6e9c26f0006f79f8aa6a9cfcdad7924b6d908a88d7c0ffead98730a41fbfeeb9dfb9444fb7078a7b3a81792791accd2706fe6923c0e54e554feb9473a888b3cc71980947c7e5874cd388110dc5513f500e082519d97e9ea16647447e6823a6e47cbd06fa89aeefbddecfcac672a3e6887a4be48de84130ba266844eba7575b9b322bdf990c73b3e4524e2f201e8bf9cf2a86f1dada935b36fff0a5d00fc7925667050d9f9aca820e98b788a75223d863b7d58598ca16411e7c5230a8362d76b7f0990398c5749b29526d0d3deadb01964eb0aafa7c4186c55ccb6098f8ce3017ac172da1dce334685b93bdc689c7d8da04f2a8775ef8220a0c9479b421920fdfe7dd4a3fd50d7efcd79c6d1ae9adcaccf68b35b805265b3fc4e6a5300690e14f188b1dc76c7476b47b0940671fa7809a1cdf65eee483924254f236fdb53132b7586f5dbe79fa488b92b183b6c6a5a0b15912fcd4cd5e6d70a65bb114efc5e2f299dc52126a8584ea01cf38c13f8b2f461c983cfd2e1361c4cafa294be2505f39d7ceec8ebd498a7ad55407c856a8938d7371bb68ada178c36d76422133b9c573ba2baafc441417e28e2c1dffdd22261de100ae139fb3387467b284cd6fcce677098aaff4c9740dadcc37221bebb5e90db4a3776cd65657cc68621e8e3e69ee92c053b06240bb0b8f6917f95c3c1f7a5cd855541bc21c5f75240bf674106b0c5762ba0ecc35f37b922794446043ce87fc079707af2737aefe21503c6757306eadc4059db6c409ac46a5163f16dc90f741f3551d75cc9abd51d20a94f37ecac46ee4a1c30781803fa6345bf700a499292a61184a756d1c1f5d53fe602bae4c620e4d8003fd43475717da43578beb8111508224642ad369705d71317457802d440eff60e8f404b98f9b454422bbf7b078663840f1ad730c9eda656ac7b050097505267cb9834e35ed4c4c7e830873730ad37ce044847ae2b57d2ad2aa86228306a2dbe7fa37c18e7117443178f771555560c2ed189736fa2f34151022ca7247501c39943d83e0893aa91b98823c1a37391818b22d8af59cf20b7f0ee70923ce75e261e6f4efe5452af82dacb24898e8cfc42de753d8e37712f8e4583d7a8db98677950b30cc23c261016b2e8e274359c6bd5e6fff1af84ace081105af38e40ca7a45821f7f958000218e590d01dba56a4c9608d192200a48a4c3bad0f1992b3781107ac582083ec18f6f9c11949d97818589a833808249e861bfd80735e1ccdd129dba0ecd09e491deb66b29993ff01c861ed654ecd7797fbe38e7c42d7ec2a67d0d596ff6aa7bc97318ce9208d56f1bacf17235187e2bba693a7fd9372cd5665a4afcef3ae09ffccb74c6293ea1251ca223b17e4284b23533c126d7d5a47d18f2c2faf7cd5e1c17505881cd8787306d4c48df5fceb25594da71f5dbab6f6dfabf443c2ae719f0d7f80379d0ec52b49eb56e210", 0x1000}], 0x5, &(0x7f00000007c0)=[{0x6c, 0x10f, 0xfffffffffffffff9, "d84edcdc1d4cf024de2f0773292f77c73a1b0d7806237a8fca6389bdcc9131eb87100ed140d604da381f0b62eb575f697ffaad3cba16b8762624db04e189c7ae07836e5a4e157c36b2e07f0d52e71ab080a90e5b7f5732ea3a473629717a48"}, {0xf4, 0x10d, 0x1, "2b323d9650ee140ec47ff915b96b5c9bf0f6fba5175dc36fad03b16dd04db73e2f3f857ce7711654c9e9200c6c86c719ea2fec15ced9b8ff084f1a2094ce39d380d7ff897ff4dfa6e8c813f8c617795c3ee8c0ba14185760c983240ce9e2dabf98813428750bc037c86d205cf0e2809cda6f4fcd2982e80bfb4046784a2112a59926a2652d2900b227d588472953548ba953e224314932ecc63ddc48bb221436ffc323a9ec776adf22c6677312177c243aef51d1e570809301ce599159905e24aa62e6c6d804ca4a043a3d98c7dcc90f5a47071485b9cc41cb66ee9c22ff40b1a4d3d6249c"}], 0x160}, 0x20000090) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000000c0)={0x9, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000280)={r3, 0x1}) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e21, @broadcast}, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$setregs(0xf, r4, 0x7, &(0x7f0000000040)="259167b117317023f5670a4b81d704") sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0, 0x0, 0x0, 0xffdc}}], 0x2, 0x0) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 20:00:46 executing program 4: 20:00:46 executing program 3: 20:00:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b48000001", 0x29}], 0x1}, 0x0) 20:00:46 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000400300", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1}, 0x14}}, 0x0) 20:00:46 executing program 4: 20:00:46 executing program 3: 20:00:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b48000001000080", 0x2c}], 0x1}, 0x0) 20:00:46 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1}, 0x14}}, 0x0) 20:00:46 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:46 executing program 4: 20:00:46 executing program 3: 20:00:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b48000001000080", 0x2c}], 0x1}, 0x0) 20:00:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1}, 0x14}}, 0x0) 20:00:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000300)={0x3, 0x0, [], {0x0, @bt={0x6, 0x9, 0x0, 0x2, 0x3ff, 0xffffffffffff8000, 0x9, 0x8001, 0x714, 0x4, 0x80, 0x81, 0xba, 0x4, 0x10, 0x24}}}) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) sendto(r0, &(0x7f0000000000)="757b5d95b867e576f26eba6d758180c719606e028cd03a1cd36d74d70379dc4e9e0f9ae9275b7641418f589fbd13ac4836ee47f2119a8c872344335454d0014a5da54dc6088189b5e497103565c3f18254b915e0b94e2fd2f18480ddbd4d14c30c159f73900c5e6c8b04ad79b128c48fdd231a3cb7231e91cd5a06c7a64d97ba1533838fa562f5c8365028200cd80ce6cc3683135528de220593de7551486c417ef1bd07960ed1423d55d48c81ac57c8ca44ec454421f6cb44b6b2dd0543081d9cbcb8afbe8ec7e9af37d45b4a46f855cc40cfa52323db5f823f40bad25b564df7", 0xe1, 0x4000080, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @multicast2}, 0x2, 0x3, 0x4, 0x2}}, 0x80) 20:00:47 executing program 4: 20:00:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) setsockopt$packet_int(r1, 0x107, 0x12, &(0x7f0000000040)=0x8ac, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:47 executing program 3: 20:00:47 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000034000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:47 executing program 1: 20:00:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b48000001000080", 0x2c}], 0x1}, 0x0) 20:00:47 executing program 4: 20:00:47 executing program 3: 20:00:47 executing program 1: 20:00:47 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000001", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b4800000100008000", 0x2d}], 0x1}, 0x0) 20:00:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:47 executing program 4: 20:00:47 executing program 3: 20:00:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b4800000100008000", 0x2d}], 0x1}, 0x0) 20:00:47 executing program 4: 20:00:47 executing program 1: 20:00:47 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000002", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:47 executing program 1: 20:00:47 executing program 3: 20:00:47 executing program 4: 20:00:47 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040)=0xff7fffffffffffff, 0xfffffcf9) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000a40), 0x0, 0x0) 20:00:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b4800000100008000", 0x2d}], 0x1}, 0x0) 20:00:47 executing program 3: 20:00:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000003c0)=[@textreal={0x8, &(0x7f0000000380)="f00fc74f94ba4000b87700ef83d0bb263e050c00bad00466b86b00000066ef0f005c8e0fe82d66b98b0800000f320f013fbad10466b80000000066ef", 0x3c}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0x8090ae81, 0x0) 20:00:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x54, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0x4}]}, 0x54}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:47 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000003", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x27, 0xffffffffffffffff, 0x358) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x2ee) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x7c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x7c}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") 20:00:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) dup2(r0, r1) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) write$P9_RREMOVE(r1, 0x0, 0x0) 20:00:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000004", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:48 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x2, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000300)={0x60, 0xfffffffffffffff5, 0x1, {{0x5, 0x3f, 0x0, 0xffff, 0x5, 0x6, 0x91a9, 0x3}}}, 0x60) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x100000000, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0xfffffffffffffffb, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)={0x5, 0x0, [{0x40000001, 0x662, 0x1, 0x4c, 0x6}, {0xa, 0x2, 0x7fff, 0xffff}, {0x40000000, 0x400, 0x8000, 0x50, 0x5}, {0x6, 0x6, 0x3ff, 0x5, 0x400}, {0x0, 0x4000000000000, 0x3, 0xfffffffffffffff8, 0x5}]}) recvmmsg(r2, &(0x7f0000005580)=[{{&(0x7f0000000880)=@isdn, 0x80, &(0x7f0000001c40)=[{&(0x7f0000000900)=""/108, 0x6c}, {&(0x7f0000000980)=""/140, 0x8c}, {&(0x7f0000000a80)=""/212, 0xd4}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000001b80)=""/150, 0x96}], 0x5, &(0x7f0000001c80)=""/82, 0x52}, 0x401}, {{&(0x7f0000001d00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000001d80)=""/38, 0x26}, {&(0x7f0000001dc0)=""/47, 0x2f}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x3}}, {{&(0x7f0000002e40)=@nl, 0x80, &(0x7f0000003140)=[{&(0x7f0000002ec0)=""/188, 0xbc}, {&(0x7f0000002f80)=""/160, 0xa0}, {&(0x7f0000003040)=""/212, 0xd4}], 0x3, &(0x7f0000003180)=""/144, 0x90}, 0x4}, {{0x0, 0x0, &(0x7f0000004740)=[{&(0x7f0000003240)=""/142, 0x8e}, {&(0x7f0000003300)=""/228, 0xe4}, {&(0x7f0000003400)=""/19, 0x13}, {&(0x7f0000003440)=""/134, 0x86}, {&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004500)=""/113, 0x71}, {&(0x7f0000004580)=""/225, 0xe1}, {&(0x7f0000004680)=""/129, 0x81}], 0x8}, 0xfcf1000000000}, {{&(0x7f0000004780)=@nl=@unspec, 0x80, &(0x7f0000004840)=[{&(0x7f0000004800)=""/49, 0x31}], 0x1, &(0x7f0000004880)=""/170, 0xaa}, 0x10001}, {{&(0x7f0000004940)=@nl, 0x80, &(0x7f0000004ac0)=[{&(0x7f00000049c0)=""/203, 0xcb}], 0x1, &(0x7f0000004b00)=""/103, 0x67}, 0x6}, {{&(0x7f0000004b80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000005140)=[{&(0x7f0000004c00)=""/208, 0xd0}, {&(0x7f0000004d00)=""/118, 0x76}, {&(0x7f0000004d80)=""/47, 0x2f}, {&(0x7f0000004dc0)=""/180, 0xb4}, {&(0x7f0000004e80)=""/208, 0xd0}, {&(0x7f0000004f80)=""/235, 0xeb}, {&(0x7f0000005080)=""/192, 0xc0}], 0x7}, 0xfffffffffffffaac}, {{&(0x7f0000005180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000005480)=[{&(0x7f0000005200)=""/119, 0x77}, {&(0x7f0000005280)=""/142, 0x8e}, {&(0x7f0000005340)}, {&(0x7f0000005380)=""/55, 0x37}, {&(0x7f00000053c0)=""/158, 0x9e}], 0x5, &(0x7f00000054c0)=""/130, 0x82}, 0x8a}], 0x8, 0x0, &(0x7f0000005680)={0x77359400}) sendto$packet(r2, &(0x7f00000000c0)="c91c2d6fa60ee6fca1cf5662cdcc5c4d5f3a2398381184f5530928c8e44a8406b6f91ba5bf26d7fdf1f77639081d3a7f81b2989100", 0x35, 0x4, &(0x7f00000056c0)={0x11, 0x6, r3, 0x1, 0xffffffffffff0000, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x14) membarrier(0x8, 0x0) 20:00:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000005", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000800)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r3, &(0x7f00000001c0)={0x7}, 0x102fe) r4 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0x7}, 0xff7f) ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x9f}) 20:00:48 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) r2 = getegid() getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)=0x0) socket$nl_crypto(0x10, 0x3, 0x15) setgroups(0x3, &(0x7f0000000380)=[r1, r2, r3]) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) close(r5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000100)={0x6, 0x1, {0xffffffffffffffff, 0x2, 0x8, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000440)={0x6, 0x118, 0xfa00, {{0x100, 0x200, "c7eefefbc79dc7d10401cd02ac6d73f14f17b74fa051d69a17cd226311940dcbf1ebaa31525909b11919f5692055688b4e55f7baaf49c27df893c93682a6f39cad10fe237e7c9c74c774a31076846ff8759079c6c8f00e56db9788247d6405c3e51429eaf796affc4053e3e38a5695034da880d93dfa2111e45442ad229ff495145e9f4c96e6e42a12572beca0c9938618997fe52be307135c42ecb56e7b531a1f4f12579c402294da36bbcc444f93fb919e46c31e6541690ea17f30430481ea916af0e14ea782c075650fb8c6f81c0c1a1ec778392e8251a45c9765e7fdb3be5ffc918c461cffe85afc2733632c442bb7a407d55946bda866c348eb8f1f81d9", 0x4a, 0x7ff, 0x8, 0x5, 0x2a1f, 0x3, 0x0, 0x1}, r7}}, 0x120) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000240)) creat(&(0x7f00000000c0)='./file0\x00', 0x200000000240042) mkdirat(r5, &(0x7f0000000580)='./file0\x00', 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r5) uselib(&(0x7f0000000300)='./file0\x00') sync_file_range(r8, 0x7, 0x9, 0x4) 20:00:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x16) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:48 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) r2 = getegid() getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)=0x0) socket$nl_crypto(0x10, 0x3, 0x15) setgroups(0x3, &(0x7f0000000380)=[r1, r2, r3]) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) close(r5) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000100)={0x6, 0x1, {0xffffffffffffffff, 0x2, 0x8, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000440)={0x6, 0x118, 0xfa00, {{0x100, 0x200, "c7eefefbc79dc7d10401cd02ac6d73f14f17b74fa051d69a17cd226311940dcbf1ebaa31525909b11919f5692055688b4e55f7baaf49c27df893c93682a6f39cad10fe237e7c9c74c774a31076846ff8759079c6c8f00e56db9788247d6405c3e51429eaf796affc4053e3e38a5695034da880d93dfa2111e45442ad229ff495145e9f4c96e6e42a12572beca0c9938618997fe52be307135c42ecb56e7b531a1f4f12579c402294da36bbcc444f93fb919e46c31e6541690ea17f30430481ea916af0e14ea782c075650fb8c6f81c0c1a1ec778392e8251a45c9765e7fdb3be5ffc918c461cffe85afc2733632c442bb7a407d55946bda866c348eb8f1f81d9", 0x4a, 0x7ff, 0x8, 0x5, 0x2a1f, 0x3, 0x0, 0x1}, r7}}, 0x120) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000240)) creat(&(0x7f00000000c0)='./file0\x00', 0x200000000240042) mkdirat(r5, &(0x7f0000000580)='./file0\x00', 0x0) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r5) uselib(&(0x7f0000000300)='./file0\x00') sync_file_range(r8, 0x7, 0x9, 0x4) 20:00:48 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)=0x3) uselib(&(0x7f0000000300)='./file0\x00') 20:00:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000006", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:48 executing program 1: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200800, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x100000001, &(0x7f00000001c0)=0x0) io_cancel(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xf, 0xf32d, r2, &(0x7f0000000200)="1a7ba80e0cb747099d438b6abf23c586a17ad299059774d262010ea1ff10b1ea1387b36d5933e3f30bd09b740c5d1f4613175764491ac7d5b416289d5da8606e689f8867df41763aa65b9c166e7a3fb69c1053b3bc018f1b62bfcdce87901b8c614ead674e28d26f75b67f55a14587d5254509733a3b73f3c66cf3", 0x7b, 0x7f, 0x0, 0x1, r1}, &(0x7f00000002c0)) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000340)={0x4001, 0x9, 0x1ff, 0x200000000000100}) write$UHID_DESTROY(r0, &(0x7f0000000380), 0x4) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000540)={0x3, 0x2}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)=0x0) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)=0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() fstat(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f0000000b80)={{}, {0x1, 0x2}, [{0x2, 0x4, r4}, {0x2, 0x0, r5}, {0x2, 0x1, r6}], {}, [{0x8, 0x2, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}], {0x10, 0x2}, {0x20, 0x1}}, 0x54, 0x0) r10 = getuid() quotactl(0xf98, &(0x7f0000000780)='./file0\x00', r10, &(0x7f00000005c0)="ef20eb219a3ff98aa7de07b94beaef87ba245d139536e3ebfd1c6a23c0f4350ef6ca65d3099f9411c12a011eb4994dd6a293832665b44cc88e74401ddc0bb50ed9fb7482294a81103e011b5a3e8b21941be9e49c89634a3f6c8c3bf5bb644d2f974c277e020dea2955e4b5ee65c5e4c0f5113284d04e227b19c3fb8b372ad9ee1db0d03c04c0db5febc80c2c7421baf29de4dfddd25d6d3a6828ad831e22adefcf23e8b0c0f040c9cc70d45df9c8378a1bb6172b16d6e6418684a42c0cf4efe82fcb60e3f91881d693cf7aedc8269d5ab5b75d12e1c195cd52cb3e1116f9ef952c5dfa2aeec4da020ce5201c51eedaa1100f7a5ce78af07482ba82a12b64afcee1ef54eb3b91b238ac8831c7b169dcdef6cd460ccd7d364533c74c29a1a2d3ccf9e97410e627eca66d7a534be9863176b17409436e4ccf5a2e5cd6f0f78da464fdb84c0ed2a1") uselib(&(0x7f0000000580)='./file1\x00') ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x668) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000003c0)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a45352, &(0x7f0000000040)={{0x34, 0x6}, 'port0\x00', 0x0, 0x0, 0x8, 0x9, 0x6, 0x7, 0x7, 0x0, 0x1, 0xd519393}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000c00)={[0x4000, 0x6000, 0x0, 0x4000], 0x37, 0x10, 0x364041ec}) 20:00:48 executing program 4: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200800, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x100000001, &(0x7f00000001c0)=0x0) io_cancel(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xf, 0xf32d, r2, &(0x7f0000000200)="1a7ba80e0cb747099d438b6abf23c586a17ad299059774d262010ea1ff10b1ea1387b36d5933e3f30bd09b740c5d1f4613175764491ac7d5b416289d5da8606e689f8867df41763aa65b9c166e7a3fb69c1053b3bc018f1b62bfcdce87901b8c614ead674e28d26f75b67f55a14587d5254509733a3b73f3c66cf3", 0x7b, 0x7f, 0x0, 0x1, r1}, &(0x7f00000002c0)) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000340)={0x4001, 0x9, 0x1ff, 0x200000000000100}) write$UHID_DESTROY(r0, &(0x7f0000000380), 0x4) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000540)={0x3, 0x2}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000740)=0xe8) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)=0x0) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)=0x0) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() fstat(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f0000000b80)={{}, {0x1, 0x2}, [{0x2, 0x4, r4}, {0x2, 0x0, r5}, {0x2, 0x1, r6}], {}, [{0x8, 0x2, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}], {0x10, 0x2}, {0x20, 0x1}}, 0x54, 0x0) r10 = getuid() quotactl(0xf98, &(0x7f0000000780)='./file0\x00', r10, &(0x7f00000005c0)="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") uselib(&(0x7f0000000580)='./file1\x00') ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000300)=0x668) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000003c0)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a45352, &(0x7f0000000040)={{0x34, 0x6}, 'port0\x00', 0x0, 0x0, 0x8, 0x9, 0x6, 0x7, 0x7, 0x0, 0x1, 0xd519393}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000c00)={[0x4000, 0x6000, 0x0, 0x4000], 0x37, 0x10, 0x364041ec}) 20:00:48 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='sysv\x00', 0x20000, &(0x7f00000000c0)='\xb0}$\x00') 20:00:48 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x8, 0x840) setsockopt$packet_buf(r1, 0x107, 0x5, &(0x7f0000000180)="5d0d3ca1a822b538f6192ae6302492b17807bea0b79bdba62367b73f170e6b7b37f9cbecf3d3533ae26f8cf77b39198e7604e108e7273cb7ebbbde64fd", 0x3d) socket$kcm(0x29, 0x2, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ce\x00'}, 0x58) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9053449fdb45def594da845e502000"/26], 0xa) r2 = socket$unix(0x1, 0x5, 0x0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000100)=0xc) r3 = dup2(r0, r0) io_uring_setup(0x248, &(0x7f00000001c0)={0x0, 0x0, 0x5, 0x2, 0x208}) execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x408000) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000300)={'filter\x00', 0x7, 0x4, 0x47c, 0x140, 0x0, 0x398, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @empty, @rand_addr=0x1, @broadcast, 0xf}}}, {{@arp={@local, @local, 0xff, 0x0, @mac=@local, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, @mac, {[0x0, 0x0, 0xff, 0x0, 0x0, 0xff]}, 0x1, 0xdf3, 0x2, 0x8, 0x7, 0x80000001, 'team_slave_1\x00', 'veth1_to_bond\x00', {}, {0xff}, 0x0, 0x2c0}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="04ccd4be2680", @empty, @empty, @local, 0xf, 0x1}}}, {{@arp={@rand_addr=0x3, @empty, 0x0, 0xffffff00, @empty, {[0xff, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x3, 0x0, 0x80000001, 0x1, 0x80, 0x7, 'bridge_slave_0\x00', 'vcan0\x00', {0xff}, {0xff}, 0x0, 0x8}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x7f, 0xe5b, 0x3}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x4c8) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0xffffffffffffffe2) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x2b9, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000007", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:48 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:48 executing program 1: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) fsync(r0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) tee(r0, r0, 0x80, 0x5) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000040)={0x0, @bt={0xffffffff, 0x1, 0x1, 0x3, 0x1, 0x800000000000000, 0x8000, 0x1, 0x100000000, 0x81, 0x6, 0x90, 0x9, 0x1f, 0x4, 0x10}}) uselib(&(0x7f0000000300)='./file0\x00') 20:00:48 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) prctl$PR_GET_NO_NEW_PRIVS(0x27) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000008", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:48 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x8100, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@loopback, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x5, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000280)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4008641c, &(0x7f00000002c0)={r2, &(0x7f00000005c0)=""/195}) sendmsg$rds(r1, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) r3 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r4 = dup2(r3, r3) execveat(r4, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000080)=""/58) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x88080) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) r3 = dup2(r1, r1) r4 = getpgrp(0xffffffffffffffff) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000340)=0xffffffffffffff00) syz_open_procfs(r4, &(0x7f0000000100)='setgroups\x00') execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$VIDIOC_S_CROP(r3, 0x4014563c, &(0x7f0000000000)={0x3, {0x7, 0x81, 0x39, 0xffff}}) 20:00:48 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:48 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:48 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000009", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000300)={0xffffffffffffffff}, 0x117, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000380)={0x4, 0x8, 0xfa00, {r2, 0x80}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x4, {{0x2, 0x4e23, @loopback}}}, 0x84) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x0, 0x440000) write$P9_RSTAT(r3, &(0x7f0000000180)={0x68, 0x7d, 0x1, {0x0, 0x61, 0x0, 0x4, {0x10, 0x2, 0x6}, 0x48300000, 0x2, 0x5, 0x0, 0x5, 'proc{', 0x0, '', 0x27, 'ppp1proc(posix_acl_access{[%-trusted]\xec.', 0x2, '%]'}}, 0x68) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:49 executing program 2: creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') unlink(&(0x7f0000000000)='./file0\x00') 20:00:49 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) r3 = dup2(r1, r1) r4 = getpgrp(0xffffffffffffffff) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000340)=0xffffffffffffff00) syz_open_procfs(r4, &(0x7f0000000100)='setgroups\x00') execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$VIDIOC_S_CROP(r3, 0x4014563c, &(0x7f0000000000)={0x3, {0x7, 0x81, 0x39, 0xffff}}) 20:00:49 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:49 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000a", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video37\x00', 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) dup(r0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x400001) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000003c0)={0x1, &(0x7f0000000280)=[{0x3, 0x8000, 0x4, 0x3}]}, 0x8) ioctl$TIOCEXCL(r1, 0x540c) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x4, 0x1b, [], 0x9, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000080)=""/27}, &(0x7f00000000c0)=0x50) sendmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x4004004) 20:00:49 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x8100, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@loopback, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x5, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000280)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4008641c, &(0x7f00000002c0)={r2, &(0x7f00000005c0)=""/195}) sendmsg$rds(r1, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) r3 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="23216413fd33f32d5020"], 0xa) r4 = dup2(r3, r3) execveat(r4, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:49 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600800000000000000000000002000600000000000000000018000000000000f7ffffffff"], 0x28) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') 20:00:49 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) r3 = dup2(r1, r1) r4 = getpgrp(0xffffffffffffffff) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000340)=0xffffffffffffff00) syz_open_procfs(r4, &(0x7f0000000100)='setgroups\x00') execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$VIDIOC_S_CROP(r3, 0x4014563c, &(0x7f0000000000)={0x3, {0x7, 0x81, 0x39, 0xffff}}) 20:00:49 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000010", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:49 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000540), 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={r1}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @local, @broadcast}, &(0x7f00000000c0)=0xc) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=@getpolicy={0x148, 0x15, 0x2, 0x70bd27, 0x25dfdbfe, {{@in=@broadcast, @in=@loopback, 0x4e21, 0x2, 0x4e22, 0x2, 0xa, 0x80, 0x20, 0x67, r3, r4}, 0x6e6bb2, 0x2}, [@replay_val={0x10, 0xa, {0x70bd28, 0x70bd28, 0x7}}, @migrate={0x4}, @sec_ctx={0xd4, 0x8, {0xcd, 0x8, 0x1, 0x1, 0xc5, "7e8d842d191232b448a6d74f9b78ea79b31b190c5df16b401521394d5acafb528a203e3ec71970295a63b7922e6ec5598d8849cd13aeb4615b143731407093171ca3de22160dba7235505ebe8b292d7447d9157f2347155ad69fd8228c5218bdfc2c1385d1c591ab61dde4a0a6a44247746452901d0ce088a36a4797f017f7b41233809f0b07bfad0b0e3e37d96713908d7617f96abbedc5602bf134c5e595aef172f8a39efe4bb37e6f40b677c4012a4dda13c59350bdce13017d2ba0830239eacb7ed487"}}, @proto={0x8, 0x19, 0x3723931facd35b16}, @output_mark={0x8, 0x1d, 0xcc}]}, 0x148}, 0x1, 0x0, 0x0, 0x20008050}, 0x40000) 20:00:49 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:49 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000011", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:49 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) r3 = dup2(r1, r1) r4 = getpgrp(0xffffffffffffffff) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000340)=0xffffffffffffff00) syz_open_procfs(r4, &(0x7f0000000100)='setgroups\x00') execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:49 executing program 2: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x200000000000040) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10002, 0x0) 20:00:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:49 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:49 executing program 2: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000300)='./file0\x00') setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) keyctl$session_to_parent(0x12) 20:00:49 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:49 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) r3 = dup2(r1, r1) getpgrp(0xffffffffffffffff) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000340)=0xffffffffffffff00) execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:49 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000023", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 758.487185][T16960] FAULT_INJECTION: forcing a failure. [ 758.487185][T16960] name failslab, interval 1, probability 0, space 0, times 0 [ 758.557175][T16960] CPU: 0 PID: 16960 Comm: syz-executor.4 Not tainted 5.1.0+ #6 [ 758.564781][T16960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.574849][T16960] Call Trace: [ 758.578164][T16960] dump_stack+0x172/0x1f0 [ 758.582513][T16960] should_fail.cold+0xa/0x15 [ 758.587107][T16960] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.592920][T16960] ? ___might_sleep+0x163/0x280 [ 758.597770][T16960] __should_failslab+0x121/0x190 [ 758.602706][T16960] should_failslab+0x9/0x14 [ 758.607200][T16960] kmem_cache_alloc_node+0x264/0x710 [ 758.612497][T16960] __alloc_skb+0xd5/0x5e0 [ 758.616825][T16960] ? skb_trim+0x190/0x190 [ 758.621160][T16960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.627409][T16960] ? netlink_autobind.isra.0+0x228/0x310 [ 758.633064][T16960] netlink_sendmsg+0x97b/0xd70 [ 758.637835][T16960] ? netlink_unicast+0x720/0x720 [ 758.642764][T16960] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 758.648305][T16960] ? apparmor_socket_sendmsg+0x2a/0x30 [ 758.653767][T16960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.661298][T16960] ? security_socket_sendmsg+0x93/0xc0 [ 758.666746][T16960] ? netlink_unicast+0x720/0x720 [ 758.671690][T16960] sock_sendmsg+0x12e/0x170 [ 758.676220][T16960] ___sys_sendmsg+0x81d/0x960 [ 758.680902][T16960] ? copy_msghdr_from_user+0x430/0x430 [ 758.686375][T16960] ? kasan_check_read+0x11/0x20 [ 758.691244][T16960] ? __fget+0x381/0x550 [ 758.695424][T16960] ? ksys_dup3+0x3e0/0x3e0 [ 758.699856][T16960] ? lock_downgrade+0x880/0x880 [ 758.704718][T16960] ? __fget_light+0x1a9/0x230 [ 758.709396][T16960] ? __fdget+0x1b/0x20 [ 758.713475][T16960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 758.719717][T16960] __sys_sendmsg+0x105/0x1d0 [ 758.724296][T16960] ? __ia32_sys_shutdown+0x80/0x80 [ 758.729423][T16960] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 758.734886][T16960] ? do_fast_syscall_32+0xd1/0xd54 [ 758.740007][T16960] ? entry_SYSENTER_compat+0x70/0x7f [ 758.745277][T16960] ? do_fast_syscall_32+0xd1/0xd54 [ 758.750479][T16960] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 758.755961][T16960] do_fast_syscall_32+0x281/0xd54 [ 758.760976][T16960] entry_SYSENTER_compat+0x70/0x7f [ 758.766076][T16960] RIP: 0023:0xf7fa5849 [ 758.770138][T16960] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 758.789777][T16960] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 758.798224][T16960] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 20:00:50 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:50 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:50 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x200480) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:50 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) r3 = dup2(r1, r1) getpgrp(0xffffffffffffffff) execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 758.806202][T16960] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 758.814269][T16960] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 758.822256][T16960] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 758.830248][T16960] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:00:50 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000003f", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 758.936709][T16975] FAULT_INJECTION: forcing a failure. [ 758.936709][T16975] name failslab, interval 1, probability 0, space 0, times 0 [ 758.970027][T16975] CPU: 1 PID: 16975 Comm: syz-executor.2 Not tainted 5.1.0+ #6 [ 758.977629][T16975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.987701][T16975] Call Trace: [ 758.991026][T16975] dump_stack+0x172/0x1f0 [ 758.995386][T16975] should_fail.cold+0xa/0x15 [ 759.000020][T16975] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 759.000047][T16975] ? ___might_sleep+0x163/0x280 [ 759.000075][T16975] __should_failslab+0x121/0x190 [ 759.015659][T16975] should_failslab+0x9/0x14 [ 759.020182][T16975] kmem_cache_alloc_node+0x264/0x710 [ 759.020210][T16975] __alloc_skb+0xd5/0x5e0 [ 759.020228][T16975] ? skb_trim+0x190/0x190 [ 759.020247][T16975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.020270][T16975] ? netlink_autobind.isra.0+0x228/0x310 [ 759.046076][T16975] netlink_sendmsg+0x97b/0xd70 [ 759.050880][T16975] ? netlink_unicast+0x720/0x720 [ 759.055839][T16975] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 759.061413][T16975] ? apparmor_socket_sendmsg+0x2a/0x30 [ 759.066903][T16975] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.073163][T16975] ? security_socket_sendmsg+0x93/0xc0 [ 759.078641][T16975] ? netlink_unicast+0x720/0x720 [ 759.083595][T16975] sock_sendmsg+0x12e/0x170 [ 759.088125][T16975] ___sys_sendmsg+0x81d/0x960 [ 759.092824][T16975] ? copy_msghdr_from_user+0x430/0x430 [ 759.098307][T16975] ? kasan_check_read+0x11/0x20 [ 759.103188][T16975] ? __fget+0x381/0x550 [ 759.107369][T16975] ? ksys_dup3+0x3e0/0x3e0 [ 759.111806][T16975] ? lock_downgrade+0x880/0x880 [ 759.116689][T16975] ? __fget_light+0x1a9/0x230 [ 759.121383][T16975] ? __fdget+0x1b/0x20 [ 759.125469][T16975] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.131727][T16975] __sys_sendmsg+0x105/0x1d0 [ 759.136337][T16975] ? __ia32_sys_shutdown+0x80/0x80 [ 759.141481][T16975] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 759.146952][T16975] ? do_fast_syscall_32+0xd1/0xd54 [ 759.152087][T16975] ? entry_SYSENTER_compat+0x70/0x7f [ 759.157385][T16975] ? do_fast_syscall_32+0xd1/0xd54 [ 759.162511][T16975] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 759.162531][T16975] do_fast_syscall_32+0x281/0xd54 [ 759.162553][T16975] entry_SYSENTER_compat+0x70/0x7f [ 759.162565][T16975] RIP: 0023:0xf7fe6849 [ 759.162587][T16975] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 759.201994][T16975] RSP: 002b:00000000f5de20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 759.210449][T16975] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000380 [ 759.218436][T16975] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 759.226421][T16975] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 20:00:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0xc) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0x8000, 0x4) 20:00:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={'syz', 0x2}, &(0x7f0000000a80)="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", 0xfffffffffffffd4c, 0xffffffffffffffff) r3 = getgid() r4 = syz_open_dev$vcsa(&(0x7f00000005c0)='/dev/vcsa#\x00', 0x8, 0x8000) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000640)={{0x2, 0x4e24, @rand_addr=0x80000000}, {0x1, @broadcast}, 0x2a, {0x2, 0x4e24, @loopback}, 'nlmon0\x00'}) ioctl$TIOCGPTPEER(r4, 0x5441, 0xfffffffffffffffa) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000600)) timerfd_settime(r4, 0x1, &(0x7f00000006c0)={{0x77359400}}, &(0x7f0000000700)) r5 = getegid() getgroups(0x2, &(0x7f0000000580)=[r3, r5]) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000280)=[{&(0x7f0000000300)="4c6306150649d8975d3ef0f5c4cc0a7bcc2b36920dd19812dee4178e4c236ea25238691eab0787ab0e5cc9f29d279689ca9be1b7e534c9898007ab6fdc0351cb6acef043607ba056a0180a24e2092359c2d07ae1a8171d6cd8dcdc115337961f98e7f78bf050292a32445b796854e3c1f85067f301022a17b2abd1defc1179ee11189d17bda92c06362b3897e2183eac0f25ba62978cf7d8a8f604f41d5415d022a4a66849c262464d05cf458a32f31df86a7bafd36ebdb24f369be09f0f", 0xbe}, {&(0x7f0000000080)="1bca9bcc5e9dc28c54666620cf4e1707535fd1b84a30a954125d5b4b8f4f8f715f2e7d3f4210366cefa8629c5db0d9fb5ea0817ef9f700eb6a8a59f1c6007a6da84aa1254a86688747f52415dbf93ef08dd3992d23ecb6b9744cab68f91d69395755630754abad91012c2ce923c247c4df8b81dba8349a30e0215a9e", 0x7c}, {&(0x7f0000000180)="29714024fe59991c199d148cf77f6d99635be6e7f873af21f5ac20cad2ee1762919c378d72358e35654297cad7b36387535dcd8d3ae1c321cdd043a72de7c423776f14681e4edc3edd45fb8eac0f13f61ab29ba050a874abdbbd652c021e3867e5f215d1b8d9e8cc40732861f782ea94413bd1bbf881cb722522", 0x7a}, {&(0x7f00000003c0)="a2bb20c568f26fcad23f1cbaf679694ae11702c9deb6379b43c54c61a78c5203f1aca57cd674bf9e49ee56d51bbb6744690cd354be0d51a0bf147e98eb4c9bcfb0f0452f27a07518181c260b9530e75a71abf9c9763f249482ee6fd09606422594ceff0b52809f3c524ae601e20a94541f1be11fcb1de45823b53d64895e74bc88d1c71d4b0bfa589d55d60b19a88ef761d97e56053dfd221e14cc6388529471fe3ebafd6970ed31d00a0d60e6a2e4", 0xaf}, {&(0x7f0000000480)="e48dc72f445f0b486c1a7cd1e3ed4556b5c0bd7c7994c18cd27d96c3e0cfc3708fbf5927fa9de7d75d4588b4d891fedb7dc50af6fc1cf1fe15c4e6e247352678fb375fd4bee8d645c1a81c857b998da2827b38c7c10b22abfdb6819bea1e9363b3702c5cf372f4eaf1", 0x69}], 0x5, r2) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:50 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000040", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:50 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000fffffff5", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 759.234402][T16975] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 759.242387][T16975] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:00:50 executing program 4 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e24, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x10000, 0x400) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000040)) 20:00:50 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) r3 = dup2(r1, r1) execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:50 executing program 2 (fault-call:2 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:50 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:50 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000080fe", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:50 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0xfffffdd5) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:50 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 759.465317][T17018] FAULT_INJECTION: forcing a failure. [ 759.465317][T17018] name failslab, interval 1, probability 0, space 0, times 0 [ 759.480200][T17018] CPU: 0 PID: 17018 Comm: syz-executor.4 Not tainted 5.1.0+ #6 [ 759.487768][T17018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.487786][T17018] Call Trace: [ 759.501166][T17018] dump_stack+0x172/0x1f0 [ 759.505510][T17018] should_fail.cold+0xa/0x15 20:00:50 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 759.510110][T17018] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 759.515942][T17018] ? ___might_sleep+0x163/0x280 [ 759.520813][T17018] __should_failslab+0x121/0x190 [ 759.525772][T17018] should_failslab+0x9/0x14 [ 759.530295][T17018] kmem_cache_alloc_node_trace+0x270/0x720 [ 759.536142][T17018] __kmalloc_node_track_caller+0x3d/0x70 [ 759.541806][T17018] __kmalloc_reserve.isra.0+0x40/0xf0 [ 759.547195][T17018] __alloc_skb+0x10b/0x5e0 [ 759.553026][T17018] ? skb_trim+0x190/0x190 [ 759.557380][T17018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.563634][T17018] ? netlink_autobind.isra.0+0x228/0x310 [ 759.569280][T17018] netlink_sendmsg+0x97b/0xd70 [ 759.569303][T17018] ? netlink_unicast+0x720/0x720 [ 759.569318][T17018] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 759.569334][T17018] ? apparmor_socket_sendmsg+0x2a/0x30 [ 759.569359][T17018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.569376][T17018] ? security_socket_sendmsg+0x93/0xc0 [ 759.569390][T17018] ? netlink_unicast+0x720/0x720 [ 759.569409][T17018] sock_sendmsg+0x12e/0x170 [ 759.569429][T17018] ___sys_sendmsg+0x81d/0x960 [ 759.569448][T17018] ? copy_msghdr_from_user+0x430/0x430 [ 759.569472][T17018] ? kasan_check_read+0x11/0x20 [ 759.596387][T17018] ? __fget+0x381/0x550 [ 759.596412][T17018] ? ksys_dup3+0x3e0/0x3e0 [ 759.596429][T17018] ? lock_downgrade+0x880/0x880 [ 759.596454][T17018] ? __fget_light+0x1a9/0x230 [ 759.596480][T17018] ? __fdget+0x1b/0x20 [ 759.611371][T17018] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.611399][T17018] __sys_sendmsg+0x105/0x1d0 [ 759.611419][T17018] ? __ia32_sys_shutdown+0x80/0x80 [ 759.611445][T17018] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 759.611461][T17018] ? do_fast_syscall_32+0xd1/0xd54 [ 759.611477][T17018] ? entry_SYSENTER_compat+0x70/0x7f [ 759.611492][T17018] ? do_fast_syscall_32+0xd1/0xd54 [ 759.611516][T17018] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 759.611543][T17018] do_fast_syscall_32+0x281/0xd54 [ 759.649449][T17019] FAULT_INJECTION: forcing a failure. [ 759.649449][T17019] name failslab, interval 1, probability 0, space 0, times 0 [ 759.654863][T17018] entry_SYSENTER_compat+0x70/0x7f [ 759.654877][T17018] RIP: 0023:0xf7fa5849 [ 759.654894][T17018] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 759.654902][T17018] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 759.654916][T17018] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 759.654924][T17018] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 759.654941][T17018] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 759.770967][T17018] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 759.778956][T17018] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 759.787403][T17019] CPU: 1 PID: 17019 Comm: syz-executor.2 Not tainted 5.1.0+ #6 [ 759.794982][T17019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.794989][T17019] Call Trace: [ 759.795024][T17019] dump_stack+0x172/0x1f0 [ 759.795048][T17019] should_fail.cold+0xa/0x15 [ 759.795067][T17019] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 759.795089][T17019] ? ___might_sleep+0x163/0x280 [ 759.795110][T17019] __should_failslab+0x121/0x190 [ 759.795129][T17019] should_failslab+0x9/0x14 [ 759.795149][T17019] kmem_cache_alloc_node_trace+0x270/0x720 [ 759.795179][T17019] __kmalloc_node_track_caller+0x3d/0x70 [ 759.795201][T17019] __kmalloc_reserve.isra.0+0x40/0xf0 [ 759.795221][T17019] __alloc_skb+0x10b/0x5e0 [ 759.795239][T17019] ? skb_trim+0x190/0x190 [ 759.795259][T17019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.795275][T17019] ? netlink_autobind.isra.0+0x228/0x310 [ 759.795294][T17019] netlink_sendmsg+0x97b/0xd70 [ 759.795316][T17019] ? netlink_unicast+0x720/0x720 [ 759.795332][T17019] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 759.795349][T17019] ? apparmor_socket_sendmsg+0x2a/0x30 [ 759.795365][T17019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.795382][T17019] ? security_socket_sendmsg+0x93/0xc0 [ 759.795397][T17019] ? netlink_unicast+0x720/0x720 [ 759.795416][T17019] sock_sendmsg+0x12e/0x170 20:00:51 executing program 4 (fault-call:1 fault-nth:2): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 759.795434][T17019] ___sys_sendmsg+0x81d/0x960 [ 759.795453][T17019] ? copy_msghdr_from_user+0x430/0x430 [ 759.795476][T17019] ? kasan_check_read+0x11/0x20 [ 759.795497][T17019] ? __fget+0x381/0x550 [ 759.795519][T17019] ? ksys_dup3+0x3e0/0x3e0 [ 759.795545][T17019] ? lock_downgrade+0x880/0x880 [ 759.890511][T17019] ? __fget_light+0x1a9/0x230 [ 759.890531][T17019] ? __fdget+0x1b/0x20 [ 759.890555][T17019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.902263][T17019] __sys_sendmsg+0x105/0x1d0 [ 759.902282][T17019] ? __ia32_sys_shutdown+0x80/0x80 [ 759.902308][T17019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 759.902326][T17019] ? do_fast_syscall_32+0xd1/0xd54 [ 759.902352][T17019] ? entry_SYSENTER_compat+0x70/0x7f [ 759.931404][T17038] FAULT_INJECTION: forcing a failure. [ 759.931404][T17038] name failslab, interval 1, probability 0, space 0, times 0 [ 759.932190][T17019] ? do_fast_syscall_32+0xd1/0xd54 [ 759.932226][T17019] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 760.009230][T17019] do_fast_syscall_32+0x281/0xd54 [ 760.014280][T17019] entry_SYSENTER_compat+0x70/0x7f [ 760.019401][T17019] RIP: 0023:0xf7fe6849 [ 760.023482][T17019] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 760.043092][T17019] RSP: 002b:00000000f5dc10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 760.051517][T17019] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000380 [ 760.059500][T17019] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 760.067485][T17019] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 760.075470][T17019] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 760.083450][T17019] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 760.091473][T17038] CPU: 0 PID: 17038 Comm: syz-executor.4 Not tainted 5.1.0+ #6 [ 760.099040][T17038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.109209][T17038] Call Trace: [ 760.112525][T17038] dump_stack+0x172/0x1f0 [ 760.116876][T17038] should_fail.cold+0xa/0x15 [ 760.121484][T17038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 760.127382][T17038] ? netlink_deliver_tap+0x146/0xc00 [ 760.132701][T17038] __should_failslab+0x121/0x190 [ 760.137658][T17038] should_failslab+0x9/0x14 [ 760.142179][T17038] kmem_cache_alloc+0x47/0x6f0 [ 760.146968][T17038] ? lock_acquire+0x16f/0x3f0 [ 760.151670][T17038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.157928][T17038] skb_clone+0x154/0x3b0 [ 760.162192][T17038] netlink_deliver_tap+0x95c/0xc00 [ 760.167319][T17038] netlink_unicast+0x5a7/0x720 [ 760.172112][T17038] ? netlink_attachskb+0x770/0x770 [ 760.172128][T17038] ? _copy_from_iter_full+0x25d/0x8c0 [ 760.172144][T17038] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 760.172159][T17038] ? __check_object_size+0x3d/0x42f [ 760.172178][T17038] netlink_sendmsg+0x8ae/0xd70 [ 760.172197][T17038] ? netlink_unicast+0x720/0x720 [ 760.172212][T17038] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 760.172230][T17038] ? apparmor_socket_sendmsg+0x2a/0x30 [ 760.172247][T17038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.172265][T17038] ? security_socket_sendmsg+0x93/0xc0 [ 760.172280][T17038] ? netlink_unicast+0x720/0x720 [ 760.172299][T17038] sock_sendmsg+0x12e/0x170 [ 760.172317][T17038] ___sys_sendmsg+0x81d/0x960 [ 760.172340][T17038] ? copy_msghdr_from_user+0x430/0x430 [ 760.214392][T17038] ? kasan_check_read+0x11/0x20 [ 760.214414][T17038] ? __fget+0x381/0x550 [ 760.214436][T17038] ? ksys_dup3+0x3e0/0x3e0 [ 760.259064][T17038] ? lock_downgrade+0x880/0x880 [ 760.264197][T17038] ? __fget_light+0x1a9/0x230 [ 760.264217][T17038] ? __fdget+0x1b/0x20 [ 760.264240][T17038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.279262][T17038] __sys_sendmsg+0x105/0x1d0 [ 760.283870][T17038] ? __ia32_sys_shutdown+0x80/0x80 [ 760.289020][T17038] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 760.294492][T17038] ? do_fast_syscall_32+0xd1/0xd54 [ 760.299614][T17038] ? entry_SYSENTER_compat+0x70/0x7f [ 760.299630][T17038] ? do_fast_syscall_32+0xd1/0xd54 [ 760.299655][T17038] __ia32_compat_sys_sendmsg+0x7a/0xb0 20:00:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000140)=0xffffffffffffffff, 0x1b6) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:51 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:51 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000007fffffff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:51 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:51 executing program 2 (fault-call:2 fault-nth:2): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 760.299672][T17038] do_fast_syscall_32+0x281/0xd54 [ 760.299693][T17038] entry_SYSENTER_compat+0x70/0x7f [ 760.299705][T17038] RIP: 0023:0xf7fa5849 [ 760.299721][T17038] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 760.299729][T17038] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 760.299753][T17038] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 20:00:51 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000a40)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000009a40)=[@in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e20, 0x7, @rand_addr="955e8020336b53dc7683082e929e7d26", 0x2}, @in={0x2, 0x4e22, @broadcast}], 0x3c) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @rand_addr=0x3}, 0x243) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000080)=r3) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000007400)={@empty, 0x0}, &(0x7f0000007440)=0x14) sendmmsg(r1, &(0x7f00000096c0)=[{{&(0x7f0000000180)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x0, {0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x20}}, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="e6d87cdfec8189eac13c1e6786330063fe43f0221399a515d1605fab7bfe4172d3476e634fb2f63ffdb471188a86498ec84668d9139fd04078b3b8c19333a924e9c49e168fe63fcadb94f9e672bc01719c861b138a09ca8ad93a2c523a5364ac61a0182e3422358e69a695f3e0bcd5dae77cc56e5d1fb81fcb8a3275f71ae9fa12724f25ad179f0fc67df5da1ba3306135bb2d975f90eb7719c0e8052ca59e53633aff3fa76f9fae169cce1b8c15483a867ba26aae4706e9564a8c1dd1"}, {&(0x7f0000000a80)="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"}, {&(0x7f0000000280)}, {&(0x7f00000003c0)="ca1ae1d4145f4706f6752141aaf40e51856cedb4fe2d071b1538d0eaa1d9f42999ff46c494189ca69549a260fcd7fe6c6a43ba6cff0988de0100ca12a75490d29a9c8802f7b2c54c71118e423b43f7"}, {&(0x7f0000000440)="28af8287864cbec1c4809b7162b70eea82fe35e34074ee70c53d2914bea712c1c59d14775c196658112208ca23712cb3b567425b2fc73256c9ab434e357748c30d216ac22390d3e936437ae39da7fd62a526"}], 0x0, &(0x7f00000097c0)=ANY=[@ANYBLOB="000000001501000008000000b8b8cf58b3006ef4264630f13c92c4c9c81d3bfb3d1c4a8044e768f52ca2fcf54a4496c3137a6c2e83070bb9939a48ab6d4ba7c7924b425261a7c0a40cad02a1bc0f0c799d1fd974d17693db7c2de871e31d361ba3b5ada55bd0690000000000110000000b4e0b108ff0010a628aea3edda2363dd03b87c7c3a131e9830373f000d9a73e51e473bbf03928e34e5031db000000001301000004000000640a8e3bb7662b2a31721af1b5f00e975cd2d9e48608d77e22f92918088d41bc59b4c500000000000a0100000300000051473a4124311fb077a6bd3954d02fa26bfa9fd0690d2a00000000000f010000080000000710fbf3760e915f14d4efd7b3755774ec9efa50b8465c56e2577b5cdd24c1823bdf4d69c426052fd401bee6645b551a7ca1ec354414ad285e2077435afb59acc74ba4c6e69600000000000012010000010001009e3e57f1900a23bc80b143aedcea2235df84bd2643e5baa7aee6b59e7f4afc02a5f7a7d0384b24317e1361a1d4cc41fea8a29b0e5c8fdb4c9b758a8bc877d38546d8d923363592b81110d4793ca7984c715cfbf8e1514c7545783cba2071e34910bebdb91f69cb92cb4016f9fd755338647cb3d5a81c8b7b8b7238699013f69a03a5ae5846d23a0705853e0f61e9f22e1bb0834dc56e0649257f9f0db7bab144123f0000cd0930ee324ef1907a68993cf9283eba61ea38ba17b01fcbc1488d5bbd0da50f52845c92bc4d04f3cd7a096ddff7bb5b69af59e4513a595e9ad2ec18be4facba049359f4377acb87fd4ccd3ba6a06da6cc4b76e8a85ec0f0c7e04f058409affdaca686"]}}, {{&(0x7f0000000700)=@ethernet={0x0, @random="306c7da2f360"}, 0x0, &(0x7f0000004a80)=[{&(0x7f0000001a80)="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"}, {&(0x7f0000002a80)="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"}, {&(0x7f0000000780)="d1aed472fb2e29c410000fa36b2bedfc9f166036bc4a4b7165f56cbdce06a53ffc092ce4b33a8a612512d73506307f1cf62810bdee90114d8c54eb77aff7a44051bf217f14e3586fa54637efaef8098a6da569f42e06de97857a51d4cdc45785a498bc7386ee6e04bb6be079eb7a44922fdb7e31330b9ad4c136ea9378435ef181d8c68b1508487309ac451c"}, {&(0x7f0000000840)="a15d42fa9c4a94ba0af9efeef5b51a6f44921f062d546071f1901ddaaf2f48b9acce6910da94756241b943405dc5ca2eb58d43ea7522941819cf62b11d14f990506d72ea970530fc4f8602961a3ea11f7d955f678d56a327821d78dfd93cc073281e9ed6678fdb550e9c6316723180e181df474502857e4c8e53932098e79ee900765c13d60ec9d5b74e28ae2b7ea97cfdff957f8e3536efd63ca0ff7c25194989934e6fe37ab45f91a81ed708e67d520f3ce4a850b20645f171f633c74bf4496c441067e308367813d0"}, {&(0x7f0000000940)="23b17d1d5dcd87f7a63cc2f4a8e18d3fe5141df7ed2aeaf314"}, {&(0x7f0000003a80)="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"}, {&(0x7f0000000980)="3c59cb646d0d48e7e94701009fe8c94ede72e65408cbe799ea56ba74bf0d7b5e66088b979c2385d5fb3d6f66265582a1274e2e2504820dfdd587f66e1b79e00167b1ed072c0a15c4912fcb527bbc34f8434bf449a8372c7b334cfaea6fb85966d69585b6a82ca2aedcca5da1204fe581d6e7bc8756d5d61e1e0aecf9a30ab0a3119210c9eef5d070e1507d9fe2a7a81a2db20a2622660d94869d98"}], 0x0, &(0x7f0000004ac0)=[{0x0, 0x116, 0x400, "5c311f59055f8d9e2f8b044d378e949953eec2d55d094604979aad2f129056fca5a3505eaf60572f7e6043243eeb265aba2bd3a0442985ca90c013435906f9880af3d7121ac80e400235a750657e101b2d0ed9ec700020df38c0fab7f9f38f0c54248fd8fde7749caa646f79401693b9400eee8c2e59fcc547d286fbe4be6cd2645eb946c3b17e2461a3fa33ec16"}, {0x0, 0x10b, 0x40, "dc375d0ac8c87328f5e6714ec407f01063d1a56383ad5960a6efc36dfdda9f2ded15594a6495478b9dff76fd08923d76eca85691fe80c344385dd22b7543cdef49a2b12f71a78bf8d7bdc5c2de664fecc43942881402e2435d4dec96943a666617b9963eb8118367917fe4fe123390c78c00c8a223500c5bd407ca3057e2e1bc5e8dea6d3089b6d31cd5b846614e907bea7f2da743b76b429aae9b498e75839d8818f6f1"}, {0x0, 0x117, 0x2, "c5f59018d03d2b9bd9d5bf"}, {0x0, 0xff, 0x55c, "be4b58cbd25316f8eb3249a82d9c9178d39ad391b27e0fdec497684882b5ada3848ccaf4d3beaa8a495457e9172c1a4f8dc7d18f862adb9cc4f81d0c947ccc070b8394181bc2489207a5b57c45f35f1095267829"}, {0x0, 0x10b, 0x2, "84aef8486f3da2e0e42ea7f8d5af43a11f0a0799185edd05932ad999727e52cf6ee6e99abafef979a368d17157a086b76816a672b8be2d73cc6d7cf6d9fed3b8e0555eff91452fe188840f9e4334c98ab3fbf31feae6bb9498ea39f42fafa56c81f12cabba88a1181469389134ab08781d835adecc78cad971187f70bbf00ef8c1574eea43c9c9fb999ba60496ac7d8f76faa563abccf00ca6ce1a61934fb2bb2a3607df76abf4ebd94f7b"}, {0x0, 0x111, 0x1, "2e28dc9a1b8f85e079bbbef28e1e"}]}}, {{&(0x7f0000004d80)=@caif=@rfm={0x25, 0x99, "db075eaf606b39fd44741a09689b431e"}, 0x0, &(0x7f0000005080)=[{&(0x7f0000004e00)="e3a94e391b9ef9a06d71128de734195d80881be227cbc7a06d7638836b64bab651276922443ad0cc97edce2264c5bde7d59e969ea62b012ef3b96db0748368c1dfdb0f5c29f5cdd4cd5f9464e6c9375f9675c47ffe474509cf61694f2b910b8de406833564dcd14d9c3d81811140fb4dc2ff430a80b67225f78e995fd23f98f296e8ee4ed10ed7e14bc0ad252fc62a897de5fee4e504b3da42641db00416"}, {&(0x7f0000004ec0)="8e5730285edcb9b2430510da04b59bd6d95e0462ffb25f9ad4658e13de8c2448a9df249d6d5b1b29357302c7860b0ea9a703d6cc95ae09c2a0fdff170cc582c6748a2a2b967a050d20fe765dd1b926867bce8759dde53dd17e65d65c2ff4cd932144c23a0433daa5c6dff7fb6276273341e46e29ee838f873a10674c328de52fd49e13ce5a1470ce0908b15706384c68cf3648e6dba3184f4c9a72a7f18fb2bb934821e8"}, {&(0x7f0000004f80)="4620d4bc3e3b54f7480ab7ab202212d9684a2b9b706a5d4f7b59bd5787a3fdc24ec2c079e5510a350f92ae13a1c1fa7d062be8062f0a896b8b64e0273928af47d43b30b869dad8b15074ed8278aba849609d8f1b0b1960e488765fa24db6760a7bc91b86c6ab8813d6d202239ea555b6b786fbe566390446e006bbe688729df694645f188906fe760b033d770ed6628acacfa2f4f4f331c5974abf18400426e2b5cb191b8271ea91fb914efc43ab0735f51c18bfcdabbcfcef4f766823ffe17be94e0ddbd002929f99832deb915566c7295782092d0242edd3272cbdbea5c6b65bfd9b4910f940bb0e0c6f"}], 0x0, &(0x7f00000050c0)=[{0x0, 0x10f, 0x1, "7ba576a50bb62f9fbd28a2d15751faebb8d8bd3bf2631e2e64467716c0d938a19643d24a1ac2804b7bd812d089c7ded8973ce5224f436a3887452cdea0075b5c79b4f24d728e926ad44e4dcbedf25f0a220386523a57a20042eba43bd29bb78d60d11778467f76a8f40276e54378f7594cf65de992bf456be4194617d2386c1a590766006ff2f1f338080d26"}, {0x0, 0x13e, 0xfff, "c3325722f8945ff9520f86e5b8ad4b77f4d2ba1e7dafab952ea41df4df6947d27c1e31de898e2052c2775b1f64"}, {0x0, 0x6, 0xf9, "53d867d65e7b504fdc20ba5c27db4879a8ca59ed7090fd9d5a498f3811eb94d6fef9526dae895759fdb355d57b073099369a501e5848af2a02596888f477e55b03ff538a4987ae049485d2c524"}, {0x0, 0x6, 0x3, "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"}, {0x0, 0x10f, 0x2, "4cf6d98770279b344941d542e29db77e98a0c426edf4be4f0854eded0840298be0dad7b01c53455cc13cb1db0d1aebeb9ae9f364033e306bf85ae6ad1c27eed2a6285e8e8be7b5a33f9fa49e958d4db45d290db1397dd75e62345f5515387e5321f00281c8d3480e7e7363281d022e9020b6493ec06d0d6f7162c29a7b1d1ed70854271553be643d33ba60b9bd310c8b2f428a2120ae8878c44ab00a8959299976f08fa4c9467a61243138d2e3e81a6ff102ccffb9396f0113ed0728d30e2333d3c3bea7b5855d22ff8695c3c298d58694e847480e7d9288c7b82eaf84a39be6a7f80452"}, {0x0, 0x103, 0x1, "295817fe8c8c1555317edcfa15fbd162eec019978ae4f8e7ca"}, {0x0, 0x109, 0x1d66, "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"}, {0x0, 0x108, 0x20000000, "3d1db8c1be8a8941d2c6d636845702396c1d203658dd903c1a43f4ce5572b06d163f91c2e77503b5"}, {0x0, 0x10d, 0x5, "4b8f47b35fddcab6f9510dbd13e83db41691fb83cd315649dc4eae710a86ef96a99d07bd35e7cb421d3399934a795241ae2b89d346efe3a564b55fbe5e677339aa674c207de5effca59acbcfd22ed737fb9f30875c0b32099625b112588de168d86a6abf7f9379e5d1529500b31bb184c7"}]}}, {{&(0x7f0000007480)=@hci={0x1f, r4, 0x1}, 0x0, &(0x7f00000076c0)=[{&(0x7f0000007500)="d4e3a8f874a0b5576206cb336b0a5110e52c2fa8f5f28c68c15d1a58a3c6aee7592ab1882656ba94633580ddf9f66444b1b1b629c9fb898e9e26eac1db35b812fe7c2a704bd1799e38e6a2d740ad1c236393969ca546ee4ba1260e3cdda4e04eed16ce25aa728ae16950dbe90ca2e44695471c"}, {&(0x7f0000007580)="eb6401fdf671b6b9819f34a9139690a35ebe79a143d8017a7e8187c74bba5d6ace84b6af72a67b20388ac5990d126cde0bfb0227e2bc4766030acfe37b779f6c059c05a27a47c9eb6a43980e285cd831a4086c9850e5014ed38f9c773ddb6dae969765889e12afb755f045fec1d7bd7ad19847fb75d0bb5da503a30ec2b033d44b043c8ef53cac5e3a28381e8498201f902760b9ef29aa61ff1288d7977f0e49c74c656e4b23648c64cc2cfde096"}, {&(0x7f0000007640)="a262ad7f224b0a0a093216a49c476f647051480b25a77db6e9f4ff0e2e3e44f32c373dafc2d376039c55a56f9a6fb3b50aa7ecbe8aba1172a903585cb8451794345e40b7c16fcc44aae92415fa4aa52d7a945c86a65fc713fae0300bdd53e6edb323c83e10d9bd38220020aa1ccc3b6f4d"}], 0x0, &(0x7f0000007700)=[{0x0, 0x19c, 0x127, "caa9b48c56abfbf2eaa3a9f84ef0d17c556db57c439b92caf07b54af4d383fde1523765cb5d2dfc28839a2e79d59795663cd3e"}, {0x0, 0x11f, 0x3, "4cbcf7bf88bdeecce08fbf490d9e532e2ce109a01779b0ba9b4c54a31f98e490853e027d101c36c22c88c2588298fbb2b95ff48b40525e711680a3b046f53c3797bd602a6f2443f5f7ad323dfc8fd2d50f104cbe0aa6a897bd3dff3481942fef441ffcef91e5e9f1e383fa5254ead880fe9de33b240a1711731f2a950c2158d6320052abd180559278985a881eb4"}, {0x0, 0x6, 0x7, "b0143a7f9cc30cc4ac975ad5d8dc758bd90e8a194592cf369e2a90f6ee46daa83493ae3f61884c1c2fd0e42b1c33eaddba6829116e8a037a6c79209c5d2d8b619ecbba88f751fc128ab8e5c69e67b9b04a2fb095cfa515915fe576522b9861603f9d5257de4cc08ab06d525975db47ae2257ba75c9d12913999b5f28d5ca83c015af9dd6254d186e36aaa38175a5b47f52"}]}}, {{&(0x7f0000007880)=@x25={0x9, @remote={[], 0x2}}, 0x0, &(0x7f0000007a00)=[{&(0x7f0000007900)="33221888ce13118a102b113472ef94cca222d7b7e610"}, {&(0x7f0000007940)="05363a3bf86e7adbfb086b3f6ac8698fe30032e198c04421090fe3368df9e95e6ea9cd4d74dd3f1c7fb845a2e00d2e5b516772b0177eac2d03716f865c9684b6fad94e55b6c9f6911d74e203119be3659227e7b47937f4acb5758b"}, {&(0x7f00000079c0)="e1fd53ac01c4bac69919cb08acc989d05e8f492f25db0ec500a9a3518194f31d6951d33150748c892943b167481d712999deb334ec9f82746b42"}], 0x0, &(0x7f0000007a40)=[{0x0, 0x10a, 0x9, "38ad8b1adc798940895307c715b20902428d9ae652373e50be8097e8fad3364397f8b170a29b5621642a5627d50e8b8602d1cd18749191040a8ba290b400009a1ed624f3edbe314a068c9bc33510b5411bb91bc072022476dfc9141533cc6efaa2909a96bdcbe1b9c2cea905c487f7ef2d0298ead44cce2911772e362e5ec3a1605c9bbac97e83e19c08f7533a528b775a4f38b57b"}]}}, {{&(0x7f0000007b00)=@llc={0x1a, 0x0, 0x2, 0x4, 0x40, 0x45, @local}, 0x0, &(0x7f0000007cc0)=[{&(0x7f0000007b80)="b143d9e0f465fdf6c5c6f6ff525e0c4816bb6e6291829c45e3b7b52afeb4fa904c8323b37a21af2479f20125b3bb62f5b41db275722b078375de34fbc307fac1b6ccb1b7925108874cbfc5707c1c5933f8a40edd5dcff8749d6b6d142217f3eb04a3861c233e65404200f08868431ae5e67eb146cdb317cbb86260cae38f2a0ac46790ee2ed1944e2e28e3305c2fb7404c1afc5b87b51b6ce5c739858fd53d1c6fc71aaba12d231a86076cb31a7bff0f547b552b899fc6a01ec7707ed848b81585578394f7bc9e60e620c4f78658ff83e9a44f5e909c6cd80244"}, {&(0x7f0000007c80)="1a0cfe619920aa6b2846f334a2ab7d68"}], 0x0, &(0x7f0000007d00)=[{0x0, 0x105, 0x907c, "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"}, {0x0, 0x109, 0x6, "ce0add387b638315432faf024581c4de2549bd0e44a7cf9b8a2c927fc42055b26da7a7c690748615f0113195e42efd72edb399e0e2c58ec846260903bb"}, {0x0, 0x117, 0xfffffffffffffff8}, {0x0, 0x105, 0xffff, "7902282c5a9a2e15b2714b11735b1717c0156028b9f94ac99da9a158e2afc2f2dc56ef178808a78e29d25316f26e8e76137d68f400ee2ae2e69f28eb829ce3a6666cd4c64cdce399d28536bf9df2959b57e1c9843579398c9565c2ca3422e2d33ae9f4c0db879f244d219f3576db1d0c3c6b4a627a962f36cebe33ea4276e5028a8a31fabb91b9be80c87119be976d291819d4a385f2ded161a163ff097d77d3bc9a604ab544b2f07a09cbd1880fc5ef264f12faded2eac8ea04296a11eefa84f0bdf4cc89f37fa6f0191fec5db39efd78d752bba43301a5583aec25b8cf9d5283a654fb5dfded0193636eac2459cab938bfad33cb39c6c6b12530db873f"}]}}, {{&(0x7f0000008e80)=@can={0x1d, r4}, 0x0, &(0x7f0000009300)=[{&(0x7f0000008f00)="b04794b9255f1231558b349cf8b9552720688a35af4e96b487874139d5418e8930d46d7b1b3a5f0b7c2ff59b8e04bb4c51f43f43a7290d2c3497eda1ea7a6a81834d0fe98ad5b1c06127f805ccfb92f050181076bc8084b39ee03656c5d6ee6c94aff10b67db04ec8afb7b1d2fa94b87bc81d08b62b95a1b74ac2deacd77c20243a029cee73d09fbf104676bb9bd983335b60e23baeb4cf6a89bb45c3c208fd32e764473b2e6aa5c67a6ebbea0634259"}, {&(0x7f0000008fc0)="6b77ad54a19db34153ea22732747e509453391b17ab5308f3d7fe5119a1b49d057d49db6310757f0a7f3d08554860e3d0d585ef5bdf7f1e3ab0df59dbba45df70f81a2055edaeed476fb9263fee5647826a2b65ded887653232a49e984fa6d55d861f4fb9c5ee80bf8bd4e6bc2cec82f1aaa366487c5b81c2568d2b47b3cc9b44f40a902a5318532b18896d9c893a4a72b55c3610829b4d962d89e9d6c68bc4c89ebb2010c5a903cab77180c054c6730d08c1da93eade9aad4ff672fd11c57a2cd6256f38cf43289"}, {&(0x7f00000090c0)="bf3df64af7e408cbae5a0a9f8e148af563449f2747903abb0356d8d49e39f1f07c3626ca5166048470826fe1274ac1ffebc4f5104a7f5ca7a686e407ca39e04098b935239104d7c110cf38cce90f121e0db69d2ce893cf658b6c0c6eee0f06f0fed0328873e871a8413c24e529514957cf8fd1fee1faa8b8a8aa02aae15eb5d8c626"}, {&(0x7f0000009180)="1e5e949ce331c5b6bf7a25fd74ede0e968e39683e7e0081c433d49364637986bceb0b3af9fd05f8e6332a97323916c1bb3c1fe32c184b2bab088d77fd8d40683ed0feeddcedff74ce3d6b871"}, {&(0x7f0000009200)="e2da73fe1c275a075d5d6c384f4db3fc7671e8fde457988e2c3564cc3f2d6ed69ce01f22d230c6ee227f168df05fa589d2bd08c16170bbeacd18a9accf1131"}, {&(0x7f0000009240)="0d16f8e3f1f741798ef577e692af10d165ec7b657ed1d96a3483e1cd4f36400ee789370e62a638ed21b06c8074e71bb15b609331815f24fae22bc8553a05aef4be31dc847b65b7b787d4205156c7facfd0d9617c7173d9a8cc9f24348641ac2dd4bd9ee9d7d9426672d92afd06167193e053151051ee6982c2f732ccaa93d5c4cbb2363a977318a1e2ee4c445af6251dfa9511381770469b294fe4519008ef"}], 0x0, &(0x7f0000009340)=ANY=[@ANYBLOB="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"]}}], 0x4a, 0x0) [ 760.325702][T17038] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 760.325711][T17038] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 760.325719][T17038] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 760.325728][T17038] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 760.389651][T17055] FAULT_INJECTION: forcing a failure. [ 760.389651][T17055] name failslab, interval 1, probability 0, space 0, times 0 [ 760.427144][T17055] CPU: 0 PID: 17055 Comm: syz-executor.2 Not tainted 5.1.0+ #6 [ 760.434824][T17055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.444893][T17055] Call Trace: [ 760.448206][T17055] dump_stack+0x172/0x1f0 [ 760.452548][T17055] should_fail.cold+0xa/0x15 [ 760.457149][T17055] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 760.462971][T17055] ? netlink_deliver_tap+0x146/0xc00 [ 760.468289][T17055] __should_failslab+0x121/0x190 [ 760.473244][T17055] should_failslab+0x9/0x14 [ 760.477768][T17055] kmem_cache_alloc+0x47/0x6f0 [ 760.482552][T17055] ? lock_acquire+0x16f/0x3f0 [ 760.487240][T17055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.493504][T17055] skb_clone+0x154/0x3b0 [ 760.497854][T17055] netlink_deliver_tap+0x95c/0xc00 [ 760.502990][T17055] netlink_unicast+0x5a7/0x720 [ 760.507861][T17055] ? netlink_attachskb+0x770/0x770 [ 760.512990][T17055] ? _copy_from_iter_full+0x25d/0x8c0 [ 760.513019][T17055] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 760.513035][T17055] ? __check_object_size+0x3d/0x42f [ 760.513054][T17055] netlink_sendmsg+0x8ae/0xd70 [ 760.513075][T17055] ? netlink_unicast+0x720/0x720 [ 760.513089][T17055] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 760.513105][T17055] ? apparmor_socket_sendmsg+0x2a/0x30 [ 760.513120][T17055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.513138][T17055] ? security_socket_sendmsg+0x93/0xc0 [ 760.513153][T17055] ? netlink_unicast+0x720/0x720 [ 760.513171][T17055] sock_sendmsg+0x12e/0x170 [ 760.513194][T17055] ___sys_sendmsg+0x81d/0x960 20:00:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c, 0x80000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f00000000c0)=0x10) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @loopback}, 0xfffffffffffffc89) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x4000) 20:00:51 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r2, 0x4) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:51 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000f5ffffff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 760.525714][T17038] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 760.529500][T17055] ? copy_msghdr_from_user+0x430/0x430 [ 760.529523][T17055] ? kasan_check_read+0x11/0x20 [ 760.529542][T17055] ? __fget+0x381/0x550 [ 760.529563][T17055] ? ksys_dup3+0x3e0/0x3e0 [ 760.529587][T17055] ? lock_downgrade+0x880/0x880 [ 760.556662][T17055] ? __fget_light+0x1a9/0x230 [ 760.556686][T17055] ? __fdget+0x1b/0x20 [ 760.585693][T17055] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 20:00:51 executing program 2 (fault-call:2 fault-nth:3): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 760.585716][T17055] __sys_sendmsg+0x105/0x1d0 [ 760.585734][T17055] ? __ia32_sys_shutdown+0x80/0x80 [ 760.585762][T17055] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 760.585777][T17055] ? do_fast_syscall_32+0xd1/0xd54 [ 760.585794][T17055] ? entry_SYSENTER_compat+0x70/0x7f [ 760.585809][T17055] ? do_fast_syscall_32+0xd1/0xd54 [ 760.585832][T17055] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 760.585864][T17055] do_fast_syscall_32+0x281/0xd54 [ 760.604750][T17055] entry_SYSENTER_compat+0x70/0x7f [ 760.604764][T17055] RIP: 0023:0xf7fe6849 20:00:51 executing program 4 (fault-call:1 fault-nth:3): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 760.604786][T17055] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 760.618359][T17055] RSP: 002b:00000000f5de20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 760.618374][T17055] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000380 [ 760.618382][T17055] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 760.618390][T17055] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 760.618399][T17055] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 760.618406][T17055] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 760.666583][T17063] FAULT_INJECTION: forcing a failure. [ 760.666583][T17063] name failslab, interval 1, probability 0, space 0, times 0 [ 760.741587][T17071] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:52 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 760.849193][T17063] CPU: 0 PID: 17063 Comm: syz-executor.2 Not tainted 5.1.0+ #6 [ 760.856779][T17063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.866840][T17063] Call Trace: [ 760.870151][T17063] dump_stack+0x172/0x1f0 [ 760.874510][T17063] should_fail.cold+0xa/0x15 [ 760.879129][T17063] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 760.884976][T17063] ? ___might_sleep+0x163/0x280 [ 760.889863][T17063] __should_failslab+0x121/0x190 [ 760.894909][T17063] should_failslab+0x9/0x14 [ 760.899426][T17063] kmem_cache_alloc_node+0x264/0x710 [ 760.904731][T17063] ? mutex_trylock+0x1e0/0x1e0 [ 760.909509][T17063] ? lock_acquire+0x16f/0x3f0 [ 760.914196][T17063] ? __netlink_dump_start+0x10c/0x7e0 [ 760.919583][T17063] ? __netlink_dump_start+0x5ac/0x7e0 [ 760.924978][T17063] __alloc_skb+0xd5/0x5e0 [ 760.929332][T17063] ? skb_trim+0x190/0x190 [ 760.933689][T17063] netlink_dump+0x724/0xfb0 [ 760.938211][T17063] ? netlink_broadcast+0x50/0x50 [ 760.943159][T17063] ? lock_downgrade+0x880/0x880 20:00:52 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r1], 0x1df) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=""/199, 0xc7, 0xffffffffffffffff}}, 0x10) r2 = dup2(r1, r1) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:52 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:52 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) getsockname(r0, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) [ 760.947275][T17071] FAULT_INJECTION: forcing a failure. [ 760.947275][T17071] name failslab, interval 1, probability 0, space 0, times 0 [ 760.948061][T17063] __netlink_dump_start+0x5b4/0x7e0 [ 760.948078][T17063] ? genl_lock_dumpit+0xa0/0xa0 [ 760.948101][T17063] genl_family_rcv_msg+0xd67/0xf90 [ 760.976674][T17063] ? genl_rcv_msg+0x13e/0x16c [ 760.976699][T17063] ? genl_unregister_family+0x790/0x790 [ 760.976714][T17063] ? genl_lock_dumpit+0xa0/0xa0 [ 760.976726][T17063] ? genl_lock_done+0xe0/0xe0 [ 760.976739][T17063] ? genl_unlock+0x20/0x20 [ 760.976757][T17063] ? __dev_queue_xmit+0xb9c/0x36f0 20:00:52 executing program 4 (fault-call:1 fault-nth:4): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 760.976777][T17063] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 760.976795][T17063] ? __radix_tree_lookup+0x1ef/0x260 20:00:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x21) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) [ 760.976823][T17063] genl_rcv_msg+0xca/0x16c 20:00:52 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 760.976842][T17063] netlink_rcv_skb+0x17a/0x460 20:00:52 executing program 2 (fault-call:2 fault-nth:4): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 760.976858][T17063] ? genl_family_rcv_msg+0xf90/0xf90 [ 760.976876][T17063] ? netlink_ack+0xb50/0xb50 [ 760.976892][T17063] ? lock_acquire+0x16f/0x3f0 [ 760.976915][T17063] ? kasan_check_write+0x14/0x20 [ 760.976934][T17063] genl_rcv+0x29/0x40 [ 760.976948][T17063] netlink_unicast+0x536/0x720 [ 760.976966][T17063] ? netlink_attachskb+0x770/0x770 [ 760.976981][T17063] ? _copy_from_iter_full+0x25d/0x8c0 [ 760.976997][T17063] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 760.977028][T17063] ? __check_object_size+0x3d/0x42f [ 760.977049][T17063] netlink_sendmsg+0x8ae/0xd70 [ 760.977071][T17063] ? netlink_unicast+0x720/0x720 [ 760.977086][T17063] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 760.977103][T17063] ? apparmor_socket_sendmsg+0x2a/0x30 [ 760.977119][T17063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.977137][T17063] ? security_socket_sendmsg+0x93/0xc0 [ 760.977152][T17063] ? netlink_unicast+0x720/0x720 [ 760.977170][T17063] sock_sendmsg+0x12e/0x170 [ 760.977189][T17063] ___sys_sendmsg+0x81d/0x960 20:00:52 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:52 executing program 4 (fault-call:1 fault-nth:5): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 760.977209][T17063] ? copy_msghdr_from_user+0x430/0x430 [ 760.977232][T17063] ? kasan_check_read+0x11/0x20 [ 760.977254][T17063] ? __fget+0x381/0x550 [ 760.977278][T17063] ? ksys_dup3+0x3e0/0x3e0 [ 760.977292][T17063] ? lock_downgrade+0x880/0x880 [ 760.977316][T17063] ? __fget_light+0x1a9/0x230 [ 760.977335][T17063] ? __fdget+0x1b/0x20 [ 760.977359][T17063] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.977382][T17063] __sys_sendmsg+0x105/0x1d0 [ 760.977401][T17063] ? __ia32_sys_shutdown+0x80/0x80 [ 760.977430][T17063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 760.977447][T17063] ? do_fast_syscall_32+0xd1/0xd54 [ 760.977464][T17063] ? entry_SYSENTER_compat+0x70/0x7f [ 760.977480][T17063] ? do_fast_syscall_32+0xd1/0xd54 [ 760.977505][T17063] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 760.977522][T17063] do_fast_syscall_32+0x281/0xd54 [ 760.977543][T17063] entry_SYSENTER_compat+0x70/0x7f [ 760.977556][T17063] RIP: 0023:0xf7fe6849 [ 760.977570][T17063] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 760.977578][T17063] RSP: 002b:00000000f5de20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 760.977592][T17063] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000380 [ 760.977600][T17063] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 760.977608][T17063] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 760.977616][T17063] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 760.977624][T17063] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 760.999139][T17071] CPU: 0 PID: 17071 Comm: syz-executor.4 Not tainted 5.1.0+ #6 [ 760.999149][T17071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.999155][T17071] Call Trace: [ 760.999178][T17071] dump_stack+0x172/0x1f0 [ 760.999199][T17071] should_fail.cold+0xa/0x15 [ 760.999219][T17071] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 760.999240][T17071] ? ___might_sleep+0x163/0x280 [ 760.999262][T17071] __should_failslab+0x121/0x190 [ 760.999279][T17071] should_failslab+0x9/0x14 [ 760.999297][T17071] kmem_cache_alloc_node+0x264/0x710 [ 760.999316][T17071] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 760.999340][T17071] __alloc_skb+0xd5/0x5e0 [ 760.999367][T17071] ? skb_trim+0x190/0x190 [ 760.999476][T17071] nl80211_get_protocol_features+0x85/0x380 [ 760.999496][T17071] ? nl80211_msg_put_channel+0x10b0/0x10b0 [ 760.999515][T17071] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 760.999557][T17071] ? nl80211_pre_doit+0xab/0x650 20:00:52 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r0], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 760.999577][T17071] ? __cfg80211_rdev_from_attrs+0x710/0x710 [ 760.999596][T17071] genl_family_rcv_msg+0x753/0xf90 [ 760.999621][T17071] ? genl_unregister_family+0x790/0x790 [ 760.999637][T17071] ? __lock_acquire+0x54f/0x5490 [ 760.999682][T17071] ? __local_bh_enable_ip+0x15a/0x270 [ 760.999701][T17071] ? __dev_queue_xmit+0xb9c/0x36f0 [ 760.999733][T17071] genl_rcv_msg+0xca/0x16c [ 760.999750][T17071] netlink_rcv_skb+0x17a/0x460 [ 760.999766][T17071] ? genl_family_rcv_msg+0xf90/0xf90 [ 760.999784][T17071] ? netlink_ack+0xb50/0xb50 [ 760.999799][T17071] ? lock_acquire+0x16f/0x3f0 [ 760.999820][T17071] ? kasan_check_write+0x14/0x20 [ 760.999839][T17071] genl_rcv+0x29/0x40 [ 760.999853][T17071] netlink_unicast+0x536/0x720 [ 760.999874][T17071] ? netlink_attachskb+0x770/0x770 [ 760.999889][T17071] ? _copy_from_iter_full+0x25d/0x8c0 [ 760.999904][T17071] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 760.999921][T17071] ? __check_object_size+0x3d/0x42f [ 760.999941][T17071] netlink_sendmsg+0x8ae/0xd70 [ 760.999963][T17071] ? netlink_unicast+0x720/0x720 [ 760.999978][T17071] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 760.999997][T17071] ? apparmor_socket_sendmsg+0x2a/0x30 [ 761.000027][T17071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.000046][T17071] ? security_socket_sendmsg+0x93/0xc0 [ 761.000061][T17071] ? netlink_unicast+0x720/0x720 [ 761.000080][T17071] sock_sendmsg+0x12e/0x170 [ 761.000098][T17071] ___sys_sendmsg+0x81d/0x960 [ 761.000118][T17071] ? copy_msghdr_from_user+0x430/0x430 [ 761.000143][T17071] ? kasan_check_read+0x11/0x20 [ 761.000174][T17071] ? __fget+0x381/0x550 [ 761.000194][T17071] ? ksys_dup3+0x3e0/0x3e0 [ 761.000208][T17071] ? lock_downgrade+0x880/0x880 [ 761.000233][T17071] ? __fget_light+0x1a9/0x230 [ 761.000251][T17071] ? __fdget+0x1b/0x20 [ 761.000266][T17071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.000289][T17071] __sys_sendmsg+0x105/0x1d0 [ 761.000308][T17071] ? __ia32_sys_shutdown+0x80/0x80 [ 761.000338][T17071] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 761.000364][T17071] ? do_fast_syscall_32+0xd1/0xd54 [ 761.000380][T17071] ? entry_SYSENTER_compat+0x70/0x7f [ 761.000396][T17071] ? do_fast_syscall_32+0xd1/0xd54 [ 761.000420][T17071] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 761.000440][T17071] do_fast_syscall_32+0x281/0xd54 [ 761.000462][T17071] entry_SYSENTER_compat+0x70/0x7f [ 761.000475][T17071] RIP: 0023:0xf7fa5849 [ 761.000493][T17071] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 761.000501][T17071] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 761.000515][T17071] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 761.000524][T17071] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 761.000532][T17071] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 761.000541][T17071] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 761.000549][T17071] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 761.178927][T17100] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 761.178958][T17100] FAULT_INJECTION: forcing a failure. [ 761.178958][T17100] name failslab, interval 1, probability 0, space 0, times 0 [ 761.178977][T17100] CPU: 0 PID: 17100 Comm: syz-executor.4 Not tainted 5.1.0+ #6 [ 761.178987][T17100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.178993][T17100] Call Trace: [ 761.179031][T17100] dump_stack+0x172/0x1f0 [ 761.179051][T17100] should_fail.cold+0xa/0x15 [ 761.179069][T17100] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 761.179088][T17100] ? ___might_sleep+0x163/0x280 [ 761.179112][T17100] __should_failslab+0x121/0x190 [ 761.179130][T17100] should_failslab+0x9/0x14 [ 761.179150][T17100] kmem_cache_alloc_node_trace+0x270/0x720 [ 761.179179][T17100] __kmalloc_node_track_caller+0x3d/0x70 [ 761.179202][T17100] __kmalloc_reserve.isra.0+0x40/0xf0 [ 761.179223][T17100] __alloc_skb+0x10b/0x5e0 [ 761.179241][T17100] ? skb_trim+0x190/0x190 [ 761.179268][T17100] nl80211_get_protocol_features+0x85/0x380 [ 761.179285][T17100] ? nl80211_msg_put_channel+0x10b0/0x10b0 [ 761.179306][T17100] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 761.179323][T17100] ? nl80211_pre_doit+0xab/0x650 [ 761.179355][T17100] ? __cfg80211_rdev_from_attrs+0x710/0x710 [ 761.179380][T17100] genl_family_rcv_msg+0x753/0xf90 [ 761.179407][T17100] ? genl_unregister_family+0x790/0x790 [ 761.179426][T17100] ? __lock_acquire+0x54f/0x5490 [ 761.179443][T17100] ? __local_bh_enable_ip+0x15a/0x270 [ 761.179461][T17100] ? __dev_queue_xmit+0xb9c/0x36f0 [ 761.179497][T17100] genl_rcv_msg+0xca/0x16c [ 761.179518][T17100] netlink_rcv_skb+0x17a/0x460 [ 761.179540][T17100] ? genl_family_rcv_msg+0xf90/0xf90 [ 761.179561][T17100] ? netlink_ack+0xb50/0xb50 [ 761.179579][T17100] ? lock_acquire+0x16f/0x3f0 [ 761.179605][T17100] ? kasan_check_write+0x14/0x20 [ 761.179627][T17100] genl_rcv+0x29/0x40 [ 761.179643][T17100] netlink_unicast+0x536/0x720 [ 761.179666][T17100] ? netlink_attachskb+0x770/0x770 [ 761.179682][T17100] ? _copy_from_iter_full+0x25d/0x8c0 [ 761.179699][T17100] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 761.179717][T17100] ? __check_object_size+0x3d/0x42f [ 761.179740][T17100] netlink_sendmsg+0x8ae/0xd70 [ 761.179764][T17100] ? netlink_unicast+0x720/0x720 [ 761.179782][T17100] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 761.179804][T17100] ? apparmor_socket_sendmsg+0x2a/0x30 [ 761.179822][T17100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.179843][T17100] ? security_socket_sendmsg+0x93/0xc0 [ 761.179858][T17100] ? netlink_unicast+0x720/0x720 [ 761.179879][T17100] sock_sendmsg+0x12e/0x170 [ 761.179901][T17100] ___sys_sendmsg+0x81d/0x960 [ 761.179923][T17100] ? copy_msghdr_from_user+0x430/0x430 [ 761.179949][T17100] ? kasan_check_read+0x11/0x20 [ 761.179974][T17100] ? __fget+0x381/0x550 [ 761.180016][T17100] ? ksys_dup3+0x3e0/0x3e0 [ 761.180034][T17100] ? lock_downgrade+0x880/0x880 [ 761.180063][T17100] ? __fget_light+0x1a9/0x230 [ 761.180084][T17100] ? __fdget+0x1b/0x20 [ 761.180101][T17100] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.180124][T17100] __sys_sendmsg+0x105/0x1d0 [ 761.180143][T17100] ? __ia32_sys_shutdown+0x80/0x80 [ 761.180173][T17100] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 761.180191][T17100] ? do_fast_syscall_32+0xd1/0xd54 [ 761.180208][T17100] ? entry_SYSENTER_compat+0x70/0x7f [ 761.180224][T17100] ? do_fast_syscall_32+0xd1/0xd54 [ 761.180247][T17100] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 761.180266][T17100] do_fast_syscall_32+0x281/0xd54 [ 761.180289][T17100] entry_SYSENTER_compat+0x70/0x7f [ 761.180302][T17100] RIP: 0023:0xf7fa5849 [ 761.180318][T17100] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 761.180327][T17100] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 761.180342][T17100] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 761.180359][T17100] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 761.180369][T17100] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 761.180378][T17100] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 761.180388][T17100] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 761.317301][T17105] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 761.317358][T17105] FAULT_INJECTION: forcing a failure. [ 761.317358][T17105] name failslab, interval 1, probability 0, space 0, times 0 [ 761.348620][T17105] CPU: 0 PID: 17105 Comm: syz-executor.4 Not tainted 5.1.0+ #6 [ 761.387760][T17105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.421555][T17105] Call Trace: [ 761.421583][T17105] dump_stack+0x172/0x1f0 [ 761.421602][T17105] should_fail.cold+0xa/0x15 [ 761.421616][T17105] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 761.421633][T17105] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 761.421646][T17105] ? genl_rcv_msg+0xca/0x16c [ 761.421658][T17105] ? netlink_rcv_skb+0x17a/0x460 [ 761.421669][T17105] ? genl_rcv+0x29/0x40 [ 761.421681][T17105] ? netlink_unicast+0x536/0x720 [ 761.421693][T17105] ? netlink_sendmsg+0x8ae/0xd70 [ 761.421708][T17105] ? sock_sendmsg+0x12e/0x170 [ 761.421722][T17105] ? ___sys_sendmsg+0x81d/0x960 [ 761.421737][T17105] ? __sys_sendmsg+0x105/0x1d0 [ 761.421762][T17105] __should_failslab+0x121/0x190 [ 761.438163][T17105] should_failslab+0x9/0x14 [ 761.454104][T17105] kmem_cache_alloc_node_trace+0x5a/0x720 [ 761.454131][T17105] __kmalloc_node_track_caller+0x3d/0x70 [ 761.454151][T17105] __kmalloc_reserve.isra.0+0x40/0xf0 [ 761.454170][T17105] pskb_expand_head+0x151/0xdd0 [ 761.454184][T17105] ? kasan_unpoison_shadow+0x35/0x50 [ 761.454207][T17105] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 761.515488][T17105] netlink_trim+0x218/0x270 20:00:53 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 761.531075][T17105] netlink_unicast+0xbf/0x720 [ 761.531090][T17105] ? memset+0x32/0x40 [ 761.531105][T17105] ? memcpy+0x46/0x50 [ 761.531119][T17105] ? netlink_attachskb+0x770/0x770 [ 761.531133][T17105] ? __nla_put+0x37/0x40 [ 761.531154][T17105] ? nla_put+0x110/0x150 [ 762.446997][T17105] nl80211_get_protocol_features+0x26c/0x380 [ 762.447031][T17105] ? nl80211_msg_put_channel+0x10b0/0x10b0 [ 762.459433][T17105] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 762.465698][T17105] ? nl80211_pre_doit+0xab/0x650 [ 762.470652][T17105] ? __cfg80211_rdev_from_attrs+0x710/0x710 [ 762.476555][T17105] genl_family_rcv_msg+0x753/0xf90 [ 762.481676][T17105] ? genl_unregister_family+0x790/0x790 [ 762.481692][T17105] ? __lock_acquire+0x54f/0x5490 [ 762.481708][T17105] ? __local_bh_enable_ip+0x15a/0x270 [ 762.481724][T17105] ? __dev_queue_xmit+0xb9c/0x36f0 [ 762.481756][T17105] genl_rcv_msg+0xca/0x16c [ 762.481777][T17105] netlink_rcv_skb+0x17a/0x460 [ 762.512026][T17105] ? genl_family_rcv_msg+0xf90/0xf90 [ 762.512048][T17105] ? netlink_ack+0xb50/0xb50 [ 762.521942][T17105] ? lock_acquire+0x16f/0x3f0 [ 762.526643][T17105] ? kasan_check_write+0x14/0x20 [ 762.531599][T17105] genl_rcv+0x29/0x40 [ 762.535598][T17105] netlink_unicast+0x536/0x720 [ 762.540393][T17105] ? netlink_attachskb+0x770/0x770 [ 762.545554][T17105] ? _copy_from_iter_full+0x25d/0x8c0 [ 762.550941][T17105] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 762.556676][T17105] ? __check_object_size+0x3d/0x42f [ 762.561899][T17105] netlink_sendmsg+0x8ae/0xd70 20:00:53 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 762.566678][T17105] ? netlink_unicast+0x720/0x720 [ 762.571625][T17105] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 762.577187][T17105] ? apparmor_socket_sendmsg+0x2a/0x30 [ 762.582673][T17105] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.582691][T17105] ? security_socket_sendmsg+0x93/0xc0 [ 762.582706][T17105] ? netlink_unicast+0x720/0x720 [ 762.582724][T17105] sock_sendmsg+0x12e/0x170 [ 762.582742][T17105] ___sys_sendmsg+0x81d/0x960 [ 762.582758][T17105] ? copy_msghdr_from_user+0x430/0x430 [ 762.582786][T17105] ? kasan_check_read+0x11/0x20 [ 762.599436][T17105] ? __fget+0x381/0x550 [ 762.599457][T17105] ? ksys_dup3+0x3e0/0x3e0 [ 762.599473][T17105] ? lock_downgrade+0x880/0x880 [ 762.599497][T17105] ? __fget_light+0x1a9/0x230 [ 762.599519][T17105] ? __fdget+0x1b/0x20 [ 762.641112][T17105] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.641137][T17105] __sys_sendmsg+0x105/0x1d0 [ 762.641156][T17105] ? __ia32_sys_shutdown+0x80/0x80 [ 762.641187][T17105] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 762.641204][T17105] ? do_fast_syscall_32+0xd1/0xd54 20:00:53 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 762.641229][T17105] ? entry_SYSENTER_compat+0x70/0x7f [ 762.673261][T17105] ? do_fast_syscall_32+0xd1/0xd54 [ 762.678399][T17105] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 762.683873][T17105] do_fast_syscall_32+0x281/0xd54 [ 762.688913][T17105] entry_SYSENTER_compat+0x70/0x7f [ 762.694042][T17105] RIP: 0023:0xf7fa5849 [ 762.698116][T17105] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:00:54 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) 20:00:54 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 762.717729][T17105] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 762.717744][T17105] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 762.717751][T17105] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 762.717759][T17105] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 762.717766][T17105] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 762.717772][T17105] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:00:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:54 executing program 4 (fault-call:1 fault-nth:6): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:54 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:54 executing program 3: openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x101001, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0xffffffffffffffff, 0x4) rt_sigreturn() connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 20:00:54 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 762.934279][T17160] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x2, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:54 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:54 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 763.081792][T17160] FAULT_INJECTION: forcing a failure. [ 763.081792][T17160] name failslab, interval 1, probability 0, space 0, times 0 [ 763.117068][T17160] CPU: 1 PID: 17160 Comm: syz-executor.4 Not tainted 5.1.0+ #6 [ 763.124660][T17160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.134765][T17160] Call Trace: [ 763.138090][T17160] dump_stack+0x172/0x1f0 [ 763.142445][T17160] should_fail.cold+0xa/0x15 [ 763.147059][T17160] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.152879][T17160] ? find_held_lock+0x35/0x130 [ 763.152903][T17160] ? netlink_deliver_tap+0x146/0xc00 [ 763.152927][T17160] __should_failslab+0x121/0x190 [ 763.167917][T17160] should_failslab+0x9/0x14 [ 763.172441][T17160] kmem_cache_alloc+0x47/0x6f0 [ 763.177218][T17160] ? lock_acquire+0x16f/0x3f0 [ 763.177236][T17160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.177260][T17160] skb_clone+0x154/0x3b0 [ 763.192410][T17160] netlink_deliver_tap+0x95c/0xc00 [ 763.197548][T17160] __netlink_sendskb+0x63/0xd0 [ 763.202332][T17160] netlink_unicast+0x60f/0x720 [ 763.207116][T17160] ? netlink_attachskb+0x770/0x770 [ 763.212246][T17160] ? nla_put+0x110/0x150 [ 763.216507][T17160] nl80211_get_protocol_features+0x26c/0x380 [ 763.222500][T17160] ? nl80211_msg_put_channel+0x10b0/0x10b0 20:00:54 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x400) read$FUSE(r1, &(0x7f0000000a80), 0x1000) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x3, 0x0}}], 0x2, 0x0) [ 763.228327][T17160] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 763.234577][T17160] ? nl80211_pre_doit+0xab/0x650 [ 763.239535][T17160] ? __cfg80211_rdev_from_attrs+0x710/0x710 [ 763.245444][T17160] genl_family_rcv_msg+0x753/0xf90 [ 763.250606][T17160] ? genl_unregister_family+0x790/0x790 [ 763.256178][T17160] ? __lock_acquire+0x54f/0x5490 [ 763.261125][T17160] ? __local_bh_enable_ip+0x15a/0x270 [ 763.266490][T17160] ? __dev_queue_xmit+0xb9c/0x36f0 [ 763.271606][T17160] genl_rcv_msg+0xca/0x16c [ 763.276020][T17160] netlink_rcv_skb+0x17a/0x460 [ 763.280775][T17160] ? genl_family_rcv_msg+0xf90/0xf90 [ 763.286066][T17160] ? netlink_ack+0xb50/0xb50 [ 763.290666][T17160] ? lock_acquire+0x16f/0x3f0 [ 763.295344][T17160] ? kasan_check_write+0x14/0x20 [ 763.300301][T17160] genl_rcv+0x29/0x40 [ 763.304290][T17160] netlink_unicast+0x536/0x720 [ 763.309063][T17160] ? netlink_attachskb+0x770/0x770 [ 763.314338][T17160] ? _copy_from_iter_full+0x25d/0x8c0 [ 763.319697][T17160] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 763.325399][T17160] ? __check_object_size+0x3d/0x42f [ 763.330584][T17160] netlink_sendmsg+0x8ae/0xd70 [ 763.335351][T17160] ? netlink_unicast+0x720/0x720 [ 763.340290][T17160] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 763.345825][T17160] ? apparmor_socket_sendmsg+0x2a/0x30 [ 763.351295][T17160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.357540][T17160] ? security_socket_sendmsg+0x93/0xc0 [ 763.362986][T17160] ? netlink_unicast+0x720/0x720 [ 763.368033][T17160] sock_sendmsg+0x12e/0x170 [ 763.372529][T17160] ___sys_sendmsg+0x81d/0x960 [ 763.377217][T17160] ? copy_msghdr_from_user+0x430/0x430 [ 763.382671][T17160] ? kasan_check_read+0x11/0x20 [ 763.387515][T17160] ? __fget+0x381/0x550 [ 763.391662][T17160] ? ksys_dup3+0x3e0/0x3e0 [ 763.396064][T17160] ? lock_downgrade+0x880/0x880 [ 763.400903][T17160] ? __fget_light+0x1a9/0x230 [ 763.405569][T17160] ? __fdget+0x1b/0x20 [ 763.409629][T17160] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.415868][T17160] __sys_sendmsg+0x105/0x1d0 [ 763.420453][T17160] ? __ia32_sys_shutdown+0x80/0x80 [ 763.425581][T17160] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 763.431037][T17160] ? do_fast_syscall_32+0xd1/0xd54 [ 763.436140][T17160] ? entry_SYSENTER_compat+0x70/0x7f [ 763.441428][T17160] ? do_fast_syscall_32+0xd1/0xd54 [ 763.446534][T17160] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 763.451986][T17160] do_fast_syscall_32+0x281/0xd54 [ 763.457038][T17160] entry_SYSENTER_compat+0x70/0x7f [ 763.462170][T17160] RIP: 0023:0xf7fa5849 [ 763.466225][T17160] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 763.485813][T17160] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 763.494218][T17160] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 763.502176][T17160] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 763.510137][T17160] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 763.518102][T17160] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 763.526077][T17160] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:00:54 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:54 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:54 executing program 4 (fault-call:1 fault-nth:7): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:54 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:54 executing program 1: syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x4, 0x2) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) execveat(r0, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:54 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:54 executing program 3: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 763.704949][T17205] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 763.721932][T17205] FAULT_INJECTION: forcing a failure. [ 763.721932][T17205] name failslab, interval 1, probability 0, space 0, times 0 [ 763.773618][T17205] CPU: 0 PID: 17205 Comm: syz-executor.4 Not tainted 5.1.0+ #6 [ 763.781204][T17205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.791278][T17205] Call Trace: [ 763.794596][T17205] dump_stack+0x172/0x1f0 [ 763.798945][T17205] should_fail.cold+0xa/0x15 [ 763.803554][T17205] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.809389][T17205] ? ___might_sleep+0x163/0x280 [ 763.814264][T17205] __should_failslab+0x121/0x190 [ 763.819220][T17205] should_failslab+0x9/0x14 [ 763.823746][T17205] kmem_cache_alloc_node+0x264/0x710 [ 763.829052][T17205] ? genl_rcv_msg+0x129/0x16c [ 763.833749][T17205] ? genl_family_rcv_msg+0x809/0xf90 [ 763.839056][T17205] __alloc_skb+0xd5/0x5e0 [ 763.843407][T17205] ? skb_trim+0x190/0x190 [ 763.847757][T17205] ? kasan_check_write+0x14/0x20 [ 763.852714][T17205] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 763.858277][T17205] netlink_ack+0x25c/0xb50 [ 763.862721][T17205] ? netlink_sendmsg+0xd70/0xd70 [ 763.867769][T17205] ? mutex_unlock+0xd/0x10 [ 763.872204][T17205] ? genl_rcv_msg+0x106/0x16c [ 763.876901][T17205] netlink_rcv_skb+0x379/0x460 [ 763.881690][T17205] ? genl_family_rcv_msg+0xf90/0xf90 [ 763.887022][T17205] ? netlink_ack+0xb50/0xb50 [ 763.891644][T17205] ? lock_acquire+0x16f/0x3f0 [ 763.896355][T17205] ? kasan_check_write+0x14/0x20 [ 763.901321][T17205] genl_rcv+0x29/0x40 [ 763.905322][T17205] netlink_unicast+0x536/0x720 [ 763.910125][T17205] ? netlink_attachskb+0x770/0x770 [ 763.915364][T17205] ? _copy_from_iter_full+0x25d/0x8c0 20:00:55 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:55 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 763.920774][T17205] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 763.926529][T17205] ? __check_object_size+0x3d/0x42f [ 763.931754][T17205] netlink_sendmsg+0x8ae/0xd70 [ 763.936547][T17205] ? netlink_unicast+0x720/0x720 [ 763.941507][T17205] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 763.947078][T17205] ? apparmor_socket_sendmsg+0x2a/0x30 [ 763.952561][T17205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 763.958821][T17205] ? security_socket_sendmsg+0x93/0xc0 [ 763.964294][T17205] ? netlink_unicast+0x720/0x720 [ 763.964377][T17205] sock_sendmsg+0x12e/0x170 [ 763.964399][T17205] ___sys_sendmsg+0x81d/0x960 [ 763.978592][T17205] ? copy_msghdr_from_user+0x430/0x430 [ 763.984085][T17205] ? kasan_check_read+0x11/0x20 [ 763.988967][T17205] ? __fget+0x381/0x550 [ 763.993204][T17205] ? ksys_dup3+0x3e0/0x3e0 [ 763.993222][T17205] ? lock_downgrade+0x880/0x880 [ 763.993249][T17205] ? __fget_light+0x1a9/0x230 [ 763.993266][T17205] ? __fdget+0x1b/0x20 [ 763.993290][T17205] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.007257][T17205] __sys_sendmsg+0x105/0x1d0 [ 764.022181][T17205] ? __ia32_sys_shutdown+0x80/0x80 [ 764.027514][T17205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 764.033042][T17205] ? do_fast_syscall_32+0xd1/0xd54 [ 764.038183][T17205] ? entry_SYSENTER_compat+0x70/0x7f [ 764.043498][T17205] ? do_fast_syscall_32+0xd1/0xd54 [ 764.048656][T17205] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 764.054298][T17205] do_fast_syscall_32+0x281/0xd54 [ 764.059364][T17205] entry_SYSENTER_compat+0x70/0x7f [ 764.064621][T17205] RIP: 0023:0xf7fa5849 20:00:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/26) 20:00:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xe, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:55 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 764.068711][T17205] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 764.088338][T17205] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 764.096978][T17205] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 764.105043][T17205] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 764.113074][T17205] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 764.121071][T17205] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 764.129072][T17205] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:00:55 executing program 4 (fault-call:1 fault-nth:8): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:55 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r0], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:55 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:55 executing program 0: r0 = add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r0, 0x101) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x0, 0x401) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)=""/155, 0x9b}, {&(0x7f00000003c0)=""/69, 0x45}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000000580)=""/125, 0x35}, {&(0x7f0000000600)=""/71, 0x47}], 0x7) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x80000001, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f00000000c0)=0x7, &(0x7f0000000180)=0x1) sendmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x361, 0x0}}], 0x2, 0x0) 20:00:55 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd33f32d5020"], 0xa) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:55 executing program 1: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r0], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:55 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x40) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000040)={0xff, 0x40, 0x401}) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000180)=0xc) ptrace$cont(0x20, r2, 0x8f7b, 0x6) [ 764.372152][T17262] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x60, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 764.454173][T17262] FAULT_INJECTION: forcing a failure. [ 764.454173][T17262] name failslab, interval 1, probability 0, space 0, times 0 20:00:55 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, 0x0, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 764.550214][T17262] CPU: 0 PID: 17262 Comm: syz-executor.4 Not tainted 5.1.0+ #6 [ 764.557830][T17262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.567916][T17262] Call Trace: [ 764.571237][T17262] dump_stack+0x172/0x1f0 [ 764.575600][T17262] should_fail.cold+0xa/0x15 [ 764.580218][T17262] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 764.586290][T17262] ? ___might_sleep+0x163/0x280 [ 764.591170][T17262] __should_failslab+0x121/0x190 [ 764.596141][T17262] should_failslab+0x9/0x14 20:00:55 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 764.600678][T17262] kmem_cache_alloc_node+0x264/0x710 [ 764.605993][T17262] ? genl_rcv_msg+0x129/0x16c [ 764.610736][T17262] ? genl_family_rcv_msg+0x809/0xf90 [ 764.616187][T17262] __alloc_skb+0xd5/0x5e0 [ 764.620550][T17262] ? skb_trim+0x190/0x190 [ 764.624915][T17262] ? kasan_check_write+0x14/0x20 [ 764.630154][T17262] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 764.635724][T17262] netlink_ack+0x25c/0xb50 [ 764.640606][T17262] ? netlink_sendmsg+0xd70/0xd70 [ 764.640624][T17262] ? mutex_unlock+0xd/0x10 [ 764.640637][T17262] ? genl_rcv_msg+0x106/0x16c [ 764.640654][T17262] netlink_rcv_skb+0x379/0x460 [ 764.640669][T17262] ? genl_family_rcv_msg+0xf90/0xf90 [ 764.640685][T17262] ? netlink_ack+0xb50/0xb50 [ 764.640700][T17262] ? lock_acquire+0x16f/0x3f0 [ 764.640724][T17262] ? kasan_check_write+0x14/0x20 [ 764.640745][T17262] genl_rcv+0x29/0x40 [ 764.683773][T17262] netlink_unicast+0x536/0x720 [ 764.688570][T17262] ? netlink_attachskb+0x770/0x770 [ 764.693806][T17262] ? _copy_from_iter_full+0x25d/0x8c0 [ 764.700083][T17262] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 764.700100][T17262] ? __check_object_size+0x3d/0x42f [ 764.700120][T17262] netlink_sendmsg+0x8ae/0xd70 [ 764.700142][T17262] ? netlink_unicast+0x720/0x720 [ 764.700156][T17262] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 764.700172][T17262] ? apparmor_socket_sendmsg+0x2a/0x30 [ 764.700187][T17262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.700204][T17262] ? security_socket_sendmsg+0x93/0xc0 [ 764.700219][T17262] ? netlink_unicast+0x720/0x720 [ 764.700238][T17262] sock_sendmsg+0x12e/0x170 [ 764.700257][T17262] ___sys_sendmsg+0x81d/0x960 [ 764.700280][T17262] ? copy_msghdr_from_user+0x430/0x430 [ 764.764604][T17262] ? kasan_check_read+0x11/0x20 [ 764.769498][T17262] ? __fget+0x381/0x550 [ 764.773692][T17262] ? ksys_dup3+0x3e0/0x3e0 [ 764.778143][T17262] ? lock_downgrade+0x880/0x880 [ 764.783086][T17262] ? __fget_light+0x1a9/0x230 [ 764.787806][T17262] ? __fdget+0x1b/0x20 [ 764.791917][T17262] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.798198][T17262] __sys_sendmsg+0x105/0x1d0 [ 764.802845][T17262] ? __ia32_sys_shutdown+0x80/0x80 [ 764.808039][T17262] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 764.813531][T17262] ? do_fast_syscall_32+0xd1/0xd54 [ 764.818731][T17262] ? entry_SYSENTER_compat+0x70/0x7f [ 764.824139][T17262] ? do_fast_syscall_32+0xd1/0xd54 [ 764.829291][T17262] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 764.835063][T17262] do_fast_syscall_32+0x281/0xd54 [ 764.840240][T17262] entry_SYSENTER_compat+0x70/0x7f [ 764.845469][T17262] RIP: 0023:0xf7fa5849 [ 764.849656][T17262] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 764.869539][T17262] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 764.869554][T17262] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 764.869561][T17262] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 764.869569][T17262] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 20:00:56 executing program 4 (fault-call:1 fault-nth:9): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:56 executing program 1: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r0], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:56 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:56 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, 0x0, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) fallocate(r0, 0x10, 0x4c64eac, 0x1) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) getpeername$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000180)=0x3) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=0x0, &(0x7f0000000280)=0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000300)={r2, 0x8}, &(0x7f0000000340)=0x8) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 764.869576][T17262] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 764.869584][T17262] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:00:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xa00, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 764.991927][T17309] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:56 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)=@l2={0x1f, 0x1f, {0x8, 0x1, 0x1ff, 0x10001, 0x6, 0x6}, 0x7, 0x8000}, 0x80, 0x0}}], 0x2, 0x0) 20:00:56 executing program 1: r0 = memfd_create(0x0, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r0], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 765.033040][T17309] FAULT_INJECTION: forcing a failure. [ 765.033040][T17309] name failslab, interval 1, probability 0, space 0, times 0 20:00:56 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, 0x0, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 765.184830][T17309] CPU: 1 PID: 17309 Comm: syz-executor.4 Not tainted 5.1.0+ #6 [ 765.192451][T17309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.202537][T17309] Call Trace: [ 765.206123][T17309] dump_stack+0x172/0x1f0 [ 765.210503][T17309] should_fail.cold+0xa/0x15 [ 765.215133][T17309] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.220974][T17309] ? ___might_sleep+0x163/0x280 [ 765.225895][T17309] __should_failslab+0x121/0x190 [ 765.230864][T17309] should_failslab+0x9/0x14 [ 765.230883][T17309] kmem_cache_alloc_node_trace+0x270/0x720 [ 765.230909][T17309] __kmalloc_node_track_caller+0x3d/0x70 [ 765.230934][T17309] __kmalloc_reserve.isra.0+0x40/0xf0 [ 765.252415][T17309] __alloc_skb+0x10b/0x5e0 [ 765.256875][T17309] ? skb_trim+0x190/0x190 [ 765.261233][T17309] ? kasan_check_write+0x14/0x20 [ 765.266192][T17309] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 765.266213][T17309] netlink_ack+0x25c/0xb50 [ 765.266233][T17309] ? netlink_sendmsg+0xd70/0xd70 [ 765.266255][T17309] ? mutex_unlock+0xd/0x10 [ 765.285875][T17309] ? genl_rcv_msg+0x106/0x16c [ 765.290670][T17309] netlink_rcv_skb+0x379/0x460 [ 765.290689][T17309] ? genl_family_rcv_msg+0xf90/0xf90 [ 765.290706][T17309] ? netlink_ack+0xb50/0xb50 [ 765.290723][T17309] ? lock_acquire+0x16f/0x3f0 [ 765.290744][T17309] ? kasan_check_write+0x14/0x20 [ 765.290771][T17309] genl_rcv+0x29/0x40 [ 765.305487][T17309] netlink_unicast+0x536/0x720 [ 765.305507][T17309] ? netlink_attachskb+0x770/0x770 [ 765.305523][T17309] ? _copy_from_iter_full+0x25d/0x8c0 20:00:56 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r0], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 765.305541][T17309] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 765.305556][T17309] ? __check_object_size+0x3d/0x42f [ 765.305578][T17309] netlink_sendmsg+0x8ae/0xd70 [ 765.319689][T17309] ? netlink_unicast+0x720/0x720 [ 765.319707][T17309] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 765.319726][T17309] ? apparmor_socket_sendmsg+0x2a/0x30 [ 765.319743][T17309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.319758][T17309] ? security_socket_sendmsg+0x93/0xc0 [ 765.319772][T17309] ? netlink_unicast+0x720/0x720 [ 765.319799][T17309] sock_sendmsg+0x12e/0x170 [ 765.389507][T17309] ___sys_sendmsg+0x81d/0x960 [ 765.394556][T17309] ? copy_msghdr_from_user+0x430/0x430 [ 765.400095][T17309] ? kasan_check_read+0x11/0x20 [ 765.405099][T17309] ? __fget+0x381/0x550 [ 765.409315][T17309] ? ksys_dup3+0x3e0/0x3e0 [ 765.413784][T17309] ? lock_downgrade+0x880/0x880 [ 765.418691][T17309] ? __fget_light+0x1a9/0x230 [ 765.423596][T17309] ? __fdget+0x1b/0x20 [ 765.427786][T17309] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.434083][T17309] __sys_sendmsg+0x105/0x1d0 [ 765.438742][T17309] ? __ia32_sys_shutdown+0x80/0x80 [ 765.443978][T17309] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 765.443995][T17309] ? do_fast_syscall_32+0xd1/0xd54 [ 765.444042][T17309] ? entry_SYSENTER_compat+0x70/0x7f [ 765.444068][T17309] ? do_fast_syscall_32+0xd1/0xd54 [ 765.465413][T17309] __ia32_compat_sys_sendmsg+0x7a/0xb0 [ 765.471186][T17309] do_fast_syscall_32+0x281/0xd54 [ 765.476279][T17309] entry_SYSENTER_compat+0x70/0x7f [ 765.481562][T17309] RIP: 0023:0xf7fa5849 [ 765.485751][T17309] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 765.505556][T17309] RSP: 002b:00000000f5da10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 765.514625][T17309] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000140 [ 765.522732][T17309] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 20:00:56 executing program 4 (fault-call:1 fault-nth:10): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xe00, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:56 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:56 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r0], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:56 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r0, 0x4, 0x9, &(0x7f0000000740)="6494c4c499610a450b1c02e9d9d1da5423447f7ca0f185b588ec740764c77a8050db86acd5d743041fa248f4f29c351545c2c3e6924875160a3718f2ab72595e2dad639522ba3e66ecbdd02d61b9daa7e41786d4313de44442c6a05cfcabf0dfc65503284a064b3c1aa462ab657ecc437bf7eb273bfcf9e3555e94b8f517ce2bc96cf3d7e9a80cdbed8ad18f126906914a93cdc87c4d4770afb1", 0x9a) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r1 = syz_open_dev$vcsn(&(0x7f0000000700)='/dev/vcs#\x00', 0x3, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000080)={0x6, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}]}) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77, 0x2}, 0xb) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000000c0)=0x8, 0x4) r2 = semget(0x0, 0x1, 0x1) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000004, 0x100010, r1, 0x8000000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000940)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000900)={&(0x7f0000000880)={0x70, r3, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x2}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x3}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x70}}, 0x4008040) semctl$SETVAL(r2, 0x4, 0x10, &(0x7f0000000000)=0x9) geteuid() setxattr$trusted_overlay_opaque(&(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='trusted.overlay.opaque\x00', &(0x7f00000006c0)='y\x00', 0x2, 0x1) [ 765.531367][T17309] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 765.539647][T17309] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 765.547790][T17309] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:00:56 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 765.653378][T17354] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xec0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(0xffffffffffffff9c, r0) setsockopt$inet6_dccp_int(r1, 0x21, 0x1f, &(0x7f0000000080)=0x1, 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x100000000, 0x0) connect$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @my=0x0}, 0x10) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) poll(&(0x7f0000000180)=[{r1, 0x4004}, {r1, 0x2180}], 0x2, 0xff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f00000000c0)) sendmmsg$inet_sctp(r2, &(0x7f0000000000), 0x0, 0x20000000) socket$vsock_stream(0x28, 0x1, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:57 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:57 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r0], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 765.854211][T17377] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:57 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf00, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:57 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:57 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 766.065790][T17400] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:57 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, 0x0, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x3, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf83, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000300)) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e24, @empty}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x4000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:57 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000aaaaaafe", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:57 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 766.290095][T17425] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:57 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, 0x0, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x6000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:57 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x5, 0x5, [0x3, 0x0, 0x3, 0x2, 0x7]}, &(0x7f0000000080)=0x12) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000300)={0x1, {{0xa, 0x4e23, 0x800, @remote, 0x6}}, 0x1, 0x5, [{{0xa, 0x4e23, 0x8, @rand_addr="a930dcc49d510beee5e9c5a9dbdadcb5", 0x600000000000}}, {{0xa, 0x4e22, 0x274a, @rand_addr="0a7191fb5cbcad8c713bab4b02de6c10", 0x1}}, {{0xa, 0x4e24, 0x499, @ipv4={[], [], @broadcast}, 0x10001}}, {{0xa, 0x4e20, 0x2, @empty, 0x67cd}}, {{0xa, 0x4e23, 0x6, @rand_addr="85a92264e4b73c6369dd4e49cc5e1af6", 0x40e1}}]}, 0x30c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x9, "6174fdcdb3a55ab13e"}, &(0x7f0000000180)=0x11) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) [ 766.538686][T17451] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:57 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x830f, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:57 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000a8aaaaff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:58 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, 0x0, 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) [ 766.773490][T17478] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xc00e, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:58 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:58 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x6, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:58 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8a, 0x8400) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000080)={0x0, r1}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:58 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 767.024756][T17506] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:58 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:58 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="23236413fd"], 0x5) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x34000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 767.232192][T17532] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:58 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:58 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x5add9aced4b4c0d0, 0x1) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffd000/0x1000)=nil) bind(r0, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x2, @random="892aaf8e51f0", 'eql\x00'}}, 0x80) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000000)="ff7ece7800f9113bff985b353c442eec3f733d9df96ed1901cd5848f2a1570061e9cb204cf8cf27bde9b72776c773cd9c70b87cec1d5bb89b129d64d4ca6b2bbca", 0x41) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000080)={'netdevsim0\x00', 0x2}) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:58 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:58 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x400300, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:58 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 767.489964][T17558] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:58 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0, 0xfffffe51}}], 0x2, 0x0) 20:00:58 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf0ffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:58 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000020000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0xffffffffffffff27) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x800, 0x44) 20:00:59 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:59 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 767.936576][T17594] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:00:59 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000030000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xf, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:59 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(0xffffffffffffffff, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x301002, 0x0) setsockopt$inet6_int(r1, 0x29, 0xcf, &(0x7f0000000040)=0x38, 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000080)={0x6, 0x3, 0x9}, 0xc) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x1000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x2000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:59 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(0xffffffffffffffff, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x48, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:59 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000040000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "1646097e178574a2e9cc220e50fabdfc"}, 0x11, 0x2) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:59 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:59 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(0xffffffffffffffff, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x4000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x4c, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast2}, 0x10) 20:00:59 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='#'], 0x1) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:59 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000050000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:00:59 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:00:59 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x280100, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x3}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:00:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xa000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:00:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x60, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:00:59 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:00 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000060000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:00 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='#'], 0x1) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xe000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xa0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="06000000", @ANYRES16=r2, @ANYBLOB="20012abd7000ffdbdf2506000000180005000c000200080003000004000008000100657468000c0007000800020094020000"], 0x38}, 0x1, 0x0, 0x0, 0x40040}, 0x44004) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xf7) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:01:00 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x68, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:00 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000070000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:00 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) dup2(r0, r0) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:00 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='#'], 0x1) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = semget$private(0x0, 0x3, 0x100) syz_extract_tcp_res(&(0x7f0000000000), 0x1, 0x8000) semctl$IPC_RMID(r1, 0x0, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) semget(0x3, 0x7, 0x2) sendmsg$sock(r0, &(0x7f0000000700)={&(0x7f0000000040)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000000c0)="8c53992bd9c65a62e7a884ec7f7e5aaf2d012e3ccdc1dcb55b53c61e7935eb32be43137a58cdc7df50941d6dd6b6b6ed3e1161d612a31939e5499b9eca86", 0x3e}, {&(0x7f0000000280)="9178103d824f95675c4744b9861e00c582448b91f50bacba257d0e39de5e5e8cf5208a5892c9856512b40997d5ec54e21e6a483ddbb331927af90221eea05d30a3571c49ee90f30cd95b413b8d5d9326b2d17b17adabaafab9aefc7bc0a06a8a3909b31f018822509ef834beeae303548f76e85646f9c20b3aa6bcb31f68289ffa1d0d8786847b710691de34bec41700db69e0d5fb8562a15db9101e83a42fcee85c415f2f3196a65f4444bad9484144219204126578cd512976c683ad361dcc68bf9047735ff30cffc13d5889cf6c91", 0xd0}, {&(0x7f0000000380)="f0af8927043317b8c404d26fc6740aad5352357e9f2776d46e73f3e7c0163920349145934242aa25bbc796db1330650b5240da886baca5a753626084e1d4dd58735536c2cf3d6fb9a62ed6189f21f1db1bdcba3b7c8c5fb1a3693866a20d375f13a793131806a0bb7723bffa172be8bfb8eed57b9d32935066090fa3845095ca9fdcab7094eb1f4e5c303edd3561a6256165289351326fbfc5d1779f4e6ab0ac473dceebb845036bf144dc7624f412ed50a0be0a2d68c07086a95a875926d0cfcc0324d5f4bd6a9efc39393e562d87370c8fd657244eb08116d310aba2d98e160f0ef14fd25afba672ead621a0e024", 0xef}, {&(0x7f0000000480)="48bf449b3de628e2760f4f6a3255c554895a5432897bee9c64cb1ae46604beb47f5d31a617e221d9ce54701c2d51ca64467bb1a4c91c72e88422ea6d09e232bd58afda84cf33a57630b3d9002d41838f43cc804e9bd70154a1edd77affb61ecdb81e6b5429ef3800dd041ace5dbf9cf792158e42aad8e78e9cf7a9b5878f2cda86e4a7367376712e11fe0b7902fb63d228bbc539d15dd6531cdf35fd61d24dee7113ccdb30d9d57a30036079ed", 0xad}, {&(0x7f0000000180)="12e3b9cf41a89e232f03946ef4093e11c334fd6d4e9a40dd98be958f3d50c904d25185266be25e27068b2ab1431abe5cf731af50fea62c59cc5ff027a89ee5b83ad010d24b2b42b73e9ae4ac8cae18983142edcb8eba9156ed2ab116c97a07657053f9eb57f105900a15096d", 0x6c}, {&(0x7f0000000540)="49cffa60e510bd39b3b364a784c43b00431720bbeab63665c6089c3dcd5d8d80fbfbeddaf5e884f6bb2ac8437c711c48aa8aa9d8514b53e1dc94fc1b989175b5e38350cc428bf360d0c133a79b69f066a8f5bc51820cedf40a6fa478247cb011d176313c0417184cda765d0de3d5bb21716dc927525c2f3d0809242e7185553b3d5a93676be124c037d7fdb41255d42883b141503c95d607ab93d02552550814d4a78e6f1980e412d78ad110ccce07b0d225db3a9e28c6bd00d7b0ea7d4ff63e9e8070831877d1eb6dca8bdbbf7ce2f66acd8b1cce9f5bd66a3702", 0xdb}, {&(0x7f0000000640)="09040e4b8b037f9210fdb9578c049558d4ece683ea87f13680ff6ecc121fc304191bc6709dbcba5bde9a6017643cda3d44be001fc4b7cb840df772f10a912ebcd1cad69b3b6f6b6ccd0a7671", 0x4c}, {&(0x7f0000000a80)="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", 0x1000}], 0x8}, 0xee4f872902dd561b) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000004fc0)='/dev/dsp\x00', 0x408040, 0x0) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0186404, &(0x7f0000005000)={&(0x7f0000ffe000/0x1000)=nil, 0x100000001, 0x0, 0x21, &(0x7f0000ffb000/0x4000)=nil, 0x200}) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000005140)={r2, &(0x7f0000005040)="12e11d94b60d75046f74a7813e6a53300ded068608774447d9d9237f7fc71e216114036b0c346b873949a6f8f93a5b956e258a36a344743c4f9f33f3b02d0dd36ccef058ce356c6be046a4192b2bda32ca6623067dac7feacf6a23153fa0f833ae828def20da04d9694f2b233292f9af1060128ec27eed53c9f11322e8ff90fd3931204558015256989921f8041e1a2cd4944446d808d3cf734d13a9dacab0d8e0c3d74eb38a1093882ef6bb2fd7c35df7666252af9b2f72b3451d22c7b877d7057d628eca409c5aa155ca5738d2c65e5e7d4586a328751338340baf17023d2be2cd57f45b268267"}, 0x10) clock_gettime(0x0, &(0x7f0000004f40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000000740)=""/89, 0x59}, {&(0x7f00000007c0)=""/239, 0xef}, {&(0x7f00000008c0)=""/40, 0x28}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000000900)=""/35, 0x23}, {&(0x7f0000000940)=""/97, 0x61}], 0x7, &(0x7f0000000a00)=""/22, 0x16}}, {{&(0x7f0000003a80)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000003cc0)=[{&(0x7f0000003b00)=""/241, 0xf1}, {&(0x7f0000003c00)=""/144, 0x90}], 0x2, &(0x7f0000003d00)=""/5, 0x5}, 0xfffffffffffff164}, {{&(0x7f0000003d40)=@tipc, 0x80, &(0x7f0000004e40)=[{&(0x7f0000003dc0)=""/4096, 0x1000}, {&(0x7f0000004dc0)=""/123, 0x7b}], 0x2, &(0x7f0000004e80)=""/6, 0x6}, 0x903a}], 0x3, 0x40000000, &(0x7f0000004f80)={r3, r4+10000000}) 20:01:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x6c, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x40000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:00 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000080000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:00 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) dup2(r0, r0) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:00 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##'], 0x2) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x60000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:00 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000090000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x74, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:00 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) dup2(r0, r0) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x830f0000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:00 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 20:01:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xfffffffffffffe11) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:01:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x7a, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:01 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000a0000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:01 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##'], 0x2) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x9effffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:01 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 20:01:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xf0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:01 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 20:01:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xc00e0000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:01 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000100000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xfffbffffffffffff, 0x4) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x4, 0x4) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x35, 0x5, 0x3, 0x4, 0x8000, 0x8}, 0x3}, 0xa) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) connect$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @loopback, 0x2}}, 0x24) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:01:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x300, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:01 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##'], 0x2) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:01 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) 20:01:01 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000110000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x500, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf0ffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x118) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0x37, @dev={0xac, 0x14, 0x14, 0xa}, 0x4e23, 0x1, 'sed\x00', 0x10, 0x7}, 0x2c) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:01:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x600, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:01 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) 20:01:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xfffff000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:01 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000230000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:01 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(0xffffffffffffffff, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 770.717214][T17855] __nla_validate_parse: 10 callbacks suppressed [ 770.717226][T17855] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 770.739461][T17850] IPVS: set_ctl: invalid protocol: 55 172.20.20.10:20003 20:01:02 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(0xffffffffffffffff, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:02 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) [ 770.782038][T17864] IPVS: set_ctl: invalid protocol: 55 172.20.20.10:20003 20:01:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xffffff7f, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x700, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:02 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000aa0000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:02 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(0xffffffffffffffff, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 770.969309][T17879] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = fcntl$dupfd(r0, 0x406, r0) write$FUSE_POLL(r1, &(0x7f0000000000)={0xffffffffffffffcf, 0x0, 0x3, {0x3ff}}, 0xfee6) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0, 0x0, 0x0, 0x24a}}], 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000180)={0x6, 0x0, 0x2023, 0xffffffff, 0xbc2, {0x367, 0xff}, 0x1}) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000001c0)={'lo\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'user.', 'posix_acl_access[self&\x00'}) io_setup(0x5, &(0x7f0000000280)=0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f00000003c0)=0x8) io_cancel(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x84, r1, &(0x7f0000000a80)="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", 0x1000, 0xffff, 0x0, 0x0, r1}, &(0x7f0000000340)) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="2e408424946a21895900000600000000000000000000000400000000000000040000000000000005000000000000003a296c6f5c"], 0x2e) 20:01:02 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000300", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xa00, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:02 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xffffff9e, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:02 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 771.207996][T17899] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x0) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000040)) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:01:02 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000500", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:02 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xe00, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x400) read$FUSE(r1, &(0x7f0000000a80), 0x1000) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x3, 0x0}}], 0x2, 0x0) 20:01:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xfffffff0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) write$P9_RWALK(r1, &(0x7f0000000180)={0x64, 0x6f, 0x2, {0x7, [{0x0, 0x4, 0x7}, {0x80, 0x1, 0x5}, {0x2, 0x1}, {0x40, 0x0, 0x2}, {0x0, 0x4, 0x5}, {0x4, 0x1, 0x1}, {0xc, 0x2, 0x2}]}}, 0x64) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000000c0)={0x2}, 0x1) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) [ 771.452560][T17925] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:02 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:02 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000600", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xf00, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x40030000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:02 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) dup2(r0, r0) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000009140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000009080)={0x7, 0x6, 0x9, 0x7, 0x5, 0x8001, 0x7, 0x225}, &(0x7f00000090c0)={0x62, 0x7, 0xa19c, 0x3ff, 0xfffffffffffffff9, 0x5, 0x3, 0x800}, &(0x7f0000009100)={0x4, 0xe176, 0x0, 0x3f, 0x8001, 0x8001, 0x9, 0x5d1}, &(0x7f0000009180)={r1, r2+10000000}, &(0x7f0000009200)={&(0x7f00000091c0)={0x400}, 0x8}) bind$inet(r0, &(0x7f0000000100)={0x2, 0x20000, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) prctl$PR_CAPBSET_DROP(0x18, 0x11) getpeername(r0, &(0x7f0000009240)=@vsock, &(0x7f00000092c0)=0x80) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0xfffffe1e) recvmmsg(r0, &(0x7f0000008f40)=[{{&(0x7f0000000040)=@pppol2tpv3in6, 0x80, &(0x7f0000000540)=[{&(0x7f0000000180)=""/98, 0x62}, {&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/148, 0x94}, {&(0x7f00000000c0)=""/1, 0x1}, {&(0x7f0000000480)=""/76, 0x4c}, {&(0x7f0000000500)=""/26, 0x1a}], 0x7, &(0x7f0000000580)=""/225, 0xe1}, 0x1ff}, {{&(0x7f0000000680)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000700)=""/109, 0x6d}, {&(0x7f0000000780)=""/92, 0x5c}, {&(0x7f0000000800)=""/85, 0x55}, {&(0x7f0000000880)=""/109, 0x6d}, {&(0x7f0000000900)=""/220, 0xdc}, {&(0x7f0000000a80)=""/112, 0x70}, {&(0x7f0000000b00)=""/194, 0xc2}], 0x7, &(0x7f0000000c00)=""/27, 0x1b}, 0x7d09cc2c}, {{&(0x7f0000000c40)=@sco, 0x80, &(0x7f0000004000)=[{&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/36, 0x24}, {&(0x7f0000002d00)=""/206, 0xce}, {&(0x7f0000002e00)=""/16, 0x10}, {&(0x7f0000002e40)=""/4096, 0x1000}, {&(0x7f0000003e40)=""/205, 0xcd}, {&(0x7f0000003f40)=""/38, 0x26}, {&(0x7f0000003f80)=""/106, 0x6a}], 0x9, &(0x7f0000004080)=""/232, 0xe8}, 0x8}, {{&(0x7f0000004180)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000004300)=[{&(0x7f0000004200)=""/57, 0x39}, {&(0x7f0000004240)=""/7, 0x7}, {&(0x7f0000004280)=""/4, 0x4}, {&(0x7f00000042c0)=""/50, 0x32}], 0x4, &(0x7f0000004340)=""/75, 0x4b}, 0x5}, {{&(0x7f00000043c0)=@isdn, 0x80, &(0x7f0000004700)=[{&(0x7f0000004440)=""/178, 0xb2}, {&(0x7f0000004500)=""/34, 0x22}, {&(0x7f0000004540)=""/24, 0x18}, {&(0x7f0000004580)=""/121, 0x79}, {&(0x7f0000004600)=""/204, 0xcc}], 0x5, &(0x7f0000004740)=""/245, 0xf5}, 0xac}, {{&(0x7f0000004840)=@nl=@proc, 0x80, &(0x7f0000006b40)=[{&(0x7f00000048c0)=""/117, 0x75}, {&(0x7f0000004940)=""/123, 0x7b}, {&(0x7f00000049c0)=""/41, 0x29}, {&(0x7f0000004a00)=""/4096, 0x1000}, {&(0x7f0000005a00)=""/4096, 0x1000}, {&(0x7f0000006a00)=""/14, 0xe}, {&(0x7f0000006a40)=""/219, 0xdb}], 0x7}, 0x960}, {{&(0x7f0000006b80)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000008e80)=[{&(0x7f0000006c00)=""/4096, 0x1000}, {&(0x7f0000007c00)=""/4096, 0x1000}, {&(0x7f0000008c00)=""/48, 0x30}, {&(0x7f0000008c40)=""/101, 0x65}, {&(0x7f0000008cc0)=""/176, 0xb0}, {&(0x7f0000008d80)=""/195, 0xc3}], 0x6, &(0x7f0000008ec0)=""/103, 0x67}, 0x80}], 0x7, 0x100, &(0x7f0000009040)={0x0, 0x1c9c380}) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) [ 771.646724][T17947] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:03 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000700", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x15c3, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf0ffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 771.890730][T17969] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:03 executing program 1 (fault-call:3 fault-nth:0): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:03 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) dup2(r0, r0) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:03 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000900", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x100000000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x2000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 772.350773][T17978] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 772.381394][T17985] FAULT_INJECTION: forcing a failure. [ 772.381394][T17985] name failslab, interval 1, probability 0, space 0, times 0 [ 772.422557][T17985] CPU: 0 PID: 17985 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 772.430440][T17985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.430448][T17985] Call Trace: [ 772.430514][T17985] dump_stack+0x172/0x1f0 [ 772.430538][T17985] should_fail.cold+0xa/0x15 [ 772.430559][T17985] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 772.430584][T17985] ? ___might_sleep+0x163/0x280 [ 772.430606][T17985] __should_failslab+0x121/0x190 [ 772.430631][T17985] should_failslab+0x9/0x14 [ 772.430653][T17985] kmem_cache_alloc+0x2b2/0x6f0 [ 772.430668][T17985] ? fput+0x1b/0x20 [ 772.430687][T17985] ? ksys_write+0x1cf/0x290 [ 772.430710][T17985] getname_flags+0xd6/0x5b0 [ 772.430732][T17985] ? do_fast_syscall_32+0xd1/0xd54 [ 772.430754][T17985] __ia32_compat_sys_execveat+0xd4/0x140 [ 772.430775][T17985] do_fast_syscall_32+0x281/0xd54 [ 772.430798][T17985] entry_SYSENTER_compat+0x70/0x7f [ 772.430810][T17985] RIP: 0023:0xf7fc2849 20:01:03 executing program 1 (fault-call:3 fault-nth:1): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x200000000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:03 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000a00", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 772.430827][T17985] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 772.430836][T17985] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 772.430852][T17985] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 772.430860][T17985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 772.430869][T17985] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 772.430878][T17985] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 772.430887][T17985] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 772.540320][T17994] FAULT_INJECTION: forcing a failure. [ 772.540320][T17994] name failslab, interval 1, probability 0, space 0, times 0 [ 772.605451][T17994] CPU: 0 PID: 17994 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 772.613161][T17994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.613168][T17994] Call Trace: [ 772.613191][T17994] dump_stack+0x172/0x1f0 [ 772.613210][T17994] should_fail.cold+0xa/0x15 [ 772.613227][T17994] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 772.613247][T17994] ? ___might_sleep+0x163/0x280 [ 772.613265][T17994] __should_failslab+0x121/0x190 [ 772.613280][T17994] should_failslab+0x9/0x14 [ 772.613298][T17994] kmem_cache_alloc+0x2b2/0x6f0 [ 772.613316][T17994] ? save_stack+0x5c/0x90 [ 772.613335][T17994] dup_fd+0x85/0xb30 20:01:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=""/183, 0xb7) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:01:03 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) dup2(r0, r0) execveat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x3f00, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:03 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001100", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x400000000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 772.613361][T17994] ? entry_SYSENTER_compat+0x70/0x7f [ 772.613379][T17994] ? get_pid_task+0xc9/0x190 [ 772.613419][T17994] unshare_fd+0x160/0x1d0 [ 772.613437][T17994] ? pidfd_release+0x50/0x50 [ 772.613457][T17994] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 772.613480][T17994] unshare_files+0x7f/0x1f0 [ 772.613493][T17994] ? should_fail+0x1de/0x852 [ 772.613510][T17994] ? __ia32_sys_unshare+0x40/0x40 [ 772.613526][T17994] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 772.613552][T17994] __do_execve_file.isra.0+0x27e/0x23a0 20:01:04 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000002300", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 772.613574][T17994] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 772.613596][T17994] ? __phys_addr_symbol+0x30/0x70 [ 772.613612][T17994] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 772.613628][T17994] ? __check_object_size+0x3d/0x42f [ 772.613651][T17994] ? copy_strings_kernel+0x110/0x110 [ 772.613670][T17994] ? strncpy_from_user+0x2ac/0x380 [ 772.613695][T17994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.627350][T17994] __ia32_compat_sys_execveat+0xf3/0x140 [ 772.636407][T17994] do_fast_syscall_32+0x281/0xd54 [ 772.647264][T17994] entry_SYSENTER_compat+0x70/0x7f [ 772.647277][T17994] RIP: 0023:0xf7fc2849 [ 772.647293][T17994] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 772.647310][T17994] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 772.670384][T17994] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 20:01:04 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 20:01:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xa00000000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 772.670393][T17994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 772.670400][T17994] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 772.670408][T17994] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 772.670415][T17994] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 772.782719][T18008] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:01:04 executing program 1 (fault-call:3 fault-nth:2): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:04 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000003f00", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:04 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) 20:01:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xe00000000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x4000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:04 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffff8, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000040)={0x9, 0x10000}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:01:04 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, 0x0, 0x0, 0x0, 0x1000) [ 773.184727][T18041] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 773.219728][T18042] FAULT_INJECTION: forcing a failure. [ 773.219728][T18042] name failslab, interval 1, probability 0, space 0, times 0 [ 773.259729][T18042] CPU: 1 PID: 18042 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 773.267446][T18042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.277706][T18042] Call Trace: [ 773.277735][T18042] dump_stack+0x172/0x1f0 [ 773.277759][T18042] should_fail.cold+0xa/0x15 [ 773.277780][T18042] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 773.277805][T18042] ? ___might_sleep+0x163/0x280 [ 773.277833][T18042] __should_failslab+0x121/0x190 20:01:04 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000004000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 773.300896][T18042] should_failslab+0x9/0x14 [ 773.300917][T18042] kmem_cache_alloc+0x2b2/0x6f0 [ 773.300935][T18042] ? save_stack+0x5c/0x90 [ 773.300958][T18042] dup_fd+0x85/0xb30 [ 773.323520][T18042] ? entry_SYSENTER_compat+0x70/0x7f [ 773.323546][T18042] ? mark_held_locks+0xf0/0xf0 [ 773.323575][T18042] unshare_fd+0x160/0x1d0 [ 773.333741][T18042] ? pidfd_release+0x50/0x50 [ 773.333757][T18042] ? find_held_lock+0x35/0x130 [ 773.333775][T18042] ? cache_grow_end+0xa4/0x190 [ 773.333795][T18042] unshare_files+0x7f/0x1f0 20:01:04 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) [ 773.333818][T18042] ? __ia32_sys_unshare+0x40/0x40 [ 773.362105][T18042] __do_execve_file.isra.0+0x27e/0x23a0 [ 773.367683][T18042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 773.373951][T18042] ? __phys_addr_symbol+0x30/0x70 [ 773.373969][T18042] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 773.373986][T18042] ? __check_object_size+0x3d/0x42f [ 773.374046][T18042] ? copy_strings_kernel+0x110/0x110 [ 773.384808][T18042] ? strncpy_from_user+0x2ac/0x380 [ 773.384832][T18042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:01:04 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) 20:01:04 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000fe8000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 773.384860][T18042] __ia32_compat_sys_execveat+0xf3/0x140 [ 773.384885][T18042] do_fast_syscall_32+0x281/0xd54 [ 773.417562][T18042] entry_SYSENTER_compat+0x70/0x7f [ 773.422746][T18042] RIP: 0023:0xf7fc2849 [ 773.426837][T18042] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 773.446603][T18042] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 20:01:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x4800, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 773.455065][T18042] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 773.463290][T18042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 773.463299][T18042] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 773.463306][T18042] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 773.463313][T18042] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 773.515079][T18060] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:04 executing program 1 (fault-call:3 fault-nth:3): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf00000000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:01:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x4c00, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:04 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000080fe00", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:04 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0) 20:01:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x6000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x4000000000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 773.779948][T18086] FAULT_INJECTION: forcing a failure. [ 773.779948][T18086] name failslab, interval 1, probability 0, space 0, times 0 [ 773.829439][T18086] CPU: 1 PID: 18086 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 773.837140][T18086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.837158][T18086] Call Trace: [ 773.850564][T18086] dump_stack+0x172/0x1f0 [ 773.854940][T18086] should_fail.cold+0xa/0x15 [ 773.859562][T18086] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 773.859585][T18086] ? ___might_sleep+0x163/0x280 [ 773.859606][T18086] __should_failslab+0x121/0x190 [ 773.859634][T18086] should_failslab+0x9/0x14 20:01:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x6000000000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 773.879786][T18086] kmem_cache_alloc_trace+0x2d1/0x760 [ 773.885201][T18086] ? lock_downgrade+0x880/0x880 [ 773.890101][T18086] alloc_fdtable+0x86/0x290 [ 773.894805][T18086] dup_fd+0x743/0xb30 [ 773.898848][T18086] unshare_fd+0x160/0x1d0 [ 773.903485][T18086] ? pidfd_release+0x50/0x50 [ 773.908115][T18086] ? find_held_lock+0x35/0x130 [ 773.912919][T18086] ? cache_grow_end+0xa4/0x190 [ 773.917815][T18086] unshare_files+0x7f/0x1f0 [ 773.922449][T18086] ? __ia32_sys_unshare+0x40/0x40 20:01:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x830f000000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 773.927521][T18086] __do_execve_file.isra.0+0x27e/0x23a0 [ 773.933111][T18086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 773.939732][T18086] ? __phys_addr_symbol+0x30/0x70 [ 773.944794][T18086] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 773.950548][T18086] ? __check_object_size+0x3d/0x42f [ 773.955911][T18086] ? copy_strings_kernel+0x110/0x110 [ 773.955928][T18086] ? strncpy_from_user+0x2ac/0x380 [ 773.955950][T18086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 773.955972][T18086] __ia32_compat_sys_execveat+0xf3/0x140 [ 773.972667][T18086] do_fast_syscall_32+0x281/0xd54 [ 773.972693][T18086] entry_SYSENTER_compat+0x70/0x7f [ 773.972714][T18086] RIP: 0023:0xf7fc2849 [ 773.992757][T18086] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 774.012410][T18086] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 774.020875][T18086] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 20:01:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x9effffff00000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:05 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000004003", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 774.028979][T18086] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 774.037066][T18086] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 774.045070][T18086] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 774.045080][T18086] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:05 executing program 1 (fault-call:3 fault-nth:4): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x22a, 0x0, 0x0, 0x0, 0x387}}, {{&(0x7f0000000200)=@hci={0x1f, r1, 0x3}, 0x3c6, 0x0, 0xffa8}}], 0x2, 0x0) 20:01:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x6800, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:05 executing program 3 (fault-call:3 fault-nth:0): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:05 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000010", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 774.180769][T18114] FAULT_INJECTION: forcing a failure. [ 774.180769][T18114] name failslab, interval 1, probability 0, space 0, times 0 [ 774.205055][T18117] FAULT_INJECTION: forcing a failure. [ 774.205055][T18117] name failslab, interval 1, probability 0, space 0, times 0 20:01:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x6c00, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xc00e000000000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r1 = socket(0x11, 0xf, 0x1b0) r2 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x8000, 0x4000) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f00000001c0)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)={0xe8, r3, 0x700, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb3b9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc787}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}, @TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x111}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}]}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x800}, 0x200008d0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000400)=@tipc=@name={0x1e, 0x2, 0x0, {{}, 0x1}}, 0x80, 0x0}}], 0x2, 0x0) [ 774.279308][T18114] CPU: 1 PID: 18114 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 774.286906][T18114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.296979][T18114] Call Trace: [ 774.300295][T18114] dump_stack+0x172/0x1f0 [ 774.304654][T18114] should_fail.cold+0xa/0x15 [ 774.309269][T18114] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 774.315095][T18114] ? ___might_sleep+0x163/0x280 [ 774.319967][T18114] __should_failslab+0x121/0x190 [ 774.324918][T18114] should_failslab+0x9/0x14 [ 774.329437][T18114] kmem_cache_alloc+0x2b2/0x6f0 [ 774.334310][T18114] ? fput+0x1b/0x20 [ 774.338134][T18114] ? ksys_write+0x1cf/0x290 [ 774.342653][T18114] getname_flags+0xd6/0x5b0 [ 774.347170][T18114] ? do_fast_syscall_32+0xd1/0xd54 [ 774.352301][T18114] __ia32_compat_sys_execveat+0xd4/0x140 [ 774.357948][T18114] do_fast_syscall_32+0x281/0xd54 [ 774.362997][T18114] entry_SYSENTER_compat+0x70/0x7f [ 774.368118][T18114] RIP: 0023:0xf7fe2849 20:01:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xf0ffffff00000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 774.372286][T18114] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 774.391900][T18114] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 774.400335][T18114] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 774.408617][T18114] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 774.416707][T18114] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 20:01:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) [ 774.424705][T18114] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 774.432825][T18114] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 774.458639][T18117] CPU: 0 PID: 18117 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 774.467635][T18117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.479275][T18117] Call Trace: [ 774.482684][T18117] dump_stack+0x172/0x1f0 [ 774.487128][T18117] should_fail.cold+0xa/0x15 [ 774.491942][T18117] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 774.501796][T18117] ? ___might_sleep+0x163/0x280 [ 774.506777][T18117] __should_failslab+0x121/0x190 [ 774.512364][T18117] should_failslab+0x9/0x14 [ 774.517004][T18117] kmem_cache_alloc_node_trace+0x270/0x720 [ 774.523395][T18117] __kmalloc_node+0x3d/0x70 [ 774.527934][T18117] kvmalloc_node+0x68/0x100 [ 774.533111][T18117] alloc_fdtable+0xd6/0x290 [ 774.538966][T18117] dup_fd+0x743/0xb30 [ 774.543027][T18117] unshare_fd+0x160/0x1d0 [ 774.548464][T18117] ? pidfd_release+0x50/0x50 [ 774.553795][T18117] ? find_held_lock+0x35/0x130 [ 774.558592][T18117] ? cache_grow_end+0xa4/0x190 [ 774.563922][T18117] unshare_files+0x7f/0x1f0 [ 774.568552][T18117] ? __ia32_sys_unshare+0x40/0x40 [ 774.573831][T18117] __do_execve_file.isra.0+0x27e/0x23a0 [ 774.579588][T18117] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 774.586041][T18117] ? __phys_addr_symbol+0x30/0x70 [ 774.591133][T18117] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 774.599082][T18117] ? __check_object_size+0x3d/0x42f [ 774.606843][T18117] ? copy_strings_kernel+0x110/0x110 [ 774.606862][T18117] ? strncpy_from_user+0x2ac/0x380 [ 774.606885][T18117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 774.606916][T18117] __ia32_compat_sys_execveat+0xf3/0x140 [ 774.625560][T18117] do_fast_syscall_32+0x281/0xd54 [ 774.625586][T18117] entry_SYSENTER_compat+0x70/0x7f [ 774.625608][T18117] RIP: 0023:0xf7fc2849 [ 774.645831][T18117] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 774.668139][T18117] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 20:01:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v1={0x1000000, [{0x2, 0x100}]}, 0xc, 0x1) socket$kcm(0x29, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000180)=""/84) socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) 20:01:05 executing program 3 (fault-call:3 fault-nth:1): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 774.676752][T18117] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 774.684748][T18117] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 774.692747][T18117] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 774.700743][T18117] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 774.708734][T18117] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 774.744432][T18152] FAULT_INJECTION: forcing a failure. [ 774.744432][T18152] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 774.757694][T18152] CPU: 1 PID: 18152 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 774.765254][T18152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.775354][T18152] Call Trace: [ 774.778671][T18152] dump_stack+0x172/0x1f0 [ 774.783032][T18152] should_fail.cold+0xa/0x15 [ 774.787638][T18152] ? find_held_lock+0x35/0x130 [ 774.792421][T18152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 774.798266][T18152] should_fail_alloc_page+0x50/0x60 [ 774.803481][T18152] __alloc_pages_nodemask+0x1a1/0x8d0 [ 774.808857][T18152] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 774.814573][T18152] ? find_held_lock+0x35/0x130 [ 774.819332][T18152] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 774.825141][T18152] cache_grow_begin+0x9c/0x860 [ 774.829945][T18152] ? getname_flags+0xd6/0x5b0 [ 774.834614][T18152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 774.840872][T18152] kmem_cache_alloc+0x62d/0x6f0 [ 774.845713][T18152] ? fput+0x1b/0x20 [ 774.849511][T18152] getname_flags+0xd6/0x5b0 [ 774.854002][T18152] ? do_fast_syscall_32+0xd1/0xd54 [ 774.859110][T18152] __ia32_compat_sys_execveat+0xd4/0x140 [ 774.864747][T18152] do_fast_syscall_32+0x281/0xd54 [ 774.869772][T18152] entry_SYSENTER_compat+0x70/0x7f [ 774.874896][T18152] RIP: 0023:0xf7fe2849 [ 774.878954][T18152] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 774.898550][T18152] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 774.906960][T18152] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 774.914950][T18152] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 774.922932][T18152] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 774.930900][T18152] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 20:01:06 executing program 1 (fault-call:3 fault-nth:5): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:06 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000340", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xffffff7f00000000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x7400, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:06 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0xd467, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}], 0x2, 0x0) [ 774.938870][T18152] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:06 executing program 3 (fault-call:3 fault-nth:2): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 775.035387][T18166] FAULT_INJECTION: forcing a failure. [ 775.035387][T18166] name failslab, interval 1, probability 0, space 0, times 0 [ 775.089246][T18166] CPU: 0 PID: 18166 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 775.096870][T18166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.106952][T18166] Call Trace: [ 775.110265][T18166] dump_stack+0x172/0x1f0 [ 775.114618][T18166] should_fail.cold+0xa/0x15 [ 775.119233][T18166] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 775.119258][T18166] ? ___might_sleep+0x163/0x280 [ 775.119279][T18166] __should_failslab+0x121/0x190 [ 775.119298][T18166] should_failslab+0x9/0x14 [ 775.119320][T18166] kmem_cache_alloc_node_trace+0x270/0x720 [ 775.119336][T18166] ? kasan_unpoison_shadow+0x35/0x50 [ 775.119360][T18166] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 775.119391][T18166] __kmalloc_node+0x3d/0x70 [ 775.160873][T18166] kvmalloc_node+0x68/0x100 [ 775.165407][T18166] alloc_fdtable+0x142/0x290 [ 775.170035][T18166] dup_fd+0x743/0xb30 [ 775.174058][T18166] unshare_fd+0x160/0x1d0 [ 775.178407][T18166] ? pidfd_release+0x50/0x50 [ 775.183031][T18166] ? find_held_lock+0x35/0x130 [ 775.187832][T18166] ? cache_grow_end+0xa4/0x190 [ 775.192623][T18166] unshare_files+0x7f/0x1f0 [ 775.197322][T18166] ? __ia32_sys_unshare+0x40/0x40 [ 775.202476][T18166] __do_execve_file.isra.0+0x27e/0x23a0 [ 775.202494][T18166] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 775.202509][T18166] ? __phys_addr_symbol+0x30/0x70 [ 775.202522][T18166] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 775.202536][T18166] ? __check_object_size+0x3d/0x42f [ 775.202556][T18166] ? copy_strings_kernel+0x110/0x110 [ 775.202572][T18166] ? strncpy_from_user+0x2ac/0x380 [ 775.202590][T18166] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.202613][T18166] __ia32_compat_sys_execveat+0xf3/0x140 [ 775.254271][T18166] do_fast_syscall_32+0x281/0xd54 [ 775.259339][T18166] entry_SYSENTER_compat+0x70/0x7f [ 775.264480][T18166] RIP: 0023:0xf7fc2849 [ 775.268571][T18166] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:01:06 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0xfffffffffffff000, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0xf, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 775.288370][T18166] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 775.296903][T18166] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 775.304899][T18166] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 775.312899][T18166] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 775.320893][T18166] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 775.320902][T18166] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x7a00, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:06 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 775.343508][T18182] FAULT_INJECTION: forcing a failure. [ 775.343508][T18182] name failslab, interval 1, probability 0, space 0, times 0 20:01:06 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 775.455202][T18182] CPU: 0 PID: 18182 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 775.462798][T18182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.472881][T18182] Call Trace: [ 775.476205][T18182] dump_stack+0x172/0x1f0 [ 775.480570][T18182] should_fail.cold+0xa/0x15 [ 775.485190][T18182] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 775.491044][T18182] ? ___might_sleep+0x163/0x280 [ 775.495939][T18182] __should_failslab+0x121/0x190 [ 775.500911][T18182] should_failslab+0x9/0x14 [ 775.505969][T18182] kmem_cache_alloc+0x2b2/0x6f0 [ 775.510909][T18182] ? save_stack+0x5c/0x90 [ 775.515370][T18182] dup_fd+0x85/0xb30 [ 775.519752][T18182] ? entry_SYSENTER_compat+0x70/0x7f [ 775.525074][T18182] ? mark_held_locks+0xf0/0xf0 [ 775.529864][T18182] unshare_fd+0x160/0x1d0 [ 775.534255][T18182] ? pidfd_release+0x50/0x50 [ 775.538870][T18182] ? find_held_lock+0x35/0x130 [ 775.543669][T18182] ? cache_grow_end+0xa4/0x190 [ 775.548980][T18182] unshare_files+0x7f/0x1f0 [ 775.553612][T18182] ? __ia32_sys_unshare+0x40/0x40 [ 775.558671][T18182] __do_execve_file.isra.0+0x27e/0x23a0 [ 775.564249][T18182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 775.570524][T18182] ? __phys_addr_symbol+0x30/0x70 [ 775.575588][T18182] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 775.584140][T18182] ? __check_object_size+0x3d/0x42f [ 775.589382][T18182] ? copy_strings_kernel+0x110/0x110 [ 775.594703][T18182] ? strncpy_from_user+0x2ac/0x380 [ 775.599846][T18182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:01:06 executing program 1 (fault-call:3 fault-nth:6): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:06 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:06 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xc315, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 775.606123][T18182] __ia32_compat_sys_execveat+0xf3/0x140 [ 775.611793][T18182] do_fast_syscall_32+0x281/0xd54 [ 775.616856][T18182] entry_SYSENTER_compat+0x70/0x7f [ 775.617126][T18200] FAULT_INJECTION: forcing a failure. [ 775.617126][T18200] name failslab, interval 1, probability 0, space 0, times 0 [ 775.621988][T18182] RIP: 0023:0xf7fe2849 20:01:06 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x2, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 775.622004][T18182] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 775.622020][T18182] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 775.622034][T18182] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 775.622042][T18182] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 775.622050][T18182] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 775.622057][T18182] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 775.622064][T18182] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 775.788595][T18200] CPU: 0 PID: 18200 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 775.796187][T18200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.806263][T18200] Call Trace: [ 775.809586][T18200] dump_stack+0x172/0x1f0 [ 775.813949][T18200] should_fail.cold+0xa/0x15 [ 775.818562][T18200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 775.824396][T18200] ? ___might_sleep+0x163/0x280 [ 775.824416][T18200] __should_failslab+0x121/0x190 [ 775.824434][T18200] should_failslab+0x9/0x14 [ 775.824460][T18200] kmem_cache_alloc_trace+0x2d1/0x760 [ 775.838851][T18200] __do_execve_file.isra.0+0x325/0x23a0 [ 775.838869][T18200] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 775.838887][T18200] ? __phys_addr_symbol+0x30/0x70 [ 775.838901][T18200] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 775.838924][T18200] ? __check_object_size+0x3d/0x42f [ 775.872045][T18200] ? copy_strings_kernel+0x110/0x110 [ 775.877352][T18200] ? strncpy_from_user+0x2ac/0x380 [ 775.882499][T18200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 775.888769][T18200] __ia32_compat_sys_execveat+0xf3/0x140 [ 775.894428][T18200] do_fast_syscall_32+0x281/0xd54 [ 775.899483][T18200] entry_SYSENTER_compat+0x70/0x7f [ 775.904589][T18200] RIP: 0023:0xf7fc2849 [ 775.908641][T18200] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 775.928497][T18200] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 20:01:07 executing program 3 (fault-call:3 fault-nth:3): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xf000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0xc0, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:07 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:07 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x541b, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 775.936903][T18200] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 775.944871][T18200] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 775.952928][T18200] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 775.960996][T18200] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 775.969199][T18200] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:07 executing program 1 (fault-call:3 fault-nth:7): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 776.031388][T18219] __nla_validate_parse: 6 callbacks suppressed [ 776.031400][T18219] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:07 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:07 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x5421, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0xec0, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x30000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 776.102353][T18229] FAULT_INJECTION: forcing a failure. [ 776.102353][T18229] name failslab, interval 1, probability 0, space 0, times 0 [ 776.179377][T18229] CPU: 0 PID: 18229 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 776.186972][T18229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.197060][T18229] Call Trace: [ 776.200386][T18229] dump_stack+0x172/0x1f0 [ 776.204765][T18229] should_fail.cold+0xa/0x15 [ 776.209402][T18229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 776.215249][T18229] ? ___might_sleep+0x163/0x280 [ 776.220130][T18229] __should_failslab+0x121/0x190 [ 776.225100][T18229] should_failslab+0x9/0x14 [ 776.229645][T18229] kmem_cache_alloc_trace+0x2d1/0x760 [ 776.235138][T18229] ? lock_downgrade+0x880/0x880 [ 776.240029][T18229] alloc_fdtable+0x86/0x290 [ 776.244561][T18229] dup_fd+0x743/0xb30 [ 776.248581][T18229] unshare_fd+0x160/0x1d0 [ 776.253028][T18229] ? pidfd_release+0x50/0x50 [ 776.257646][T18229] ? find_held_lock+0x35/0x130 [ 776.262446][T18229] ? cache_grow_end+0xa4/0x190 [ 776.267247][T18229] unshare_files+0x7f/0x1f0 [ 776.271784][T18229] ? __ia32_sys_unshare+0x40/0x40 [ 776.276853][T18229] __do_execve_file.isra.0+0x27e/0x23a0 [ 776.282428][T18229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 776.288708][T18229] ? __phys_addr_symbol+0x30/0x70 [ 776.293761][T18229] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 776.298584][T18243] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 776.299511][T18229] ? __check_object_size+0x3d/0x42f [ 776.299536][T18229] ? copy_strings_kernel+0x110/0x110 [ 776.299551][T18229] ? strncpy_from_user+0x2ac/0x380 20:01:07 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x5450, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x33fe0, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 776.299572][T18229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.299593][T18229] __ia32_compat_sys_execveat+0xf3/0x140 [ 776.299617][T18229] do_fast_syscall_32+0x281/0xd54 [ 776.299639][T18229] entry_SYSENTER_compat+0x70/0x7f [ 776.299652][T18229] RIP: 0023:0xf7fe2849 [ 776.299677][T18229] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 776.324561][T18229] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 20:01:07 executing program 3 (fault-call:3 fault-nth:4): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x34000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 776.350645][T18229] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 776.350654][T18229] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 776.350663][T18229] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 776.350671][T18229] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 776.350679][T18229] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 776.418112][T18248] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 776.421110][T18249] FAULT_INJECTION: forcing a failure. [ 776.421110][T18249] name failslab, interval 1, probability 0, space 0, times 0 [ 776.468112][T18253] FAULT_INJECTION: forcing a failure. [ 776.468112][T18253] name failslab, interval 1, probability 0, space 0, times 0 20:01:07 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x5452, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x400300, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:07 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 776.491395][T18249] CPU: 1 PID: 18249 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 776.499171][T18249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.509427][T18249] Call Trace: [ 776.512834][T18249] dump_stack+0x172/0x1f0 [ 776.517188][T18249] should_fail.cold+0xa/0x15 [ 776.521797][T18249] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 776.527630][T18249] ? ___might_sleep+0x163/0x280 [ 776.532512][T18249] __should_failslab+0x121/0x190 [ 776.537475][T18249] should_failslab+0x9/0x14 [ 776.542008][T18249] kmem_cache_alloc+0x2b2/0x6f0 [ 776.546884][T18249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.553158][T18249] ? __validate_process_creds+0x22d/0x380 [ 776.554286][T18256] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 776.558917][T18249] prepare_creds+0x3e/0x3f0 [ 776.558938][T18249] prepare_exec_creds+0x12/0xf0 [ 776.558959][T18249] __do_execve_file.isra.0+0x393/0x23a0 [ 776.558986][T18249] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 776.589419][T18249] ? __phys_addr_symbol+0x30/0x70 [ 776.594484][T18249] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 776.600227][T18249] ? __check_object_size+0x3d/0x42f [ 776.605456][T18249] ? copy_strings_kernel+0x110/0x110 [ 776.610765][T18249] ? strncpy_from_user+0x2ac/0x380 [ 776.615901][T18249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.622165][T18249] __ia32_compat_sys_execveat+0xf3/0x140 [ 776.628090][T18249] do_fast_syscall_32+0x281/0xd54 [ 776.633170][T18249] entry_SYSENTER_compat+0x70/0x7f [ 776.638293][T18249] RIP: 0023:0xf7fc2849 [ 776.642379][T18249] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 776.662793][T18249] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 776.662809][T18249] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 776.662816][T18249] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 776.662823][T18249] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 776.662830][T18249] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 776.662837][T18249] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 776.668717][T18253] CPU: 1 PID: 18253 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 776.695257][T18253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.695265][T18253] Call Trace: [ 776.695286][T18253] dump_stack+0x172/0x1f0 [ 776.695315][T18253] should_fail.cold+0xa/0x15 [ 776.711285][T18253] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 776.711307][T18253] ? ___might_sleep+0x163/0x280 [ 776.711327][T18253] __should_failslab+0x121/0x190 [ 776.711343][T18253] should_failslab+0x9/0x14 [ 776.711360][T18253] kmem_cache_alloc_node_trace+0x270/0x720 [ 776.711386][T18253] __kmalloc_node+0x3d/0x70 [ 776.729003][T18253] kvmalloc_node+0x68/0x100 [ 776.729033][T18253] alloc_fdtable+0xd6/0x290 [ 776.729051][T18253] dup_fd+0x743/0xb30 [ 776.729077][T18253] unshare_fd+0x160/0x1d0 20:01:08 executing program 1 (fault-call:3 fault-nth:8): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:08 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x5460, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:08 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xf0ffff, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 776.729101][T18253] ? pidfd_release+0x50/0x50 [ 776.736722][T18253] ? find_held_lock+0x35/0x130 [ 776.747120][T18253] ? cache_grow_end+0xa4/0x190 [ 776.747144][T18253] unshare_files+0x7f/0x1f0 [ 776.747166][T18253] ? __ia32_sys_unshare+0x40/0x40 [ 776.757042][T18253] __do_execve_file.isra.0+0x27e/0x23a0 [ 776.757066][T18253] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 776.767546][T18253] ? __phys_addr_symbol+0x30/0x70 [ 776.767564][T18253] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 776.767586][T18253] ? __check_object_size+0x3d/0x42f [ 776.776583][T18253] ? copy_strings_kernel+0x110/0x110 [ 776.776600][T18253] ? strncpy_from_user+0x2ac/0x380 [ 776.776624][T18253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 776.785099][T18253] __ia32_compat_sys_execveat+0xf3/0x140 [ 776.785131][T18253] do_fast_syscall_32+0x281/0xd54 [ 776.857357][T18253] entry_SYSENTER_compat+0x70/0x7f [ 776.868140][T18266] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 776.873200][T18253] RIP: 0023:0xf7fe2849 20:01:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x7ffff, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 776.873217][T18253] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 776.873225][T18253] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 776.873240][T18253] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 776.873248][T18253] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 776.873256][T18253] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 20:01:08 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 776.873264][T18253] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 776.873271][T18253] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:08 executing program 3 (fault-call:3 fault-nth:5): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:08 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8901, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 776.987353][T18273] FAULT_INJECTION: forcing a failure. [ 776.987353][T18273] name failslab, interval 1, probability 0, space 0, times 0 [ 777.051732][T18283] FAULT_INJECTION: forcing a failure. [ 777.051732][T18283] name failslab, interval 1, probability 0, space 0, times 0 [ 777.058263][T18273] CPU: 0 PID: 18273 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 777.071927][T18273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.081995][T18273] Call Trace: [ 777.085301][T18273] dump_stack+0x172/0x1f0 [ 777.089646][T18273] should_fail.cold+0xa/0x15 [ 777.094254][T18273] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 777.100081][T18273] ? ___might_sleep+0x163/0x280 [ 777.104976][T18273] __should_failslab+0x121/0x190 [ 777.109925][T18273] should_failslab+0x9/0x14 [ 777.114446][T18273] kmem_cache_alloc+0x2b2/0x6f0 [ 777.119317][T18273] ? __kernel_text_address+0xd/0x40 [ 777.124721][T18273] ? unwind_get_return_address+0x61/0xa0 [ 777.130374][T18273] ? profile_setup.cold+0xbb/0xbb [ 777.135417][T18273] __alloc_file+0x27/0x300 [ 777.139847][T18273] alloc_empty_file+0x72/0x170 [ 777.144651][T18273] path_openat+0xef/0x46e0 20:01:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x1000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 777.149073][T18273] ? stack_trace_save+0xac/0xe0 [ 777.149089][T18273] ? stack_trace_consume_entry+0x190/0x190 [ 777.149106][T18273] ? stack_trace_save+0xac/0xe0 [ 777.149125][T18273] ? save_stack+0x5c/0x90 [ 777.149140][T18273] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 777.149156][T18273] ? __kmalloc+0x15c/0x740 [ 777.149171][T18273] ? security_prepare_creds+0x123/0x190 [ 777.149186][T18273] ? prepare_creds+0x2f5/0x3f0 [ 777.149200][T18273] ? prepare_exec_creds+0x12/0xf0 [ 777.149216][T18273] ? __do_execve_file.isra.0+0x393/0x23a0 20:01:08 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8904, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 777.149229][T18273] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 777.149246][T18273] ? do_fast_syscall_32+0x281/0xd54 [ 777.149263][T18273] ? entry_SYSENTER_compat+0x70/0x7f [ 777.149283][T18273] ? save_stack+0x23/0x90 [ 777.208566][T18292] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 777.210882][T18273] do_filp_open+0x1a1/0x280 [ 777.210901][T18273] ? may_open_dev+0x100/0x100 [ 777.210921][T18273] ? __lock_acquire+0x54f/0x5490 [ 777.210952][T18273] ? mark_held_locks+0xf0/0xf0 [ 777.210969][T18273] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 777.210996][T18273] do_open_execat+0x137/0x690 [ 777.239067][T18273] ? unregister_binfmt+0x170/0x170 [ 777.239088][T18273] ? lock_downgrade+0x880/0x880 [ 777.239107][T18273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.239124][T18273] ? kasan_check_read+0x11/0x20 [ 777.239140][T18273] ? do_raw_spin_unlock+0x57/0x270 [ 777.239162][T18273] __do_execve_file.isra.0+0x178d/0x23a0 [ 777.239184][T18273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 777.248886][T18273] ? copy_strings_kernel+0x110/0x110 20:01:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x2000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x200002d4, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 777.248904][T18273] ? strncpy_from_user+0x2ac/0x380 [ 777.248930][T18273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.314134][T18273] __ia32_compat_sys_execveat+0xf3/0x140 [ 777.319802][T18273] do_fast_syscall_32+0x281/0xd54 [ 777.325126][T18273] entry_SYSENTER_compat+0x70/0x7f [ 777.330251][T18273] RIP: 0023:0xf7fc2849 [ 777.334333][T18273] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 777.353959][T18273] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 777.353975][T18273] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 777.353983][T18273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 777.353990][T18273] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 777.353997][T18273] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 777.354004][T18273] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 777.417746][T18283] CPU: 1 PID: 18283 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 777.425340][T18283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.425347][T18283] Call Trace: [ 777.425371][T18283] dump_stack+0x172/0x1f0 [ 777.425392][T18283] should_fail.cold+0xa/0x15 [ 777.425410][T18283] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 777.425436][T18283] ? ___might_sleep+0x163/0x280 [ 777.458517][T18283] __should_failslab+0x121/0x190 [ 777.463481][T18283] should_failslab+0x9/0x14 [ 777.468003][T18283] kmem_cache_alloc_node_trace+0x270/0x720 [ 777.473831][T18283] ? kasan_unpoison_shadow+0x35/0x50 [ 777.473848][T18283] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 777.473876][T18283] __kmalloc_node+0x3d/0x70 [ 777.473902][T18283] kvmalloc_node+0x68/0x100 [ 777.494312][T18283] alloc_fdtable+0x142/0x290 [ 777.498936][T18283] dup_fd+0x743/0xb30 [ 777.502969][T18283] unshare_fd+0x160/0x1d0 [ 777.507365][T18283] ? find_held_lock+0x35/0x130 [ 777.507393][T18283] ? pidfd_release+0x50/0x50 [ 777.516777][T18283] ? quarantine_reduce+0x169/0x1b0 [ 777.521911][T18283] ? qlist_free_all+0xfd/0x150 [ 777.521934][T18283] unshare_files+0x7f/0x1f0 [ 777.521951][T18283] ? __ia32_sys_unshare+0x40/0x40 [ 777.521979][T18283] __do_execve_file.isra.0+0x27e/0x23a0 [ 777.522004][T18283] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 777.548769][T18283] ? __phys_addr_symbol+0x30/0x70 [ 777.553827][T18283] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 777.556608][T18302] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 777.559573][T18283] ? __check_object_size+0x3d/0x42f [ 777.559597][T18283] ? copy_strings_kernel+0x110/0x110 [ 777.559613][T18283] ? strncpy_from_user+0x2ac/0x380 [ 777.559633][T18283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.559657][T18283] __ia32_compat_sys_execveat+0xf3/0x140 [ 777.592343][T18283] do_fast_syscall_32+0x281/0xd54 [ 777.592366][T18283] entry_SYSENTER_compat+0x70/0x7f [ 777.592379][T18283] RIP: 0023:0xf7fe2849 [ 777.592401][T18283] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 777.603046][T18283] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 777.603062][T18283] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 777.603070][T18283] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 777.603078][T18283] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 20:01:08 executing program 1 (fault-call:3 fault-nth:9): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:08 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:08 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x3000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:08 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8905, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:08 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 777.603095][T18283] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 777.673201][T18309] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 777.673295][T18283] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 777.683649][T18311] FAULT_INJECTION: forcing a failure. [ 777.683649][T18311] name failslab, interval 1, probability 0, space 0, times 0 20:01:09 executing program 3 (fault-call:3 fault-nth:6): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 777.759568][T18311] CPU: 1 PID: 18311 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 777.767190][T18311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.777257][T18311] Call Trace: [ 777.777287][T18311] dump_stack+0x172/0x1f0 [ 777.784924][T18311] should_fail.cold+0xa/0x15 [ 777.789576][T18311] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 777.795430][T18311] ? ___might_sleep+0x163/0x280 [ 777.800301][T18311] __should_failslab+0x121/0x190 [ 777.800319][T18311] should_failslab+0x9/0x14 20:01:09 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8906, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 777.800338][T18311] kmem_cache_alloc+0x2b2/0x6f0 [ 777.800355][T18311] ? __kernel_text_address+0xd/0x40 [ 777.800373][T18311] ? unwind_get_return_address+0x61/0xa0 [ 777.800397][T18311] ? profile_setup.cold+0xbb/0xbb [ 777.830530][T18311] __alloc_file+0x27/0x300 [ 777.834965][T18311] alloc_empty_file+0x72/0x170 [ 777.839772][T18311] path_openat+0xef/0x46e0 [ 777.844204][T18311] ? stack_trace_save+0xac/0xe0 [ 777.849077][T18311] ? stack_trace_consume_entry+0x190/0x190 [ 777.854913][T18311] ? stack_trace_save+0xac/0xe0 [ 777.859785][T18311] ? save_stack+0x5c/0x90 [ 777.859805][T18311] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 777.859822][T18311] ? __kmalloc+0x15c/0x740 [ 777.859838][T18311] ? security_prepare_creds+0x123/0x190 [ 777.859861][T18311] ? prepare_creds+0x2f5/0x3f0 [ 777.859885][T18311] ? prepare_exec_creds+0x12/0xf0 [ 777.869586][T18311] ? __do_execve_file.isra.0+0x393/0x23a0 [ 777.869602][T18311] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 777.869620][T18311] ? do_fast_syscall_32+0x281/0xd54 20:01:09 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8907, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 777.869638][T18311] ? entry_SYSENTER_compat+0x70/0x7f [ 777.869651][T18311] ? save_stack+0x23/0x90 [ 777.869676][T18311] do_filp_open+0x1a1/0x280 [ 777.869698][T18311] ? may_open_dev+0x100/0x100 [ 777.915272][T18324] FAULT_INJECTION: forcing a failure. [ 777.915272][T18324] name failslab, interval 1, probability 0, space 0, times 0 [ 777.915823][T18311] ? __lock_acquire+0x54f/0x5490 [ 777.942646][T18311] ? mark_held_locks+0xf0/0xf0 [ 777.947429][T18311] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 777.953272][T18311] do_open_execat+0x137/0x690 20:01:09 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x890b, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 777.958068][T18311] ? unregister_binfmt+0x170/0x170 [ 777.963208][T18311] ? lock_downgrade+0x880/0x880 [ 777.968180][T18311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 777.974468][T18311] ? kasan_check_read+0x11/0x20 [ 777.979339][T18311] ? do_raw_spin_unlock+0x57/0x270 [ 777.984481][T18311] __do_execve_file.isra.0+0x178d/0x23a0 [ 777.990140][T18311] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 777.996425][T18311] ? copy_strings_kernel+0x110/0x110 [ 778.001759][T18311] ? strncpy_from_user+0x2ac/0x380 20:01:09 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x890c, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 778.006913][T18311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.013357][T18311] __ia32_compat_sys_execveat+0xf3/0x140 [ 778.019106][T18311] do_fast_syscall_32+0x281/0xd54 [ 778.024162][T18311] entry_SYSENTER_compat+0x70/0x7f [ 778.029737][T18311] RIP: 0023:0xf7fc2849 [ 778.033841][T18311] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 778.053463][T18311] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 778.061985][T18311] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 778.069981][T18311] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 778.077998][T18311] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 778.085995][T18311] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 778.093997][T18311] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 778.102022][T18324] CPU: 0 PID: 18324 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 778.109583][T18324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.119648][T18324] Call Trace: [ 778.122951][T18324] dump_stack+0x172/0x1f0 [ 778.127299][T18324] should_fail.cold+0xa/0x15 [ 778.131911][T18324] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 778.137738][T18324] ? ___might_sleep+0x163/0x280 [ 778.142627][T18324] __should_failslab+0x121/0x190 [ 778.147588][T18324] should_failslab+0x9/0x14 [ 778.152108][T18324] kmem_cache_alloc+0x2b2/0x6f0 [ 778.156982][T18324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.163245][T18324] ? __validate_process_creds+0x22d/0x380 [ 778.168996][T18324] prepare_creds+0x3e/0x3f0 [ 778.173514][T18324] prepare_exec_creds+0x12/0xf0 [ 778.178391][T18324] __do_execve_file.isra.0+0x393/0x23a0 [ 778.183957][T18324] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 778.183985][T18324] ? __phys_addr_symbol+0x30/0x70 [ 778.195362][T18324] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 778.201102][T18324] ? __check_object_size+0x3d/0x42f [ 778.206317][T18324] ? copy_strings_kernel+0x110/0x110 [ 778.206334][T18324] ? strncpy_from_user+0x2ac/0x380 [ 778.206366][T18324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.223006][T18324] __ia32_compat_sys_execveat+0xf3/0x140 [ 778.228669][T18324] do_fast_syscall_32+0x281/0xd54 [ 778.233724][T18324] entry_SYSENTER_compat+0x70/0x7f [ 778.238844][T18324] RIP: 0023:0xf7fe2849 20:01:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x7ffff000, r1, 0x7ffffff9}, 0x14}}, 0x0) [ 778.242927][T18324] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 778.262718][T18324] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 778.271176][T18324] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 778.279160][T18324] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 778.287149][T18324] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 778.295109][T18324] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 778.303071][T18324] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:09 executing program 1 (fault-call:3 fault-nth:10): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:09 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8910, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x4000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:09 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:09 executing program 3 (fault-call:3 fault-nth:7): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 778.387118][T18344] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 778.449898][T18352] FAULT_INJECTION: forcing a failure. [ 778.449898][T18352] name failslab, interval 1, probability 0, space 0, times 0 [ 778.474494][T18355] FAULT_INJECTION: forcing a failure. [ 778.474494][T18355] name failslab, interval 1, probability 0, space 0, times 0 [ 778.489190][T18352] CPU: 1 PID: 18352 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 778.496761][T18352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.506835][T18352] Call Trace: [ 778.510167][T18352] dump_stack+0x172/0x1f0 [ 778.514523][T18352] should_fail.cold+0xa/0x15 [ 778.519146][T18352] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 778.524987][T18352] ? ___might_sleep+0x163/0x280 [ 778.529876][T18352] __should_failslab+0x121/0x190 [ 778.534839][T18352] should_failslab+0x9/0x14 [ 778.539374][T18352] kmem_cache_alloc+0x2b2/0x6f0 [ 778.544279][T18352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.550545][T18352] ? __validate_process_creds+0x22d/0x380 [ 778.556295][T18352] prepare_creds+0x3e/0x3f0 [ 778.560824][T18352] prepare_exec_creds+0x12/0xf0 [ 778.565698][T18352] __do_execve_file.isra.0+0x393/0x23a0 [ 778.571256][T18352] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 778.577512][T18352] ? __phys_addr_symbol+0x30/0x70 [ 778.582546][T18352] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 778.588273][T18352] ? __check_object_size+0x3d/0x42f [ 778.593508][T18352] ? copy_strings_kernel+0x110/0x110 [ 778.598806][T18352] ? strncpy_from_user+0x2ac/0x380 [ 778.603931][T18352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.610190][T18352] __ia32_compat_sys_execveat+0xf3/0x140 [ 778.615844][T18352] do_fast_syscall_32+0x281/0xd54 [ 778.620893][T18352] entry_SYSENTER_compat+0x70/0x7f [ 778.626022][T18352] RIP: 0023:0xf7fe2849 [ 778.630106][T18352] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 778.649831][T18352] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 778.659817][T18352] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 778.667810][T18352] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 778.676408][T18352] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 778.684391][T18352] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 778.692472][T18352] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0xfffffdef, r1, 0x7ffffff9}, 0x14}}, 0x0) 20:01:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x5000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:09 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8911, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:09 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 778.700715][T18355] CPU: 0 PID: 18355 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 778.708280][T18355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.708296][T18355] Call Trace: [ 778.721684][T18355] dump_stack+0x172/0x1f0 [ 778.726032][T18355] should_fail.cold+0xa/0x15 [ 778.730648][T18355] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 778.736481][T18355] ? ___might_sleep+0x163/0x280 [ 778.741364][T18355] __should_failslab+0x121/0x190 [ 778.746326][T18355] should_failslab+0x9/0x14 [ 778.750860][T18355] kmem_cache_alloc+0x2b2/0x6f0 [ 778.755725][T18355] ? rcu_read_lock_sched_held+0x110/0x130 [ 778.761464][T18355] ? kmem_cache_alloc+0x32e/0x6f0 [ 778.761485][T18355] security_file_alloc+0x39/0x170 [ 778.761503][T18355] __alloc_file+0xac/0x300 [ 778.761518][T18355] alloc_empty_file+0x72/0x170 [ 778.761536][T18355] path_openat+0xef/0x46e0 [ 778.761551][T18355] ? stack_trace_save+0xac/0xe0 [ 778.761577][T18355] ? stack_trace_consume_entry+0x190/0x190 [ 778.780781][T18355] ? stack_trace_save+0xac/0xe0 [ 778.780804][T18355] ? save_stack+0x5c/0x90 [ 778.780821][T18355] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 778.780836][T18355] ? __kmalloc+0x15c/0x740 [ 778.780853][T18355] ? security_prepare_creds+0x123/0x190 [ 778.780869][T18355] ? prepare_creds+0x2f5/0x3f0 [ 778.780892][T18355] ? prepare_exec_creds+0x12/0xf0 [ 778.790160][T18355] ? __do_execve_file.isra.0+0x393/0x23a0 [ 778.790174][T18355] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 778.790191][T18355] ? do_fast_syscall_32+0x281/0xd54 20:01:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x2}, 0x14}}, 0x0) [ 778.790209][T18355] ? entry_SYSENTER_compat+0x70/0x7f [ 778.790221][T18355] ? save_stack+0x23/0x90 [ 778.790247][T18355] do_filp_open+0x1a1/0x280 [ 778.800900][T18355] ? may_open_dev+0x100/0x100 [ 778.800929][T18355] ? __lock_acquire+0x54f/0x5490 [ 778.810621][T18355] ? mark_held_locks+0xf0/0xf0 [ 778.810639][T18355] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 778.810666][T18355] do_open_execat+0x137/0x690 [ 778.810689][T18355] ? unregister_binfmt+0x170/0x170 [ 778.820640][T18355] ? lock_downgrade+0x880/0x880 [ 778.820662][T18355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.820678][T18355] ? kasan_check_read+0x11/0x20 [ 778.820694][T18355] ? do_raw_spin_unlock+0x57/0x270 [ 778.820717][T18355] __do_execve_file.isra.0+0x178d/0x23a0 [ 778.820732][T18355] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 778.820758][T18355] ? copy_strings_kernel+0x110/0x110 [ 778.820782][T18355] ? strncpy_from_user+0x2ac/0x380 [ 778.896117][T18355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 778.896141][T18355] __ia32_compat_sys_execveat+0xf3/0x140 [ 778.896173][T18355] do_fast_syscall_32+0x281/0xd54 [ 778.941008][T18355] entry_SYSENTER_compat+0x70/0x7f [ 778.941023][T18355] RIP: 0023:0xf7fc2849 [ 778.941040][T18355] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 778.941047][T18355] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 778.941060][T18355] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 20:01:10 executing program 3 (fault-call:3 fault-nth:8): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:10 executing program 1 (fault-call:3 fault-nth:11): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 778.941068][T18355] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 778.941077][T18355] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 778.941085][T18355] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 778.941092][T18355] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 779.024864][T18364] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:10 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:10 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8912, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x6000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 779.245196][T18381] FAULT_INJECTION: forcing a failure. [ 779.245196][T18381] name failslab, interval 1, probability 0, space 0, times 0 [ 779.267693][T18386] FAULT_INJECTION: forcing a failure. [ 779.267693][T18386] name failslab, interval 1, probability 0, space 0, times 0 [ 779.315344][T18381] CPU: 1 PID: 18381 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 779.322970][T18381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.333054][T18381] Call Trace: [ 779.336366][T18381] dump_stack+0x172/0x1f0 [ 779.336394][T18381] should_fail.cold+0xa/0x15 [ 779.336416][T18381] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 779.336443][T18381] ? ___might_sleep+0x163/0x280 [ 779.345365][T18381] __should_failslab+0x121/0x190 [ 779.345385][T18381] should_failslab+0x9/0x14 [ 779.345404][T18381] __kmalloc_track_caller+0x2d8/0x740 [ 779.345426][T18381] ? pointer+0x870/0x870 [ 779.375199][T18381] ? kasan_check_read+0x11/0x20 [ 779.380079][T18381] ? sched_exec+0x1cc/0x260 [ 779.384603][T18381] ? kasprintf+0xbb/0xf0 [ 779.388879][T18381] kvasprintf+0xc8/0x170 [ 779.393152][T18381] ? bust_spinlocks+0xe0/0xe0 [ 779.397847][T18381] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 779.403674][T18381] ? sched_exec+0x1cc/0x260 [ 779.408197][T18381] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 779.414039][T18381] ? lockdep_hardirqs_on+0x418/0x5d0 [ 779.419357][T18381] kasprintf+0xbb/0xf0 [ 779.423456][T18381] ? kvasprintf_const+0x190/0x190 [ 779.428505][T18381] ? nr_iowait+0x130/0x130 [ 779.432942][T18381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.439199][T18381] ? kasan_check_read+0x11/0x20 [ 779.444081][T18381] __do_execve_file.isra.0+0x94b/0x23a0 [ 779.449644][T18381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 779.455929][T18381] ? copy_strings_kernel+0x110/0x110 [ 779.461240][T18381] ? strncpy_from_user+0x2ac/0x380 [ 779.466377][T18381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.472642][T18381] __ia32_compat_sys_execveat+0xf3/0x140 [ 779.478288][T18381] do_fast_syscall_32+0x281/0xd54 [ 779.483334][T18381] entry_SYSENTER_compat+0x70/0x7f [ 779.488455][T18381] RIP: 0023:0xf7fc2849 [ 779.492534][T18381] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:01:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x7000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xa000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xe000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 779.512152][T18381] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 779.520583][T18381] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 779.528566][T18381] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 779.536551][T18381] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 779.544535][T18381] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 779.552808][T18381] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 779.560816][T18386] CPU: 0 PID: 18386 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 779.568393][T18386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.578490][T18386] Call Trace: [ 779.581796][T18386] dump_stack+0x172/0x1f0 [ 779.586146][T18386] should_fail.cold+0xa/0x15 [ 779.590750][T18386] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 779.601090][T18386] ? ___might_sleep+0x163/0x280 [ 779.605963][T18386] __should_failslab+0x121/0x190 [ 779.610911][T18386] should_failslab+0x9/0x14 20:01:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x4}, 0x14}}, 0x0) 20:01:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xf000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 779.615422][T18386] __kmalloc+0x2dc/0x740 [ 779.619675][T18386] ? refcount_inc_not_zero_checked+0x144/0x200 [ 779.625858][T18386] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 779.625877][T18386] ? security_prepare_creds+0x123/0x190 [ 779.625897][T18386] security_prepare_creds+0x123/0x190 [ 779.625923][T18386] prepare_creds+0x2f5/0x3f0 [ 779.647238][T18386] prepare_exec_creds+0x12/0xf0 [ 779.652115][T18386] __do_execve_file.isra.0+0x393/0x23a0 [ 779.652134][T18386] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 20:01:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x20000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 779.652153][T18386] ? __phys_addr_symbol+0x30/0x70 [ 779.652165][T18386] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 779.652182][T18386] ? __check_object_size+0x3d/0x42f [ 779.652202][T18386] ? copy_strings_kernel+0x110/0x110 [ 779.652218][T18386] ? strncpy_from_user+0x2ac/0x380 [ 779.652241][T18386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.696601][T18386] __ia32_compat_sys_execveat+0xf3/0x140 [ 779.702261][T18386] do_fast_syscall_32+0x281/0xd54 [ 779.707303][T18386] entry_SYSENTER_compat+0x70/0x7f [ 779.712458][T18386] RIP: 0023:0xf7fe2849 [ 779.716535][T18386] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 779.716545][T18386] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 779.716559][T18386] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 779.716576][T18386] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 20:01:11 executing program 1 (fault-call:3 fault-nth:12): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 779.752594][T18386] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 779.752603][T18386] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 779.752611][T18386] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 779.799334][T18406] FAULT_INJECTION: forcing a failure. [ 779.799334][T18406] name failslab, interval 1, probability 0, space 0, times 0 [ 779.813802][T18406] CPU: 0 PID: 18406 Comm: syz-executor.1 Not tainted 5.1.0+ #6 [ 779.821383][T18406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.831459][T18406] Call Trace: [ 779.834768][T18406] dump_stack+0x172/0x1f0 [ 779.839125][T18406] should_fail.cold+0xa/0x15 [ 779.843745][T18406] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 779.849566][T18406] ? ___might_sleep+0x163/0x280 [ 779.854427][T18406] __should_failslab+0x121/0x190 [ 779.859378][T18406] should_failslab+0x9/0x14 [ 779.859401][T18406] kmem_cache_alloc+0x2b2/0x6f0 [ 779.859419][T18406] ? nr_iowait+0x130/0x130 [ 779.859435][T18406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.859457][T18406] mm_alloc+0x1d/0xd0 [ 779.859482][T18406] __do_execve_file.isra.0+0xaa3/0x23a0 [ 779.868828][T18406] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 779.868857][T18406] ? copy_strings_kernel+0x110/0x110 [ 779.868873][T18406] ? strncpy_from_user+0x2ac/0x380 [ 779.868895][T18406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 779.883515][T18406] __ia32_compat_sys_execveat+0xf3/0x140 [ 779.883540][T18406] do_fast_syscall_32+0x281/0xd54 [ 779.883565][T18406] entry_SYSENTER_compat+0x70/0x7f [ 779.895333][T18406] RIP: 0023:0xf7fc2849 [ 779.895350][T18406] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 779.895367][T18406] RSP: 002b:00000000f5dbe0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 779.905749][T18406] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 20:01:11 executing program 3 (fault-call:3 fault-nth:9): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:11 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8913, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:11 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xa}, 0x14}}, 0x0) 20:01:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:11 executing program 1 (fault-call:3 fault-nth:13): r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 779.905759][T18406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 779.905767][T18406] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 779.905775][T18406] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 779.905791][T18406] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:11 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8914, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:11 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000ffffff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x40000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xe}, 0x14}}, 0x0) [ 780.059733][T18419] FAULT_INJECTION: forcing a failure. [ 780.059733][T18419] name failslab, interval 1, probability 0, space 0, times 0 [ 780.080403][T18419] CPU: 1 PID: 18419 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 780.088033][T18419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.098108][T18419] Call Trace: [ 780.101417][T18419] dump_stack+0x172/0x1f0 [ 780.105767][T18419] should_fail.cold+0xa/0x15 [ 780.110386][T18419] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 780.116219][T18419] ? ___might_sleep+0x163/0x280 [ 780.121092][T18419] __should_failslab+0x121/0x190 [ 780.126063][T18419] should_failslab+0x9/0x14 [ 780.130589][T18419] kmem_cache_alloc+0x2b2/0x6f0 [ 780.135455][T18419] ? rcu_read_lock_sched_held+0x110/0x130 [ 780.141193][T18419] ? kmem_cache_alloc+0x32e/0x6f0 [ 780.146233][T18419] security_file_alloc+0x39/0x170 [ 780.151273][T18419] __alloc_file+0xac/0x300 20:01:11 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000080", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x48000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 780.155716][T18419] alloc_empty_file+0x72/0x170 [ 780.160496][T18419] path_openat+0xef/0x46e0 [ 780.164920][T18419] ? stack_trace_save+0xac/0xe0 [ 780.169787][T18419] ? stack_trace_consume_entry+0x190/0x190 [ 780.175613][T18419] ? stack_trace_save+0xac/0xe0 [ 780.180487][T18419] ? save_stack+0x5c/0x90 [ 780.184833][T18419] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 780.190221][T18419] ? __kmalloc+0x15c/0x740 [ 780.194651][T18419] ? security_prepare_creds+0x123/0x190 [ 780.200208][T18419] ? prepare_creds+0x2f5/0x3f0 [ 780.204986][T18419] ? prepare_exec_creds+0x12/0xf0 [ 780.210043][T18419] ? __do_execve_file.isra.0+0x393/0x23a0 [ 780.215774][T18419] ? __ia32_compat_sys_execveat+0xf3/0x140 [ 780.221589][T18419] ? do_fast_syscall_32+0x281/0xd54 [ 780.226804][T18419] ? entry_SYSENTER_compat+0x70/0x7f [ 780.232128][T18419] ? save_stack+0x23/0x90 [ 780.236482][T18419] do_filp_open+0x1a1/0x280 [ 780.241002][T18419] ? may_open_dev+0x100/0x100 [ 780.245709][T18419] ? __lock_acquire+0x54f/0x5490 [ 780.250692][T18419] ? mark_held_locks+0xf0/0xf0 [ 780.255480][T18419] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 780.261320][T18419] do_open_execat+0x137/0x690 [ 780.266025][T18419] ? unregister_binfmt+0x170/0x170 [ 780.271158][T18419] ? lock_downgrade+0x880/0x880 [ 780.276031][T18419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.276051][T18419] ? kasan_check_read+0x11/0x20 [ 780.276069][T18419] ? do_raw_spin_unlock+0x57/0x270 [ 780.276095][T18419] __do_execve_file.isra.0+0x178d/0x23a0 [ 780.287179][T18419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 780.287211][T18419] ? copy_strings_kernel+0x110/0x110 [ 780.287227][T18419] ? strncpy_from_user+0x2ac/0x380 [ 780.287250][T18419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.304275][T18419] __ia32_compat_sys_execveat+0xf3/0x140 [ 780.304301][T18419] do_fast_syscall_32+0x281/0xd54 [ 780.304324][T18419] entry_SYSENTER_compat+0x70/0x7f [ 780.304345][T18419] RIP: 0023:0xf7fe2849 [ 780.314759][T18419] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:01:11 executing program 3 (fault-call:3 fault-nth:10): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf}, 0x14}}, 0x0) 20:01:11 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000007fffff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x4c000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 780.314768][T18419] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 780.314781][T18419] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 780.314790][T18419] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 780.314799][T18419] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 780.314807][T18419] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 780.314815][T18419] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:11 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 780.430734][T18447] FAULT_INJECTION: forcing a failure. [ 780.430734][T18447] name failslab, interval 1, probability 0, space 0, times 0 [ 780.463020][T18447] CPU: 1 PID: 18447 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 780.470623][T18447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.480688][T18447] Call Trace: [ 780.480716][T18447] dump_stack+0x172/0x1f0 [ 780.480739][T18447] should_fail.cold+0xa/0x15 [ 780.480761][T18447] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 780.480787][T18447] ? ___might_sleep+0x163/0x280 [ 780.488397][T18447] __should_failslab+0x121/0x190 [ 780.488415][T18447] should_failslab+0x9/0x14 [ 780.488439][T18447] __kmalloc_track_caller+0x2d8/0x740 [ 780.498825][T18447] ? pointer+0x870/0x870 [ 780.508595][T18447] ? kasan_check_read+0x11/0x20 [ 780.508616][T18447] ? sched_exec+0x1cc/0x260 [ 780.508634][T18447] ? kasprintf+0xbb/0xf0 [ 780.508655][T18447] kvasprintf+0xc8/0x170 [ 780.518524][T18447] ? bust_spinlocks+0xe0/0xe0 [ 780.518545][T18447] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 780.518570][T18447] ? sched_exec+0x1cc/0x260 [ 780.527648][T18447] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 780.527667][T18447] ? lockdep_hardirqs_on+0x418/0x5d0 [ 780.527698][T18447] kasprintf+0xbb/0xf0 [ 780.536448][T18447] ? kvasprintf_const+0x190/0x190 [ 780.536471][T18447] ? nr_iowait+0x130/0x130 [ 780.536495][T18447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.545422][T18447] ? kasan_check_read+0x11/0x20 [ 780.545448][T18447] __do_execve_file.isra.0+0x94b/0x23a0 [ 780.545470][T18447] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 780.555774][T18447] ? copy_strings_kernel+0x110/0x110 [ 780.555791][T18447] ? strncpy_from_user+0x2ac/0x380 [ 780.555815][T18447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 780.566908][T18447] __ia32_compat_sys_execveat+0xf3/0x140 [ 780.566932][T18447] do_fast_syscall_32+0x281/0xd54 20:01:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x60000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 780.566957][T18447] entry_SYSENTER_compat+0x70/0x7f [ 780.576023][T18447] RIP: 0023:0xf7fe2849 [ 780.576039][T18447] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 780.576046][T18447] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 780.576060][T18447] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 20:01:11 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x891d, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x60}, 0x14}}, 0x0) 20:01:11 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000f5ffff", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x68000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:11 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x300) [ 780.576076][T18447] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 780.586719][T18447] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 780.586727][T18447] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 780.586734][T18447] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf0}, 0x14}}, 0x0) 20:01:12 executing program 3 (fault-call:3 fault-nth:11): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:12 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x500) 20:01:12 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x6c000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:12 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x891e, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:12 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x600) 20:01:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xa00}, 0x14}}, 0x0) [ 781.041999][T18493] FAULT_INJECTION: forcing a failure. [ 781.041999][T18493] name failslab, interval 1, probability 0, space 0, times 0 [ 781.114798][T18493] CPU: 0 PID: 18493 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 781.122400][T18493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.132478][T18493] Call Trace: [ 781.135787][T18493] dump_stack+0x172/0x1f0 [ 781.140136][T18493] should_fail.cold+0xa/0x15 [ 781.144777][T18493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 781.150611][T18493] ? ___might_sleep+0x163/0x280 [ 781.155483][T18493] __should_failslab+0x121/0x190 [ 781.160433][T18493] should_failslab+0x9/0x14 20:01:12 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x891f, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:12 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 781.164950][T18493] __kmalloc_track_caller+0x2d8/0x740 [ 781.170342][T18493] ? pointer+0x870/0x870 [ 781.174601][T18493] ? stop_one_cpu+0x114/0x170 [ 781.179296][T18493] ? multi_cpu_stop+0x4d0/0x4d0 [ 781.184167][T18493] ? kasprintf+0xbb/0xf0 [ 781.188427][T18493] kvasprintf+0xc8/0x170 [ 781.192681][T18493] ? bust_spinlocks+0xe0/0xe0 [ 781.197387][T18493] kasprintf+0xbb/0xf0 [ 781.201465][T18493] ? kvasprintf_const+0x190/0x190 [ 781.201488][T18493] ? nr_iowait+0x130/0x130 20:01:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xe00}, 0x14}}, 0x0) [ 781.201504][T18493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.201520][T18493] ? kasan_check_read+0x11/0x20 [ 781.201544][T18493] __do_execve_file.isra.0+0x94b/0x23a0 [ 781.201560][T18493] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 781.201585][T18493] ? copy_strings_kernel+0x110/0x110 [ 781.222086][T18493] ? strncpy_from_user+0x2ac/0x380 [ 781.222110][T18493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.222132][T18493] __ia32_compat_sys_execveat+0xf3/0x140 [ 781.222154][T18493] do_fast_syscall_32+0x281/0xd54 [ 781.222177][T18493] entry_SYSENTER_compat+0x70/0x7f [ 781.222197][T18493] RIP: 0023:0xf7fe2849 [ 781.270386][T18493] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 781.270396][T18493] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 781.270409][T18493] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 781.270417][T18493] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 20:01:12 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x700) 20:01:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x74000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 781.270425][T18493] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 781.270433][T18493] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 781.270440][T18493] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:12 executing program 3 (fault-call:3 fault-nth:12): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:12 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 781.357075][T18516] __nla_validate_parse: 12 callbacks suppressed [ 781.357087][T18516] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:12 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8920, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:12 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x900) [ 781.429280][T18525] FAULT_INJECTION: forcing a failure. [ 781.429280][T18525] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 781.477995][T18525] CPU: 1 PID: 18525 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 781.485632][T18525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.497019][T18525] Call Trace: [ 781.497050][T18525] dump_stack+0x172/0x1f0 [ 781.497072][T18525] should_fail.cold+0xa/0x15 [ 781.497095][T18525] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 781.497119][T18525] ? ___might_sleep+0x163/0x280 [ 781.519971][T18525] should_fail_alloc_page+0x50/0x60 [ 781.525192][T18525] __alloc_pages_nodemask+0x1a1/0x8d0 [ 781.525211][T18525] ? mark_held_locks+0xf0/0xf0 [ 781.525234][T18525] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 781.541103][T18525] ? find_held_lock+0x35/0x130 [ 781.545887][T18525] ? percpu_ref_put_many+0x94/0x190 [ 781.545904][T18525] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 781.545930][T18525] alloc_pages_current+0x107/0x210 [ 781.563020][T18525] __get_free_pages+0xc/0x40 [ 781.567621][T18525] pgd_alloc+0x8b/0x3f0 [ 781.567641][T18525] ? pgd_page_get_mm+0x40/0x40 [ 781.567663][T18525] ? lockdep_init_map+0x1be/0x6d0 [ 781.581596][T18525] ? lockdep_init_map+0x1be/0x6d0 [ 781.586655][T18525] mm_init+0x590/0x9b0 [ 781.590745][T18525] mm_alloc+0xa6/0xd0 [ 781.594748][T18525] __do_execve_file.isra.0+0xaa3/0x23a0 [ 781.600313][T18525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 781.606590][T18525] ? copy_strings_kernel+0x110/0x110 [ 781.611904][T18525] ? strncpy_from_user+0x2ac/0x380 [ 781.617041][T18525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 781.623307][T18525] __ia32_compat_sys_execveat+0xf3/0x140 [ 781.628968][T18525] do_fast_syscall_32+0x281/0xd54 [ 781.634014][T18525] entry_SYSENTER_compat+0x70/0x7f [ 781.639133][T18525] RIP: 0023:0xf7fe2849 [ 781.643216][T18525] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 781.662836][T18525] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 781.671272][T18525] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 20:01:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x7a000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xec0}, 0x14}}, 0x0) 20:01:12 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:12 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8921, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:12 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:12 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 781.679260][T18525] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 781.687244][T18525] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 781.695233][T18525] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 781.703229][T18525] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:13 executing program 3 (fault-call:3 fault-nth:13): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 781.752143][T18550] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:13 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:13 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xa00) 20:01:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf00}, 0x14}}, 0x0) [ 781.848426][T18556] bond0: mtu greater than device maximum 20:01:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x9effffff, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 781.915556][T18562] FAULT_INJECTION: forcing a failure. [ 781.915556][T18562] name fail_page_alloc, interval 1, probability 0, space 0, times 0 20:01:13 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xb00) 20:01:13 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8923, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:13 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf83}, 0x14}}, 0x0) [ 782.000061][T18569] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:13 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xc00) 20:01:13 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8924, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xc3150000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 782.212271][T18596] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 782.275641][T18562] CPU: 1 PID: 18562 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 782.283242][T18562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.293392][T18562] Call Trace: [ 782.293425][T18562] dump_stack+0x172/0x1f0 [ 782.301034][T18562] should_fail.cold+0xa/0x15 [ 782.301053][T18562] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 782.301070][T18562] ? ___might_sleep+0x163/0x280 [ 782.301095][T18562] should_fail_alloc_page+0x50/0x60 [ 782.321519][T18562] __alloc_pages_nodemask+0x1a1/0x8d0 [ 782.326909][T18562] ? mark_held_locks+0xf0/0xf0 [ 782.331711][T18562] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 782.331734][T18562] ? find_held_lock+0x35/0x130 [ 782.331752][T18562] ? percpu_ref_put_many+0x94/0x190 [ 782.331769][T18562] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 782.331790][T18562] alloc_pages_current+0x107/0x210 [ 782.331810][T18562] __get_free_pages+0xc/0x40 [ 782.331827][T18562] pgd_alloc+0x8b/0x3f0 [ 782.331845][T18562] ? pgd_page_get_mm+0x40/0x40 [ 782.331869][T18562] ? lockdep_init_map+0x1be/0x6d0 [ 782.331886][T18562] ? lockdep_init_map+0x1be/0x6d0 [ 782.331909][T18562] mm_init+0x590/0x9b0 [ 782.331931][T18562] mm_alloc+0xa6/0xd0 [ 782.353883][T18562] __do_execve_file.isra.0+0xaa3/0x23a0 [ 782.396071][T18562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 782.402347][T18562] ? copy_strings_kernel+0x110/0x110 [ 782.407649][T18562] ? strncpy_from_user+0x2ac/0x380 [ 782.412757][T18562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.419010][T18562] __ia32_compat_sys_execveat+0xf3/0x140 [ 782.424664][T18562] do_fast_syscall_32+0x281/0xd54 [ 782.429677][T18562] entry_SYSENTER_compat+0x70/0x7f [ 782.434771][T18562] RIP: 0023:0xf7fe2849 [ 782.438824][T18562] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 782.458414][T18562] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 782.466820][T18562] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 20:01:13 executing program 3 (fault-call:3 fault-nth:14): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:13 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x4000}, 0x14}}, 0x0) 20:01:13 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xd00) 20:01:13 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8927, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 782.474808][T18562] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 782.482773][T18562] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 782.490758][T18562] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 782.498728][T18562] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 782.548338][T18606] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:13 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xe00) 20:01:13 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 782.620659][T18618] FAULT_INJECTION: forcing a failure. [ 782.620659][T18618] name failslab, interval 1, probability 0, space 0, times 0 [ 782.649279][T18618] CPU: 1 PID: 18618 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 782.657326][T18618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.667399][T18618] Call Trace: [ 782.670718][T18618] dump_stack+0x172/0x1f0 [ 782.675069][T18618] should_fail.cold+0xa/0x15 [ 782.679687][T18618] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 782.685523][T18618] ? ___might_sleep+0x163/0x280 [ 782.690400][T18618] __should_failslab+0x121/0x190 [ 782.695365][T18618] should_failslab+0x9/0x14 [ 782.699907][T18618] kmem_cache_alloc+0x2b2/0x6f0 [ 782.704789][T18618] vm_area_alloc+0x20/0x110 [ 782.709315][T18618] __do_execve_file.isra.0+0xc34/0x23a0 [ 782.714904][T18618] ? copy_strings_kernel+0x110/0x110 [ 782.720212][T18618] ? strncpy_from_user+0x2ac/0x380 [ 782.725350][T18618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 782.731618][T18618] __ia32_compat_sys_execveat+0xf3/0x140 [ 782.737279][T18618] do_fast_syscall_32+0x281/0xd54 [ 782.742338][T18618] entry_SYSENTER_compat+0x70/0x7f [ 782.747463][T18618] RIP: 0023:0xf7fe2849 [ 782.751546][T18618] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:01:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x6000}, 0x14}}, 0x0) 20:01:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x830f}, 0x14}}, 0x0) 20:01:14 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:14 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8929, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 782.771247][T18618] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 782.779672][T18618] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 782.779682][T18618] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 782.779690][T18618] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 782.779699][T18618] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 782.779707][T18618] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:14 executing program 3 (fault-call:3 fault-nth:15): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xfcffffff, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:14 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:14 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1002) [ 782.876576][T18636] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 782.903771][T18643] FAULT_INJECTION: forcing a failure. [ 782.903771][T18643] name fail_page_alloc, interval 1, probability 0, space 0, times 0 20:01:14 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 782.938771][T18643] CPU: 0 PID: 18643 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 782.946369][T18643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.946377][T18643] Call Trace: [ 782.946403][T18643] dump_stack+0x172/0x1f0 [ 782.946430][T18643] should_fail.cold+0xa/0x15 [ 782.968674][T18643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 782.974496][T18643] ? ___might_sleep+0x163/0x280 [ 782.979377][T18643] should_fail_alloc_page+0x50/0x60 [ 782.984589][T18643] __alloc_pages_nodemask+0x1a1/0x8d0 [ 782.989976][T18643] ? __pud_alloc+0x1d3/0x250 [ 782.994581][T18643] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 782.994598][T18643] ? __pud_alloc+0x1d3/0x250 [ 782.994623][T18643] ? lock_downgrade+0x880/0x880 [ 782.994647][T18643] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 783.016019][T18643] alloc_pages_current+0x107/0x210 [ 783.016044][T18643] __pmd_alloc+0x41/0x460 [ 783.016062][T18643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 783.016083][T18643] __handle_mm_fault+0x192a/0x3ec0 [ 783.031776][T18643] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 783.031795][T18643] ? find_held_lock+0x35/0x130 [ 783.031811][T18643] ? handle_mm_fault+0x322/0xb30 [ 783.031837][T18643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.031852][T18643] ? kasan_check_read+0x11/0x20 [ 783.031870][T18643] handle_mm_fault+0x43f/0xb30 [ 783.031892][T18643] __get_user_pages+0x7b6/0x1a40 [ 783.031917][T18643] ? follow_page_mask+0x19a0/0x19a0 [ 783.031933][T18643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.031963][T18643] get_user_pages_remote+0x21d/0x440 [ 783.031992][T18643] copy_strings.isra.0+0x3dc/0x890 [ 783.032017][T18643] ? remove_arg_zero+0x590/0x590 [ 783.042689][T18643] ? prepare_binprm+0x6aa/0x940 [ 783.042706][T18643] ? vma_link+0x117/0x180 [ 783.042723][T18643] ? install_exec_creds+0x180/0x180 [ 783.042744][T18643] copy_strings_kernel+0xa5/0x110 [ 783.042764][T18643] __do_execve_file.isra.0+0x10ef/0x23a0 [ 783.042789][T18643] ? copy_strings_kernel+0x110/0x110 [ 783.042804][T18643] ? strncpy_from_user+0x2ac/0x380 20:01:14 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8930, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xfffff000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xc00e}, 0x14}}, 0x0) 20:01:14 executing program 3 (fault-call:3 fault-nth:16): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 783.042830][T18643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.052536][T18643] __ia32_compat_sys_execveat+0xf3/0x140 [ 783.052562][T18643] do_fast_syscall_32+0x281/0xd54 [ 783.052586][T18643] entry_SYSENTER_compat+0x70/0x7f [ 783.063829][T18643] RIP: 0023:0xf7fe2849 [ 783.063847][T18643] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:01:14 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1003) 20:01:14 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 783.063855][T18643] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 783.063869][T18643] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 783.063878][T18643] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 783.063886][T18643] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 783.063902][T18643] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 783.073592][T18643] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:14 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 783.235720][T18658] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 783.240556][T18660] FAULT_INJECTION: forcing a failure. [ 783.240556][T18660] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 783.296639][T18660] CPU: 0 PID: 18660 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 783.304238][T18660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.314306][T18660] Call Trace: [ 783.314337][T18660] dump_stack+0x172/0x1f0 [ 783.321951][T18660] should_fail.cold+0xa/0x15 [ 783.321969][T18660] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 783.321984][T18660] ? ___might_sleep+0x163/0x280 [ 783.322007][T18660] should_fail_alloc_page+0x50/0x60 [ 783.322023][T18660] __alloc_pages_nodemask+0x1a1/0x8d0 [ 783.322039][T18660] ? __pud_alloc+0x1d3/0x250 [ 783.322056][T18660] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 783.322069][T18660] ? __pud_alloc+0x1d3/0x250 [ 783.322092][T18660] ? lock_downgrade+0x880/0x880 [ 783.322108][T18660] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 783.322134][T18660] alloc_pages_current+0x107/0x210 [ 783.332527][T18660] __pmd_alloc+0x41/0x460 [ 783.332545][T18660] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 783.332561][T18660] __handle_mm_fault+0x192a/0x3ec0 20:01:14 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1004) [ 783.332582][T18660] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 783.332597][T18660] ? find_held_lock+0x35/0x130 [ 783.332612][T18660] ? handle_mm_fault+0x322/0xb30 [ 783.332640][T18660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.342681][T18660] ? kasan_check_read+0x11/0x20 [ 783.342700][T18660] handle_mm_fault+0x43f/0xb30 [ 783.342722][T18660] __get_user_pages+0x7b6/0x1a40 [ 783.342749][T18660] ? follow_page_mask+0x19a0/0x19a0 [ 783.342766][T18660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.342796][T18660] get_user_pages_remote+0x21d/0x440 [ 783.352763][T18660] copy_strings.isra.0+0x3dc/0x890 [ 783.352788][T18660] ? remove_arg_zero+0x590/0x590 [ 783.352804][T18660] ? prepare_binprm+0x6aa/0x940 [ 783.352819][T18660] ? vma_link+0x117/0x180 [ 783.352835][T18660] ? install_exec_creds+0x180/0x180 [ 783.352855][T18660] copy_strings_kernel+0xa5/0x110 [ 783.352886][T18660] __do_execve_file.isra.0+0x10ef/0x23a0 [ 783.368038][T18660] ? copy_strings_kernel+0x110/0x110 [ 783.368056][T18660] ? strncpy_from_user+0x2ac/0x380 20:01:14 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8932, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:14 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xffffff7f, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf000}, 0x14}}, 0x0) [ 783.368080][T18660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.383768][T18660] __ia32_compat_sys_execveat+0xf3/0x140 [ 783.431342][T18660] do_fast_syscall_32+0x281/0xd54 [ 783.431374][T18660] entry_SYSENTER_compat+0x70/0x7f [ 783.431387][T18660] RIP: 0023:0xf7fe2849 [ 783.431402][T18660] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:01:14 executing program 3 (fault-call:3 fault-nth:17): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 783.431409][T18660] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 783.431423][T18660] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 783.431431][T18660] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 783.431449][T18660] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 783.442869][T18660] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 783.442879][T18660] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:14 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1005) 20:01:14 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8933, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xffffff9e, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 783.596705][T18680] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x34000}, 0x14}}, 0x0) [ 783.668127][T18688] FAULT_INJECTION: forcing a failure. [ 783.668127][T18688] name failslab, interval 1, probability 0, space 0, times 0 20:01:14 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 783.752948][T18699] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 783.779308][T18688] CPU: 0 PID: 18688 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 783.786914][T18688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.796985][T18688] Call Trace: [ 783.800306][T18688] dump_stack+0x172/0x1f0 [ 783.804658][T18688] should_fail.cold+0xa/0x15 [ 783.809273][T18688] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 783.815105][T18688] ? ___might_sleep+0x163/0x280 [ 783.819978][T18688] __should_failslab+0x121/0x190 [ 783.824942][T18688] should_failslab+0x9/0x14 [ 783.829459][T18688] kmem_cache_alloc+0x2b2/0x6f0 [ 783.834326][T18688] ? alloc_pages_current+0x10f/0x210 [ 783.839649][T18688] __pmd_alloc+0xc9/0x460 [ 783.843995][T18688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 783.850261][T18688] __handle_mm_fault+0x192a/0x3ec0 [ 783.855398][T18688] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 783.860959][T18688] ? find_held_lock+0x35/0x130 [ 783.865731][T18688] ? handle_mm_fault+0x322/0xb30 [ 783.870686][T18688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.876940][T18688] ? kasan_check_read+0x11/0x20 [ 783.881908][T18688] handle_mm_fault+0x43f/0xb30 [ 783.886700][T18688] __get_user_pages+0x7b6/0x1a40 [ 783.891665][T18688] ? follow_page_mask+0x19a0/0x19a0 [ 783.896888][T18688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.903169][T18688] get_user_pages_remote+0x21d/0x440 [ 783.908572][T18688] copy_strings.isra.0+0x3dc/0x890 [ 783.913712][T18688] ? remove_arg_zero+0x590/0x590 [ 783.918671][T18688] ? prepare_binprm+0x6aa/0x940 [ 783.923540][T18688] ? vma_link+0x117/0x180 [ 783.927884][T18688] ? install_exec_creds+0x180/0x180 [ 783.933098][T18688] copy_strings_kernel+0xa5/0x110 [ 783.938145][T18688] __do_execve_file.isra.0+0x10ef/0x23a0 [ 783.943806][T18688] ? copy_strings_kernel+0x110/0x110 [ 783.949110][T18688] ? strncpy_from_user+0x2ac/0x380 [ 783.954241][T18688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 783.960515][T18688] __ia32_compat_sys_execveat+0xf3/0x140 [ 783.966182][T18688] do_fast_syscall_32+0x281/0xd54 [ 783.971232][T18688] entry_SYSENTER_compat+0x70/0x7f [ 783.976348][T18688] RIP: 0023:0xf7fe2849 [ 783.980439][T18688] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:01:15 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8937, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:15 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1006) 20:01:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xfffffff0, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 784.000053][T18688] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 784.008482][T18688] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 784.016463][T18688] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 784.024443][T18688] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 784.032427][T18688] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 784.040412][T18688] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:15 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1007) 20:01:15 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:15 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8940, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 784.150660][T18726] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:15 executing program 3 (fault-call:3 fault-nth:18): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x400300}, 0x14}}, 0x0) 20:01:15 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xfffffffc, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:15 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1018) 20:01:15 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8941, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:15 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1027) 20:01:15 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8942, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:15 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000aaaaaa", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x3000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 784.429542][T18757] FAULT_INJECTION: forcing a failure. [ 784.429542][T18757] name fail_page_alloc, interval 1, probability 0, space 0, times 0 20:01:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf0ffff}, 0x14}}, 0x0) 20:01:15 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x102f) [ 784.556550][T18757] CPU: 1 PID: 18757 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 784.564156][T18757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.574230][T18757] Call Trace: [ 784.577546][T18757] dump_stack+0x172/0x1f0 [ 784.581896][T18757] should_fail.cold+0xa/0x15 [ 784.586505][T18757] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 784.592327][T18757] ? ___might_sleep+0x163/0x280 [ 784.597206][T18757] should_fail_alloc_page+0x50/0x60 [ 784.602417][T18757] __alloc_pages_nodemask+0x1a1/0x8d0 [ 784.602439][T18757] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 784.602462][T18757] ? kasan_check_write+0x14/0x20 [ 784.613553][T18757] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 784.613572][T18757] alloc_pages_current+0x107/0x210 [ 784.613594][T18757] pte_alloc_one+0x1b/0x1a0 [ 784.613613][T18757] __pte_alloc+0x20/0x310 [ 784.613635][T18757] __handle_mm_fault+0x3391/0x3ec0 [ 784.643846][T18757] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 784.643872][T18757] ? find_held_lock+0x35/0x130 [ 784.643889][T18757] ? handle_mm_fault+0x322/0xb30 [ 784.643915][T18757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.654218][T18757] ? kasan_check_read+0x11/0x20 [ 784.654239][T18757] handle_mm_fault+0x43f/0xb30 [ 784.654263][T18757] __get_user_pages+0x7b6/0x1a40 [ 784.654290][T18757] ? follow_page_mask+0x19a0/0x19a0 [ 784.685569][T18757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.691834][T18757] get_user_pages_remote+0x21d/0x440 [ 784.697842][T18757] copy_strings.isra.0+0x3dc/0x890 [ 784.702998][T18757] ? remove_arg_zero+0x590/0x590 [ 784.707974][T18757] ? prepare_binprm+0x6aa/0x940 [ 784.712852][T18757] ? vma_link+0x117/0x180 [ 784.717212][T18757] ? install_exec_creds+0x180/0x180 [ 784.722433][T18757] copy_strings_kernel+0xa5/0x110 [ 784.727481][T18757] __do_execve_file.isra.0+0x10ef/0x23a0 [ 784.733137][T18757] ? copy_strings_kernel+0x110/0x110 [ 784.738439][T18757] ? strncpy_from_user+0x2ac/0x380 [ 784.743577][T18757] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 784.749844][T18757] __ia32_compat_sys_execveat+0xf3/0x140 [ 784.755505][T18757] do_fast_syscall_32+0x281/0xd54 [ 784.760553][T18757] entry_SYSENTER_compat+0x70/0x7f [ 784.765669][T18757] RIP: 0023:0xf7fe2849 [ 784.769744][T18757] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 784.789364][T18757] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 784.797803][T18757] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 784.805782][T18757] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 784.813771][T18757] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 784.821736][T18757] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 784.829699][T18757] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:16 executing program 3 (fault-call:3 fault-nth:19): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:16 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8943, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x1000000}, 0x14}}, 0x0) 20:01:16 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1048) 20:01:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x40030000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:16 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xf0ffffffffffff, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x2000000}, 0x14}}, 0x0) [ 784.973978][T18799] FAULT_INJECTION: forcing a failure. [ 784.973978][T18799] name failslab, interval 1, probability 0, space 0, times 0 20:01:16 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x104c) 20:01:16 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000a8aaaa", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:16 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 785.029256][T18799] CPU: 1 PID: 18799 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 785.036856][T18799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.046944][T18799] Call Trace: [ 785.050260][T18799] dump_stack+0x172/0x1f0 [ 785.054612][T18799] should_fail.cold+0xa/0x15 [ 785.059219][T18799] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 785.065055][T18799] ? ___might_sleep+0x163/0x280 [ 785.069932][T18799] __should_failslab+0x121/0x190 [ 785.074893][T18799] should_failslab+0x9/0x14 20:01:16 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 785.079424][T18799] kmem_cache_alloc+0x2b2/0x6f0 [ 785.084296][T18799] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 785.090557][T18799] ptlock_alloc+0x20/0x70 [ 785.094907][T18799] pte_alloc_one+0x6d/0x1a0 [ 785.099426][T18799] __pte_alloc+0x20/0x310 [ 785.103773][T18799] __handle_mm_fault+0x3391/0x3ec0 [ 785.108909][T18799] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 785.114471][T18799] ? find_held_lock+0x35/0x130 [ 785.119251][T18799] ? handle_mm_fault+0x322/0xb30 [ 785.124217][T18799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.130478][T18799] ? kasan_check_read+0x11/0x20 [ 785.135345][T18799] handle_mm_fault+0x43f/0xb30 [ 785.140138][T18799] __get_user_pages+0x7b6/0x1a40 [ 785.145107][T18799] ? follow_page_mask+0x19a0/0x19a0 [ 785.150325][T18799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.156594][T18799] get_user_pages_remote+0x21d/0x440 [ 785.161925][T18799] copy_strings.isra.0+0x3dc/0x890 [ 785.167085][T18799] ? remove_arg_zero+0x590/0x590 [ 785.172062][T18799] ? prepare_binprm+0x6aa/0x940 [ 785.176935][T18799] ? vma_link+0x117/0x180 [ 785.181289][T18799] ? install_exec_creds+0x180/0x180 [ 785.186510][T18799] copy_strings_kernel+0xa5/0x110 [ 785.191563][T18799] __do_execve_file.isra.0+0x10ef/0x23a0 [ 785.197231][T18799] ? copy_strings_kernel+0x110/0x110 [ 785.202553][T18799] ? strncpy_from_user+0x2ac/0x380 [ 785.207682][T18799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.207706][T18799] __ia32_compat_sys_execveat+0xf3/0x140 [ 785.207729][T18799] do_fast_syscall_32+0x281/0xd54 [ 785.207756][T18799] entry_SYSENTER_compat+0x70/0x7f [ 785.219633][T18799] RIP: 0023:0xf7fe2849 [ 785.219650][T18799] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 785.219658][T18799] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 785.219673][T18799] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 785.219682][T18799] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 20:01:16 executing program 3 (fault-call:3 fault-nth:20): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:16 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8948, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:16 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1068) 20:01:16 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x100000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 785.219690][T18799] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 785.219698][T18799] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 785.219707][T18799] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:16 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x106c) [ 785.351838][T18829] FAULT_INJECTION: forcing a failure. [ 785.351838][T18829] name failslab, interval 1, probability 0, space 0, times 0 20:01:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x4000000}, 0x14}}, 0x0) 20:01:16 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:16 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8949, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x200000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 785.489344][T18829] CPU: 1 PID: 18829 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 785.496944][T18829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.507027][T18829] Call Trace: [ 785.510346][T18829] dump_stack+0x172/0x1f0 [ 785.514723][T18829] should_fail.cold+0xa/0x15 [ 785.519338][T18829] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 785.525178][T18829] ? ___might_sleep+0x163/0x280 [ 785.530057][T18829] __should_failslab+0x121/0x190 [ 785.535019][T18829] should_failslab+0x9/0x14 20:01:16 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1074) 20:01:16 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x894a, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 785.539536][T18829] kmem_cache_alloc+0x2b2/0x6f0 [ 785.544405][T18829] ? __might_sleep+0x95/0x190 [ 785.549646][T18829] __anon_vma_prepare+0x62/0x3c0 [ 785.554595][T18829] ? __pte_alloc+0x1ba/0x310 [ 785.559198][T18829] __handle_mm_fault+0x34db/0x3ec0 [ 785.564328][T18829] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 785.569889][T18829] ? find_held_lock+0x35/0x130 [ 785.574666][T18829] ? handle_mm_fault+0x322/0xb30 [ 785.579632][T18829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.585895][T18829] ? kasan_check_read+0x11/0x20 [ 785.590773][T18829] handle_mm_fault+0x43f/0xb30 [ 785.595563][T18829] __get_user_pages+0x7b6/0x1a40 [ 785.600535][T18829] ? follow_page_mask+0x19a0/0x19a0 [ 785.605752][T18829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.612026][T18829] get_user_pages_remote+0x21d/0x440 [ 785.617334][T18829] copy_strings.isra.0+0x3dc/0x890 [ 785.622486][T18829] ? remove_arg_zero+0x590/0x590 [ 785.627466][T18829] ? prepare_binprm+0x6aa/0x940 [ 785.632331][T18829] ? vma_link+0x117/0x180 [ 785.636674][T18829] ? install_exec_creds+0x180/0x180 [ 785.641899][T18829] copy_strings_kernel+0xa5/0x110 [ 785.646944][T18829] __do_execve_file.isra.0+0x10ef/0x23a0 [ 785.652607][T18829] ? copy_strings_kernel+0x110/0x110 [ 785.658373][T18829] ? strncpy_from_user+0x2ac/0x380 [ 785.663500][T18829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 785.669764][T18829] __ia32_compat_sys_execveat+0xf3/0x140 [ 785.675423][T18829] do_fast_syscall_32+0x281/0xd54 [ 785.680467][T18829] entry_SYSENTER_compat+0x70/0x7f [ 785.685581][T18829] RIP: 0023:0xf7fe2849 [ 785.689662][T18829] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 785.709274][T18829] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 785.717699][T18829] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 785.725686][T18829] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 20:01:17 executing program 3 (fault-call:3 fault-nth:21): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x300000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:17 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x107a) 20:01:17 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x894c, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xa000000}, 0x14}}, 0x0) 20:01:17 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 785.733673][T18829] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 785.741660][T18829] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 785.749644][T18829] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:17 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1100) 20:01:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x400000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xe000000}, 0x14}}, 0x0) 20:01:17 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000200", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:17 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8953, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 785.924786][T18877] FAULT_INJECTION: forcing a failure. [ 785.924786][T18877] name failslab, interval 1, probability 0, space 0, times 0 20:01:17 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1200) [ 786.009995][T18877] CPU: 1 PID: 18877 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 786.017605][T18877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.027671][T18877] Call Trace: [ 786.030977][T18877] dump_stack+0x172/0x1f0 [ 786.035337][T18877] should_fail.cold+0xa/0x15 [ 786.039952][T18877] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 786.045787][T18877] ? ___might_sleep+0x163/0x280 [ 786.050662][T18877] __should_failslab+0x121/0x190 [ 786.055611][T18877] should_failslab+0x9/0x14 [ 786.060134][T18877] kmem_cache_alloc+0x2b2/0x6f0 [ 786.065009][T18877] ? __might_sleep+0x95/0x190 [ 786.069721][T18877] __anon_vma_prepare+0x1b1/0x3c0 [ 786.074762][T18877] ? __pte_alloc+0x1ba/0x310 [ 786.079398][T18877] __handle_mm_fault+0x34db/0x3ec0 [ 786.084530][T18877] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 786.090102][T18877] ? find_held_lock+0x35/0x130 [ 786.094896][T18877] ? handle_mm_fault+0x322/0xb30 [ 786.099878][T18877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.106144][T18877] ? kasan_check_read+0x11/0x20 [ 786.111038][T18877] handle_mm_fault+0x43f/0xb30 [ 786.115842][T18877] __get_user_pages+0x7b6/0x1a40 [ 786.120826][T18877] ? follow_page_mask+0x19a0/0x19a0 [ 786.126505][T18877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.132801][T18877] get_user_pages_remote+0x21d/0x440 [ 786.138131][T18877] copy_strings.isra.0+0x3dc/0x890 [ 786.143294][T18877] ? remove_arg_zero+0x590/0x590 [ 786.143312][T18877] ? prepare_binprm+0x6aa/0x940 [ 786.143336][T18877] ? vma_link+0x117/0x180 [ 786.157465][T18877] ? install_exec_creds+0x180/0x180 [ 786.157489][T18877] copy_strings_kernel+0xa5/0x110 [ 786.157519][T18877] __do_execve_file.isra.0+0x10ef/0x23a0 [ 786.173367][T18877] ? copy_strings_kernel+0x110/0x110 [ 786.173386][T18877] ? strncpy_from_user+0x2ac/0x380 [ 786.173408][T18877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.173430][T18877] __ia32_compat_sys_execveat+0xf3/0x140 [ 786.183850][T18877] do_fast_syscall_32+0x281/0xd54 [ 786.183881][T18877] entry_SYSENTER_compat+0x70/0x7f [ 786.183893][T18877] RIP: 0023:0xf7fe2849 [ 786.183910][T18877] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 786.183917][T18877] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 786.183931][T18877] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 786.183949][T18877] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 20:01:17 executing program 3 (fault-call:3 fault-nth:22): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x500000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:17 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x2f00) 20:01:17 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8955, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf000000}, 0x14}}, 0x0) 20:01:17 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000300", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 786.229591][T18877] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 786.229600][T18877] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 786.229607][T18877] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x600000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:17 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8970, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x40000000}, 0x14}}, 0x0) 20:01:17 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x4000) [ 786.374859][T18914] FAULT_INJECTION: forcing a failure. [ 786.374859][T18914] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 786.444525][T18914] CPU: 1 PID: 18914 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 786.452291][T18914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.462446][T18914] Call Trace: [ 786.465769][T18914] dump_stack+0x172/0x1f0 [ 786.470128][T18914] should_fail.cold+0xa/0x15 [ 786.474747][T18914] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 786.476352][T18923] __nla_validate_parse: 9 callbacks suppressed [ 786.476371][T18923] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 786.480580][T18914] ? ___might_sleep+0x163/0x280 [ 786.480606][T18914] should_fail_alloc_page+0x50/0x60 [ 786.480623][T18914] __alloc_pages_nodemask+0x1a1/0x8d0 [ 786.480644][T18914] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 786.480660][T18914] ? lock_downgrade+0x880/0x880 [ 786.480688][T18914] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 786.528358][T18914] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 786.534633][T18914] alloc_pages_vma+0xdd/0x540 [ 786.539342][T18914] __handle_mm_fault+0x1dd4/0x3ec0 20:01:17 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8971, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:17 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0xff00) [ 786.544487][T18914] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 786.550070][T18914] ? find_held_lock+0x35/0x130 [ 786.554853][T18914] ? handle_mm_fault+0x322/0xb30 [ 786.559829][T18914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.566184][T18914] ? kasan_check_read+0x11/0x20 [ 786.571065][T18914] handle_mm_fault+0x43f/0xb30 [ 786.575859][T18914] __get_user_pages+0x7b6/0x1a40 [ 786.580837][T18914] ? follow_page_mask+0x19a0/0x19a0 [ 786.586068][T18914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.592338][T18914] get_user_pages_remote+0x21d/0x440 [ 786.597656][T18914] copy_strings.isra.0+0x3dc/0x890 [ 786.602788][T18914] ? remove_arg_zero+0x590/0x590 [ 786.607747][T18914] ? prepare_binprm+0x6aa/0x940 [ 786.612617][T18914] ? vma_link+0x117/0x180 [ 786.616964][T18914] ? install_exec_creds+0x180/0x180 [ 786.622191][T18914] copy_strings_kernel+0xa5/0x110 [ 786.627248][T18914] __do_execve_file.isra.0+0x10ef/0x23a0 [ 786.632918][T18914] ? copy_strings_kernel+0x110/0x110 [ 786.638222][T18914] ? strncpy_from_user+0x2ac/0x380 [ 786.643365][T18914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.649632][T18914] __ia32_compat_sys_execveat+0xf3/0x140 [ 786.655291][T18914] do_fast_syscall_32+0x281/0xd54 [ 786.660802][T18914] entry_SYSENTER_compat+0x70/0x7f [ 786.660815][T18914] RIP: 0023:0xf7fe2849 [ 786.660829][T18914] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:01:17 executing program 3 (fault-call:3 fault-nth:23): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x700000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x60000000}, 0x14}}, 0x0) 20:01:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = dup(0xffffffffffffff9c) r2 = dup(0xffffffffffffff9c) sendfile(r0, r2, &(0x7f0000004ac0), 0x2) r3 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000002f40), 0x7fffd) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000002fc0)={0xfffffffffffff25a, 0x101, 0x0, 0x100}) sendmmsg$sock(r0, &(0x7f0000004fc0)=[{{&(0x7f0000000000)=@rc={0x1f, {0xfffffffffffffffb, 0x534, 0x2, 0x5, 0x80000000, 0x81}, 0x4}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)="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", 0x1000}], 0x1}}, {{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000140)="f19c5bbb5e6cefe988930d5fad64649f2b04f7b62647c48b65e6ca3a1e0807c55fb43f10f8263029ea2184f06c8be6fd40c7fc5e768d3eb8dda88b80df216ce2d8575bdda6a3ffe0af97c0b744ffb502a7eb75d1f0eae213ef28aed157e59e437d91", 0x62}, {&(0x7f0000001200)="736d95af4b7e5e9c3f7e97d3b41e25305db06cc2d111a99d11b1c8c101b03d55bff036095a6f5b51556579beb56e1995c870b374e5be865546a8adc07a2b409c004b13bf1c7bf365f72eb2edc61deb2ef2686cd2f9b1831f6614e9942ff88c605655dde554", 0x65}], 0x2, &(0x7f00000012c0)=[@mark={{0x10, 0x1, 0x24, 0x5935acf2}}, @txtime={{0x14, 0x1, 0x3d, 0x7a}}, @txtime={{0x14, 0x1, 0x3d, 0x800000000000000}}, @txtime={{0x14, 0x1, 0x3d, 0x8}}, @timestamping={{0x10, 0x1, 0x25, 0xa3a1}}, @timestamping={{0x10, 0x1, 0x25, 0x8}}, @mark={{0x10, 0x1, 0x24, 0x6}}, @timestamping={{0x10, 0x1, 0x25, 0x7fff}}], 0x8c}}, {{&(0x7f0000001380)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @loopback}, 0x0, 0x4, 0x3, 0x4}}, 0x80, &(0x7f0000001880)=[{&(0x7f0000001400)="1d96f1bda789ffd17d6ba9ffd8454f28a8af485aa472031d2d09d279dbf88843d951d8e14cd65ac3f28df015d1b818bb7e1b6993e2721f7e772da96c", 0x3c}, {&(0x7f0000001440)="589ecc23e2e392339b228ffc026f6c3666bee4fe6e2c41a2d948d4d9e80a0a20c69abe5f95cbcf93e73103dc7f6107c99a76918f9b33132ba456e97011902c85b1571d2aee55c11610e8e570fee657e2f3703beeaf9b4e3373e375fca376a558bc0c502fa7682e6914ba69901a28b97cef898c683b7ca7593c398e7668a657624ebe96db03cfe36086702a8f7e835fe37ec8ad1984dcfbcb61777457ba882d74b5bb6a9e0af824fb6a7f89ef45f49112cf77a5f4dd5a8ca2920eae740565fac1cdb95113e7446b08f89a347987fccbfee4bf7cb82c248d5eefdef14386", 0xdd}, {&(0x7f0000001540)="66ebd06f3aa1afd4f4ba88c530e6cbe210d6e7b18645b17585c8e943175c95437ea24956889cea377f32b63da192fadfc77923bd8f6ec99073631eed728fad25130f4a64de9099237a30a3b2808c0aeacf5d5b76a49480d23ad3a7d4cc6a441bb8c22562e781d257a835187bd685fec234fcd67bc72dd358eac5070aa05b96c3a4c481e58bc04c17f57594b3516367db61167cab80fdcea827c9288325e2986df1d44812", 0xa4}, {&(0x7f0000001600)="5519b665ce1368f16a216a3a8940fafe954e4c8d16bd71eccbb678793138ebf0e4609170", 0x24}, {&(0x7f0000001640)="de0a5a0af7ca57e610d1ee1c893e89cf4d", 0x11}, {&(0x7f0000001680)="3cad872b0560e339e33b2f968fe8b44a75fab23053ead49fed16fb2c92f9d3266b9a4a3e1cf991b4887fc0e7608d63f2285fff321ed326380e206d", 0x3b}, {&(0x7f00000016c0)="e4f71a0b69ca2b3792b888b89eb2d943b779b4db5de3b8a1472569827a440236fc5e6be064186e9b0dde0c1ec6b8dfd5cec358a4085093b75084021d8d78144dc420363dc27aee44c4c8c4bca68583ff99d42bb84559a151ced6df84458c625660011fb85f59606e7b79c10a7a0d92fd8289c2f012cd63255fc94f7cbe5c832d761f7611775090b6d92ba5a8e52dac33e38264e346d1adc9ac03", 0x9a}, {&(0x7f0000001780)="3feda3c13f9528df02110e7e33bc8bfc1453df3cf16629cc871e63c7d68d13775d699b17aa399e33864f258c57ada367434c3cdb72a478292f84419971b04ce186f8dda74a2578c99590d95bfe2e6c9a5b1011c1803fef76460a7e71060b42", 0x5f}, {&(0x7f0000001800)="1649ce903357242e8852b0275414feb3621189ecf865f66dbd46412d8e1d9974a6fd088d9b20c8ebb03c7c9ff17f4543e6f679179704f1775d79fe229292435c45c19e329246b7258872d9493303595a2424abd2bd8273ef740dae0c", 0x5c}], 0x9, &(0x7f0000001900)=[@mark={{0x10, 0x1, 0x24, 0x4}}, @txtime={{0x14, 0x1, 0x3d, 0x7}}, @mark={{0x10, 0x1, 0x24, 0xfffffffffffffc01}}, @txtime={{0x14, 0x1, 0x3d, 0x1}}, @timestamping={{0x10, 0x1, 0x25, 0xf680}}], 0x58}}, {{&(0x7f0000001980)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x3, 0x0, 0x1, {0xa, 0x4e23, 0x7f, @local, 0xbfa}}}, 0x80, &(0x7f0000005180)=[{&(0x7f0000001a00)="5de793d8f8a3bdd7f2e9199f13d95b89df76df39cbb19356ba9b012e77efb5dbd28600b03e10238562fa4e849ef8ff40c3b4d3f01a47e2d46673c72bde26", 0x3e}, {&(0x7f0000001a40)="dd8627c6893bb278db662a6a0fe107c354e6f8b6204198e81968f51ca5dcefb1236150999e4e3774236a5651f72a7c5c24ac8228f072033fcb73b3c0502a929a1d113e160d611361d621eb0912027ee379f2d0c038eafe32c5648b4cc080fab7d397f43f1c3eb73b88aeab822c9666aa8df27f807b55be88970dd1d845ed078dc6197668883b6422c895c4f7b2deb82eeb79fd01696472f6f113634162582009481d170b73c20f5895943de7944e3da6f89628e23921c22aa40669f72cde49c3895eb46222c0501ab6b621d6759590b86b7a905b8166ade9c04d3ffedc28d8473bf90cb0eb28a5cd0a2cb708", 0xec}, {&(0x7f0000001b40)="c000323394c07507cb34a81730a11f75a003a177b259dd0ab36985d6a912e2751100316663b8f0647e00f9caf2419df47f21bd810f6059dfcc6f688e8274528056f5709e2b0c43c761a3a7acf0c2a7765ee31d89297216ebccd55c4d0f", 0x5d}, {&(0x7f0000001bc0)="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", 0x1000}, {&(0x7f0000002bc0)="bedcff267dd14e82f674e4433a093f7f3324a3bce714ce536c651d2c", 0x1c}, {&(0x7f0000002c00)="0ffdba228af4c104125a650f29ada37613c54b593a0285171952a2b1081f88ebec4681cf6d63b7c068920614e225ca99a13288cc5cab7fd84cd9e807afb16a1adee2e9a6058eab85777afbed574e17e5f2780df0b666e3ea7ea7efe3c60dff3c7e77d7b8880599b62a3da336ca9cf6d8c5f72bebdbe609038aea04667c5f7e3e1354aca1699a976477b5f7343a166add730270884d7c2200cc655056907acf1e2eb7a7b5be703a8ea1481a8a8dcd76cbac924db06f3b9f1ab612417c64c6e5e0269eadbc78433da1d9d80b862eede30a0283fc9cf134", 0xd6}, {&(0x7f0000002d00)="a89a43306678f7fd0dbf1eb6292eb3b73fccebec3f0b437906b2474077dd370a7408a6e3b4b5606b5db158940aadcf79a735fd7c6d7c2c58783fcd8e03a8df076423c8a21cede1ec6f9a90fd2a1e94872dca2926ada6f7493b7fbfbfc24a3980d0ec03713577d5274bc0f124dc7f363533b275099eabc26281f382b66e262f4eebffdcda3f9343a3fa12c8f12ed2f4ac93cada57fe0dc68ac58908dffc620177d964a40c05b61c76fb368ae97f059efd9efe96888292f3d7c9b9416e8978721a53a8abfe4880c83bda6501dde5886117d878739ca6e9c7eb13df199ac8d1ced7fdc1fa2d0defdc4458a25b33db69c6127e4d361e8e84", 0xf6}, {&(0x7f0000002e00)="47824bd5098dd5f05060649128ad509e76af8ea403f11c84e3925b0045b4eef73cc829c70da5569193dc73c73b27b120d86c4c8cdaa0226a727c4cef4e31ae74971d9d690c375db7ec44ce7bb6b327c82d80df9dca9d639033d5fa3ffd90e4606860d4477559dfe08ffd7727e8c2b6263ba53c9010cc2ff5b42f3d7a74f6094bef7dd938aad2a39a50df67ac75bbc01ca47e767873398ab4fb29897eb5a609ef534ccb7646ec464f45d3f9e0e9fa0c0b94f66b96bdca947dee47cad79f574efe", 0xc0}, {&(0x7f0000002ec0)="69575277e6a5ad48f29c71d6c070becf1a0ef0ed154100fa152e724148cb1c67c0d0060907bc3f819be3673ec2cb681f337ffb0b7b34", 0x36}], 0x9, &(0x7f0000002f80)=[@timestamping={{0x10, 0x1, 0x25, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x3}}, @mark={{0x10, 0x1, 0x24, 0x9fb6932}}], 0x30}}, {{&(0x7f0000003000)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e23, @broadcast}, 0x4, 0x2, 0x0, 0x3}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003080)="48a7eca690b363e7d74331d075cf5b310f60da0ae610693d1b31b185b83624651eb422cec146fed4633c7336fa9da37e1f8a02fb2c98abcb7b3d826a62c9686d7b1c1ac71b40389b97e3f3dadf54baa4838787072379d897cd4de3d9cd33ffea33811e587a9dad7c9d45765fa216a37f5077e90acd1911796b81a0d832368bca53b9b5d03e9a80815f7c41acc6a30ef0ec6fb5a08c852a5cae4cf4b5fef2c943272cf6495ddbedf11b3f8d59d26d5311bc4b3ab57d9ad4e1133d8e616d2dc7cbaa658235f6d5702040904d405bb00bfb", 0xd0}, {&(0x7f0000003180)="dbdc92afad6e4b2990a460ab4bcf3a955654d5ec7823d4f797a97616c104aab412bca9cfe1771bf5f20b884caf48c309322dacaf6b4a2e9ac7d7405c5a032411b2b90e009a05", 0x46}, {&(0x7f0000003200)="2e3517de7de56a67e0d660caa2ac5a5fd557add4f3c3b713eb462a903064822824f2d96ba8e698a751be2b883f4378aa1b82a1d5ba08f6baea86b3b5e88632248854ebd741ed94be65db661d6648039700956080c9d04cbcbc0bd08376dc420643027f035498ed42e9ada90ff0926a628e59713107e3c982ff334fb0bed9f038b512928bca2419874327d609c35bc1b0751b9747b99fa02fd411d6167b99f53462c1c0a0dc329126fccddfa7dbf426886e79c1be3741224dca74c3b7ea1730a58e5a789e3197549952c3385cf661", 0xce}, {&(0x7f0000003300)="65d1691be94985436a16ed7239026ad8f2413329c57bbb1bc3650e6213ff5d30ce53b4ce7c43053da8e03a026e134f9b4784da9b40030663d0f4ca31a2325fc03897c8fb601febabadfaec41701bf60f967e72ffa468886a59219e9c5b83f694ba9fd4a30c3c", 0x66}, {&(0x7f0000003380)="da4c3229d55f641a53ea7ca7ae866e4d6d8af91a56a7f4e485fa381bf87acfcf19824f18cebcce25fa7f34eb9f0d03badf34bfea133da3e7819e8e569319da9578244c73fdcc2bf7c6ed4d21abe5c338cfe694b1b4cf8c70b61613512c3d011cbfa357a7358ee37505cac9d8f81bcc818e745cf1f8974a05411117c53d5f400e464b297bcd59bff9431478ec1160e74af523332cc4f6489d4b640ee738e11f7d1fe7a8eb16e68d2fa8f8961233a660305c322c0092d4d72b03fd7e637af855efa479", 0xc2}, {&(0x7f0000003480)="6c8af899fe1950b239daadc821cb4fae6fffa642b2d6e21be098127e62165a32d7c06b84670390b674c197261ec03808c46c2658821db4b62431393a99ba924d8e7ee069e897ad3e69f3452d257accf0ada0c175570e8e5968956fe873efc0e985dc0cc302e0a283d8502f99bb2eaa77a4137cf9ee", 0x75}, {&(0x7f0000003500)="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", 0xae}, {&(0x7f0000003600)="4b1cda2c49a0873b91eff992ab7469e475cbe76b1c39a7f2ce51f636c16e94a7b25350e13d248333a3b84928a4cb4ae3d801e7d3c36dcb21a9728013fc22df6131ea8a3dbb160d5b1fc42abb3a23986f06d1c4ef64dc9c231b6997ec3e1ee3bb850d6aabdb600952791e786ca426324a641d8e66b1f3f1eac0f03c66b5657097c799de8a78f9", 0x86}], 0x8, &(0x7f0000003700)=[@txtime={{0x14, 0x1, 0x3d, 0x101}}, @timestamping={{0x10, 0x1, 0x25, 0x100}}, @timestamping={{0x10, 0x1, 0x25, 0x1}}, @timestamping={{0x10, 0x1, 0x25, 0x4}}, @timestamping={{0x10, 0x1, 0x25, 0x7}}, @mark={{0x10, 0x1, 0x24, 0x101}}, @mark={{0x10, 0x1, 0x24, 0x100000000}}, @timestamping={{0x10, 0x1, 0x25, 0x2}}, @timestamping={{0x10, 0x1, 0x25, 0x2}}, @mark={{0x10, 0x1, 0x24, 0x7cc3}}], 0xa4}}, {{0x0, 0x0, &(0x7f0000004880)=[{&(0x7f00000037c0)="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", 0x1000}, {&(0x7f00000047c0)="c32290132749b697a41ee080dd7fd45d8dedb20342324cab34f5e47542c5c1167d0acab5f5692af6b93d739f21198a358bc16ce0ee4266ee8ddd892522a279faae26128183e136f2a4e604f72b2cb47115a0e8783a96faca1a3901cc5c064310618ca69d8160192a44efe58d1df8aa400c2fcf97797bbd833e5241d5dd0c1a3484e702b8f55ad4bb850d5f65aa72a18afb5415a43f28e172", 0x98}], 0x2, &(0x7f00000048c0)=[@timestamping={{0x10, 0x1, 0x25, 0x3}}, @mark={{0x10, 0x1, 0x24, 0xf711}}, @timestamping={{0x10, 0x1, 0x25, 0xa33f}}, @txtime={{0x14, 0x1, 0x3d, 0x101}}, @mark={{0x10, 0x1, 0x24, 0xffffffffffffff80}}, @mark={{0x10, 0x1, 0x24, 0x1000}}], 0x64}}, {{0x0, 0x0, &(0x7f0000004a80)=[{&(0x7f0000004940)="e1730cb35df1337c35e6b7031dac0d26dd43683dd6422da431b559b98ba4d25a165819a00778a1fb3d95183ba9b53e14", 0x30}, {&(0x7f0000004980)="8b7f5ddf529fa0ec3c3eb7f316c6c13cb5be8118f38ff3ca64f95a8533e5b12ff4a14709699365c2fbc92257a9bd717aa55d60d86e3b9edb36c027f41c78f899d4513713108274283fa27ee4590af77577712ac3a669960291f4b9d0eaf5319973cae0f2da56d7f80deb5f5abe9e9941e995f2a0db343c457d567698caacda004cf0417b6fa98b5a71ffb3d3835597b330e7b9e08961d2a19024d15244b3da039a93cd48f99ae555809e15e6463c41fee62ca694a5a9d032cc8f67c01868d72bdb69c2aff7223b2cbc8b5e422ace6dcc85a1fb728d", 0xd5}], 0x2, &(0x7f00000050c0)=[@txtime={{0x14, 0x1, 0x3d, 0x5}}, @txtime={{0x14}}, @mark={{0x10, 0x1, 0x24, 0x7}}, @txtime={{0x14, 0x1, 0x3d, 0x590}}, @mark={{0x10, 0x1, 0x24, 0xfffffffffffffffd}}, @timestamping={{0x10, 0x1, 0x25, 0xc48}}, @timestamping={{0x10, 0x1, 0x25, 0x6}}, @txtime={{0x14, 0x1, 0x3d, 0x4}}], 0x90}}, {{0x0, 0x0, &(0x7f0000004f80)=[{&(0x7f0000004b80)="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", 0xfb}, {&(0x7f0000004c80)="72aa74dd06b632099c930cc4ad30ff48c7025df79a169d36155e2b2e0216e126ef8e315a434236ac4868ef6c97e1725624f04ec1d6d6968a53ae5b49e44c85351a75f0ae4293e6b36630ca4f128b5773ed208c95be75d8d221ac64dd29ee2f84d888a48c046d", 0x66}, {&(0x7f0000004d00)="3d97061d577777c0948176a6a4488697ffdad7e28d4fc1016d78f99769ae253be11194081a990ceda440f0065686760b627a7b6044f37b2ff0751103ad7e97ad5f5839f338503d46cc05a8bb1abbc20ab6a7b9bbc39887639723893aea156c178ff2770d4659c1f73ced52e7f8d5d28d2165ecc0f412833c881d21b719eab760390097b89a8e3ed60d01827ec0c046b94142e788541d43c3a15d64f70a6adff987c364263c7ddccf34596b0042e3", 0xae}, {&(0x7f0000005200)="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", 0xfb}, {&(0x7f0000004ec0)="39a6e82ebd9b43784fb272c6e561d05181fe663295e670ccc38018bd33bf05869531ab3bb67a337fb0fa8e6395046a188c2bce0cc71312b9598f53dbaea2f67fc1bc0bfa56c2e51b2d4c5e02f3ccdf55472749905e185d947fcb7c621935db54f5fd4ece1d93c26f59b311da42415ae12d41608f18818dca17e69e11794a02be006b", 0x82}], 0x5}}], 0x8, 0xfffffffffffffffc) r4 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r4, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) openat$vcs(0xffffffffffffff9c, &(0x7f0000002f00)='/dev/vcs\x00', 0x0, 0x0) r5 = dup2(r1, r3) execveat(r5, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) 20:01:17 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8980, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:17 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000400", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 786.660837][T18914] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 786.660859][T18914] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 786.670021][T18914] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 786.670030][T18914] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 786.670037][T18914] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 786.670045][T18914] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 786.772553][T18945] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 786.782235][T18946] FAULT_INJECTION: forcing a failure. [ 786.782235][T18946] name failslab, interval 1, probability 0, space 0, times 0 20:01:18 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8983, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xa00000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 786.825532][T18946] CPU: 1 PID: 18946 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 786.833136][T18946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.843203][T18946] Call Trace: [ 786.846513][T18946] dump_stack+0x172/0x1f0 [ 786.850871][T18946] should_fail.cold+0xa/0x15 [ 786.855483][T18946] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 786.861310][T18946] ? ___might_sleep+0x163/0x280 [ 786.866180][T18946] __should_failslab+0x121/0x190 [ 786.871133][T18946] should_failslab+0x9/0x14 20:01:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xe00000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 786.875652][T18946] kmem_cache_alloc_trace+0x2d1/0x760 [ 786.879959][T18952] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 786.881072][T18946] tomoyo_find_next_domain+0x12c/0x1f8a [ 786.881109][T18946] ? mark_held_locks+0xf0/0xf0 [ 786.900700][T18946] ? mark_held_locks+0xf0/0xf0 [ 786.905481][T18946] ? tomoyo_dump_page+0x510/0x510 [ 786.910524][T18946] ? lock_acquire+0x16f/0x3f0 [ 786.915217][T18946] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 786.921048][T18946] tomoyo_bprm_check_security+0x12a/0x1b0 [ 786.921064][T18946] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 786.921083][T18946] security_bprm_check+0x69/0xb0 [ 786.921104][T18946] search_binary_handler+0x77/0x570 [ 786.921119][T18946] ? kasan_check_read+0x11/0x20 [ 786.921143][T18946] __do_execve_file.isra.0+0x1394/0x23a0 [ 786.932680][T18946] ? copy_strings_kernel+0x110/0x110 [ 786.932697][T18946] ? strncpy_from_user+0x2ac/0x380 [ 786.932726][T18946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 786.942847][T18946] __ia32_compat_sys_execveat+0xf3/0x140 [ 786.942880][T18946] do_fast_syscall_32+0x281/0xd54 [ 786.948867][T18954] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 786.953354][T18946] entry_SYSENTER_compat+0x70/0x7f [ 786.953367][T18946] RIP: 0023:0xf7fe2849 [ 786.953382][T18946] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:01:18 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8990, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:18 executing program 3 (fault-call:3 fault-nth:24): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:18 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xa62260d6ddc0bfff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x35, "d49fb54f87b75e44d7bb74511c5edcab5b9d4757f5b6142c381cbafc712924bf5d8a331ae1de4f2a2f72e56426ea160ad6125dd0b85d2e"}, &(0x7f0000000140)=0x3f) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r1, @in6={{0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3ed}}, 0x8, 0x6}, 0x88) r2 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x18000414}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x13c, r3, 0x8, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x200}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}, @TIPC_NLA_MEDIA={0xdc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2800000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5cc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x547}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x11}, 0x4000) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r4 = dup2(r2, r2) execveat(r4, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) write$P9_RREADLINK(r4, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, &(0x7f00000004c0)=0x5, 0x4) 20:01:18 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000500", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x830f0000}, 0x14}}, 0x0) [ 786.953390][T18946] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 786.953403][T18946] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 786.953411][T18946] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 786.953429][T18946] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 786.963826][T18946] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 786.963835][T18946] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:18 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000600", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 787.089925][T18964] FAULT_INJECTION: forcing a failure. [ 787.089925][T18964] name failslab, interval 1, probability 0, space 0, times 0 [ 787.138316][T18964] CPU: 1 PID: 18964 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 787.145910][T18964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.155980][T18964] Call Trace: [ 787.159303][T18964] dump_stack+0x172/0x1f0 [ 787.163656][T18964] should_fail.cold+0xa/0x15 [ 787.163687][T18964] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 787.174081][T18964] ? ___might_sleep+0x163/0x280 [ 787.174102][T18964] __should_failslab+0x121/0x190 [ 787.174119][T18964] should_failslab+0x9/0x14 [ 787.174136][T18964] kmem_cache_alloc_trace+0x2d1/0x760 [ 787.174164][T18964] tomoyo_find_next_domain+0x12c/0x1f8a [ 787.183943][T18964] ? mark_held_locks+0xf0/0xf0 [ 787.183960][T18964] ? mark_held_locks+0xf0/0xf0 [ 787.183984][T18964] ? tomoyo_dump_page+0x510/0x510 [ 787.193853][T18964] ? lock_acquire+0x16f/0x3f0 [ 787.193876][T18964] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 787.193896][T18964] tomoyo_bprm_check_security+0x12a/0x1b0 [ 787.193910][T18964] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 787.193935][T18964] security_bprm_check+0x69/0xb0 [ 787.204256][T18964] search_binary_handler+0x77/0x570 [ 787.214035][T18964] ? kasan_check_read+0x11/0x20 [ 787.214060][T18964] __do_execve_file.isra.0+0x1394/0x23a0 [ 787.214087][T18964] ? copy_strings_kernel+0x110/0x110 [ 787.224553][T18964] ? strncpy_from_user+0x2ac/0x380 [ 787.224576][T18964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 787.224604][T18964] __ia32_compat_sys_execveat+0xf3/0x140 [ 787.236131][T18964] do_fast_syscall_32+0x281/0xd54 [ 787.236155][T18964] entry_SYSENTER_compat+0x70/0x7f [ 787.236176][T18964] RIP: 0023:0xf7fe2849 [ 787.246319][T18964] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 787.246328][T18964] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 787.246341][T18964] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 787.246349][T18964] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 20:01:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x9effffff}, 0x14}}, 0x0) 20:01:18 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8992, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xc00e0000}, 0x14}}, 0x0) 20:01:18 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0xc4d, 0x0, 0x6, 0x6, 0x0, 0x9, 0x50002, 0x6, 0xffffffffffffff00, 0x1, 0x26, 0x10000, 0x4, 0x101, 0x7, 0x9, 0x1, 0x7ff, 0x200000, 0xdaeb, 0x4, 0x3f, 0x733b, 0xffffffffffffff91, 0x4, 0x5, 0xf69c, 0xb95, 0x400, 0x3, 0x7, 0x8, 0x1, 0x498d, 0x7, 0x1f, 0x0, 0x8, 0x4, @perf_config_ext={0x1, 0x4}, 0x12020, 0x8, 0x6, 0x3, 0x4, 0x5, 0x7f}, r1, 0x9, r1, 0x4) 20:01:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xf00000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 787.246371][T18964] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 787.256838][T18964] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 787.256846][T18964] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:18 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:18 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000700", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 787.389386][T18979] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:18 executing program 3 (fault-call:3 fault-nth:25): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf0ffffff}, 0x14}}, 0x0) 20:01:18 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8994, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x2000000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:18 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000003000)={0x0, 0x3ab, &(0x7f0000000080)={&(0x7f0000000140)={0x14, 0x9, 0x6, 0x101}, 0x14}}, 0x0) r2 = dup2(r0, r0) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 787.589787][T19001] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:18 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000800", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xfffff000}, 0x14}}, 0x0) [ 787.685467][T19011] FAULT_INJECTION: forcing a failure. [ 787.685467][T19011] name failslab, interval 1, probability 0, space 0, times 0 20:01:19 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8995, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 787.793198][T19011] CPU: 1 PID: 19011 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 787.800804][T19011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.810883][T19011] Call Trace: [ 787.814201][T19011] dump_stack+0x172/0x1f0 [ 787.818562][T19011] should_fail.cold+0xa/0x15 [ 787.823183][T19011] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 787.829035][T19011] ? __task_pid_nr_ns+0x1b1/0x530 [ 787.834099][T19011] __should_failslab+0x121/0x190 [ 787.839071][T19011] should_failslab+0x9/0x14 [ 787.843611][T19011] kmem_cache_alloc_trace+0x4b/0x760 [ 787.848921][T19011] ? kasan_check_read+0x11/0x20 [ 787.853875][T19011] proc_self_get_link+0x16f/0x1d0 [ 787.858931][T19011] ? proc_ns_dir_readdir+0x570/0x570 [ 787.864267][T19011] link_path_walk.part.0+0xee0/0x1350 [ 787.869673][T19011] ? walk_component+0x2000/0x2000 [ 787.874730][T19011] ? save_stack+0x5c/0x90 [ 787.879356][T19011] ? save_stack+0x23/0x90 [ 787.883806][T19011] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 787.889664][T19011] ? path_mountpoint+0x1e60/0x1e60 [ 787.895100][T19011] path_lookupat.isra.0+0xe3/0x8d0 [ 787.900334][T19011] ? do_fast_syscall_32+0x281/0xd54 [ 787.905570][T19011] ? path_parentat.isra.0+0x160/0x160 [ 787.911900][T19011] ? mark_held_locks+0xf0/0xf0 [ 787.917074][T19011] ? save_stack+0x5c/0x90 [ 787.917099][T19011] ? save_stack+0x23/0x90 [ 787.926243][T19011] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 787.932084][T19011] ? kasan_kmalloc+0x9/0x10 [ 787.936905][T19011] ? kmem_cache_alloc_trace+0x151/0x760 [ 787.936925][T19011] ? tomoyo_find_next_domain+0x12c/0x1f8a [ 787.936948][T19011] ? tomoyo_bprm_check_security+0x12a/0x1b0 [ 787.954998][T19011] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 787.955029][T19011] filename_lookup+0x1b0/0x410 [ 787.955048][T19011] ? nd_jump_link+0x1d0/0x1d0 [ 787.955083][T19011] ? memcpy+0x46/0x50 [ 787.974794][T19011] ? getname_kernel+0x223/0x370 [ 787.979683][T19011] kern_path+0x36/0x40 [ 787.983788][T19011] tomoyo_realpath_nofollow+0x74/0xdb 20:01:19 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000900", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x3f00000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:19 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x89a0, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 787.989193][T19011] ? tomoyo_realpath_from_path+0x730/0x730 [ 787.995041][T19011] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 788.001310][T19011] ? tomoyo_init_request_info+0x105/0x1d0 [ 788.007076][T19011] tomoyo_find_next_domain+0x28c/0x1f8a [ 788.012833][T19011] ? mark_held_locks+0xf0/0xf0 [ 788.017640][T19011] ? mark_held_locks+0xf0/0xf0 [ 788.022439][T19011] ? tomoyo_dump_page+0x510/0x510 [ 788.027519][T19011] ? lock_acquire+0x16f/0x3f0 [ 788.032240][T19011] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 788.038082][T19011] tomoyo_bprm_check_security+0x12a/0x1b0 20:01:19 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x89a1, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 788.043837][T19011] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 788.049683][T19011] security_bprm_check+0x69/0xb0 [ 788.054663][T19011] search_binary_handler+0x77/0x570 [ 788.059902][T19011] ? kasan_check_read+0x11/0x20 [ 788.064786][T19011] __do_execve_file.isra.0+0x1394/0x23a0 [ 788.070458][T19011] ? copy_strings_kernel+0x110/0x110 [ 788.075760][T19011] ? strncpy_from_user+0x2ac/0x380 [ 788.075785][T19011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.075811][T19011] __ia32_compat_sys_execveat+0xf3/0x140 [ 788.087183][T19011] do_fast_syscall_32+0x281/0xd54 [ 788.087209][T19011] entry_SYSENTER_compat+0x70/0x7f [ 788.087231][T19011] RIP: 0023:0xf7fe2849 [ 788.107110][T19011] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 788.127019][T19011] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 788.135456][T19011] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 788.143448][T19011] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 788.143457][T19011] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 788.143465][T19011] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 788.143472][T19011] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 788.155825][T19042] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:19 executing program 3 (fault-call:3 fault-nth:26): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:19 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000a00", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:19 executing program 1: r0 = memfd_create(&(0x7f0000000140)='\xa5\x9eB\x012\x1b\x13\x8a\x12s\xb2\x94\\\x11\xdd\xf1\xd2q)\x12\x97\'u\xc0thv\xe3\x12\xd8;\xda\xe0*+\xe5k\xc3u\xf1\x16\xf7,\xffy\xa0\x9a`r\x0f\xe6\x1c', 0x4) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:19 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x89a2, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xffffff7f}, 0x14}}, 0x0) 20:01:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x4000000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 788.329672][T19055] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:19 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:19 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x89a3, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xffffff9e}, 0x14}}, 0x0) [ 788.384835][T19065] FAULT_INJECTION: forcing a failure. [ 788.384835][T19065] name failslab, interval 1, probability 0, space 0, times 0 [ 788.429378][T19065] CPU: 1 PID: 19065 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 788.436975][T19065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.436982][T19065] Call Trace: [ 788.437009][T19065] dump_stack+0x172/0x1f0 [ 788.437047][T19065] should_fail.cold+0xa/0x15 [ 788.459304][T19065] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 788.465140][T19065] ? ___might_sleep+0x163/0x280 [ 788.470027][T19065] __should_failslab+0x121/0x190 [ 788.474983][T19065] should_failslab+0x9/0x14 [ 788.479512][T19065] kmem_cache_alloc+0x2b2/0x6f0 [ 788.484387][T19065] getname_kernel+0x53/0x370 [ 788.484406][T19065] kern_path+0x20/0x40 [ 788.484428][T19065] tomoyo_realpath_nofollow+0x74/0xdb [ 788.484447][T19065] ? tomoyo_realpath_from_path+0x730/0x730 [ 788.484466][T19065] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 788.484488][T19065] ? tomoyo_init_request_info+0x105/0x1d0 [ 788.516257][T19065] tomoyo_find_next_domain+0x28c/0x1f8a [ 788.521822][T19065] ? mark_held_locks+0xf0/0xf0 [ 788.521841][T19065] ? mark_held_locks+0xf0/0xf0 [ 788.521869][T19065] ? tomoyo_dump_page+0x510/0x510 [ 788.521885][T19065] ? lock_acquire+0x16f/0x3f0 [ 788.521899][T19065] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 788.521926][T19065] tomoyo_bprm_check_security+0x12a/0x1b0 [ 788.541125][T19065] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 788.558444][T19065] security_bprm_check+0x69/0xb0 [ 788.563396][T19065] search_binary_handler+0x77/0x570 [ 788.568605][T19065] ? kasan_check_read+0x11/0x20 [ 788.568630][T19065] __do_execve_file.isra.0+0x1394/0x23a0 [ 788.568660][T19065] ? copy_strings_kernel+0x110/0x110 [ 788.568675][T19065] ? strncpy_from_user+0x2ac/0x380 [ 788.568700][T19065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.595767][T19065] __ia32_compat_sys_execveat+0xf3/0x140 [ 788.595793][T19065] do_fast_syscall_32+0x281/0xd54 [ 788.595818][T19065] entry_SYSENTER_compat+0x70/0x7f [ 788.595832][T19065] RIP: 0023:0xf7fe2849 [ 788.595868][T19065] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 788.606498][T19065] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 788.606513][T19065] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 788.606522][T19065] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 788.606530][T19065] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 788.606539][T19065] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 20:01:19 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xfffffff0}, 0x14}}, 0x0) 20:01:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x4800000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:19 executing program 3 (fault-call:3 fault-nth:27): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 788.606547][T19065] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 788.703604][T19082] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 788.734597][T19085] FAULT_INJECTION: forcing a failure. [ 788.734597][T19085] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 788.747849][T19085] CPU: 1 PID: 19085 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 788.747866][T19085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.747883][T19085] Call Trace: [ 788.765504][T19085] dump_stack+0x172/0x1f0 [ 788.765525][T19085] should_fail.cold+0xa/0x15 [ 788.765542][T19085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 788.765576][T19085] should_fail_alloc_page+0x50/0x60 [ 788.773184][T19085] __alloc_pages_nodemask+0x1a1/0x8d0 [ 788.773202][T19085] ? kmem_cache_alloc_trace+0x151/0x760 [ 788.773219][T19085] ? tomoyo_find_next_domain+0x12c/0x1f8a [ 788.773240][T19085] ? tomoyo_bprm_check_security+0x12a/0x1b0 [ 788.811300][T19085] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 788.817036][T19085] ? find_held_lock+0x35/0x130 [ 788.817071][T19085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 788.827655][T19085] cache_grow_begin+0x9c/0x860 [ 788.827679][T19085] ? getname_kernel+0x53/0x370 [ 788.837205][T19085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 788.837906][T19088] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 788.843463][T19085] kmem_cache_alloc+0x62d/0x6f0 [ 788.843490][T19085] getname_kernel+0x53/0x370 [ 788.843508][T19085] kern_path+0x20/0x40 [ 788.843534][T19085] tomoyo_realpath_nofollow+0x74/0xdb [ 788.871657][T19085] ? tomoyo_realpath_from_path+0x730/0x730 [ 788.877477][T19085] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 788.883727][T19085] ? tomoyo_init_request_info+0x105/0x1d0 [ 788.883747][T19085] tomoyo_find_next_domain+0x28c/0x1f8a [ 788.883765][T19085] ? mark_held_locks+0xf0/0xf0 [ 788.883792][T19085] ? mark_held_locks+0xf0/0xf0 [ 788.904590][T19085] ? tomoyo_dump_page+0x510/0x510 [ 788.909642][T19085] ? lock_acquire+0x16f/0x3f0 [ 788.914357][T19085] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 788.920205][T19085] tomoyo_bprm_check_security+0x12a/0x1b0 [ 788.925950][T19085] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 788.932057][T19085] security_bprm_check+0x69/0xb0 [ 788.937038][T19085] search_binary_handler+0x77/0x570 [ 788.942265][T19085] ? kasan_check_read+0x11/0x20 [ 788.947148][T19085] __do_execve_file.isra.0+0x1394/0x23a0 [ 788.952824][T19085] ? copy_strings_kernel+0x110/0x110 [ 788.958145][T19085] ? strncpy_from_user+0x2ac/0x380 [ 788.963373][T19085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 788.969650][T19085] __ia32_compat_sys_execveat+0xf3/0x140 [ 788.975321][T19085] do_fast_syscall_32+0x281/0xd54 [ 788.980379][T19085] entry_SYSENTER_compat+0x70/0x7f [ 788.985505][T19085] RIP: 0023:0xf7fe2849 20:01:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x4c00000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 788.989590][T19085] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 789.009212][T19085] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 789.017636][T19085] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 789.025600][T19085] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 789.033562][T19085] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 789.041529][T19085] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 20:01:20 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000200)={{0x6004, 0x2000, 0xe, 0x200, 0x77, 0x4, 0x4, 0x80000001, 0x6, 0x9, 0x6, 0x8}, {0x1, 0x1000, 0xf, 0x2475, 0x4, 0xffffffff, 0x5, 0x6, 0x6, 0xebd6, 0x6, 0x5}, {0x1000, 0x1000, 0xf, 0x4, 0x10001, 0x376, 0x8, 0x8, 0x5, 0x0, 0xfff, 0x1}, {0xd000, 0x10000, 0xe, 0xff, 0x7, 0x9, 0xfffffffffffffffe, 0x100, 0xb7, 0x3, 0x9cd9, 0x2}, {0x6000, 0x2, 0x0, 0x3f, 0x100000001, 0x8, 0x8, 0x4, 0x6, 0x7, 0x8, 0x7}, {0x0, 0x1, 0x0, 0xc87, 0xfab4, 0x80000000, 0x0, 0x1, 0x9, 0x1ff, 0x5, 0xfffffffffffffffb}, {0x2, 0x3000, 0x8, 0x0, 0x1, 0x9, 0x7, 0x2, 0x5, 0x100000000, 0x0, 0x8001}, {0x101000, 0x2, 0x1f, 0x552, 0x75, 0x5, 0x3, 0x20, 0x2, 0x7, 0x20, 0x1}, {0x13002, 0x2}, {0xf001, 0x100000}, 0x20000006, 0x0, 0x0, 0x40000e, 0xd, 0x900, 0x13000, [0x9d85, 0x4, 0x2, 0x40]}) r2 = dup2(r0, r0) fsetxattr$security_smack_transmute(r2, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:20 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000001100", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 789.049525][T19085] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x6000000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:20 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x89b1, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x40030000000000}, 0x14}}, 0x0) 20:01:20 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000002300", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x6800000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:20 executing program 3 (fault-call:3 fault-nth:28): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:20 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x40049409, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf0ffffffffffff}, 0x14}}, 0x0) [ 789.314179][T19121] FAULT_INJECTION: forcing a failure. [ 789.314179][T19121] name failslab, interval 1, probability 0, space 0, times 0 20:01:20 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000aa00", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 789.404657][T19121] CPU: 0 PID: 19121 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 789.412260][T19121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.422328][T19121] Call Trace: [ 789.425648][T19121] dump_stack+0x172/0x1f0 [ 789.429997][T19121] should_fail.cold+0xa/0x15 [ 789.434603][T19121] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 789.440430][T19121] ? __task_pid_nr_ns+0x1b1/0x530 [ 789.445471][T19121] __should_failslab+0x121/0x190 [ 789.450424][T19121] should_failslab+0x9/0x14 [ 789.454939][T19121] kmem_cache_alloc_trace+0x4b/0x760 [ 789.460227][T19121] ? kasan_check_read+0x11/0x20 [ 789.465097][T19121] proc_self_get_link+0x16f/0x1d0 [ 789.470143][T19121] ? proc_ns_dir_readdir+0x570/0x570 [ 789.475453][T19121] link_path_walk.part.0+0xee0/0x1350 [ 789.480839][T19121] ? walk_component+0x2000/0x2000 [ 789.485870][T19121] ? save_stack+0x5c/0x90 [ 789.490207][T19121] ? save_stack+0x23/0x90 [ 789.494541][T19121] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 789.500371][T19121] ? path_mountpoint+0x1e60/0x1e60 [ 789.505495][T19121] path_lookupat.isra.0+0xe3/0x8d0 [ 789.510617][T19121] ? do_fast_syscall_32+0x281/0xd54 [ 789.515829][T19121] ? path_parentat.isra.0+0x160/0x160 [ 789.521224][T19121] ? cache_grow_end+0xa4/0x190 [ 789.526007][T19121] ? find_held_lock+0x35/0x130 [ 789.530795][T19121] ? cache_grow_end+0xa4/0x190 [ 789.535572][T19121] filename_lookup+0x1b0/0x410 [ 789.540343][T19121] ? nd_jump_link+0x1d0/0x1d0 [ 789.545063][T19121] ? memcpy+0x46/0x50 [ 789.549504][T19121] ? getname_kernel+0x223/0x370 [ 789.554375][T19121] kern_path+0x36/0x40 [ 789.558465][T19121] tomoyo_realpath_nofollow+0x74/0xdb [ 789.563846][T19121] ? tomoyo_realpath_from_path+0x730/0x730 [ 789.569671][T19121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 789.575928][T19121] ? tomoyo_init_request_info+0x105/0x1d0 [ 789.581664][T19121] tomoyo_find_next_domain+0x28c/0x1f8a [ 789.587226][T19121] ? mark_held_locks+0xf0/0xf0 [ 789.592004][T19121] ? mark_held_locks+0xf0/0xf0 [ 789.599577][T19121] ? tomoyo_dump_page+0x510/0x510 [ 789.604616][T19121] ? lock_acquire+0x16f/0x3f0 [ 789.609309][T19121] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 789.615132][T19121] tomoyo_bprm_check_security+0x12a/0x1b0 [ 789.620858][T19121] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 789.626677][T19121] security_bprm_check+0x69/0xb0 [ 789.631634][T19121] search_binary_handler+0x77/0x570 [ 789.636842][T19121] ? kasan_check_read+0x11/0x20 [ 789.641711][T19121] __do_execve_file.isra.0+0x1394/0x23a0 [ 789.647367][T19121] ? copy_strings_kernel+0x110/0x110 [ 789.652654][T19121] ? strncpy_from_user+0x2ac/0x380 [ 789.657779][T19121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 789.664039][T19121] __ia32_compat_sys_execveat+0xf3/0x140 [ 789.669696][T19121] do_fast_syscall_32+0x281/0xd54 [ 789.674735][T19121] entry_SYSENTER_compat+0x70/0x7f [ 789.679859][T19121] RIP: 0023:0xf7fe2849 [ 789.683932][T19121] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:01:20 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000080)) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) poll(&(0x7f0000000000)=[{r0, 0x100}, {r0}, {r1, 0x18}, {r0, 0x2}, {r1, 0xc}, {r1, 0x4}], 0x6, 0x6) 20:01:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x100000000000000}, 0x14}}, 0x0) 20:01:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x200000000000000}, 0x14}}, 0x0) 20:01:20 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x400000000000000}, 0x14}}, 0x0) 20:01:21 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x4020940d, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 789.703548][T19121] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 789.711976][T19121] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 789.719957][T19121] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 789.727942][T19121] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 789.735933][T19121] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 789.743911][T19121] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x6c00000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:21 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x63, 0xc0080) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0x81, 0x8, 0x3}) r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r2 = dup2(r1, r1) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:21 executing program 3 (fault-call:3 fault-nth:29): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:21 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000003", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:21 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x402c5828, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xa00000000000000}, 0x14}}, 0x0) 20:01:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x7400000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:21 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20002, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x26, 0x3, 0x0, {0x6, 0x5, 0x0, 'em0\\*'}}, 0x26) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r2 = dup2(r0, r0) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:21 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x402c582a, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:21 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000005", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x7a00000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 790.236425][T19187] FAULT_INJECTION: forcing a failure. [ 790.236425][T19187] name failslab, interval 1, probability 0, space 0, times 0 20:01:21 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) bind$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) 20:01:21 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x80108906, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 790.322651][T19187] CPU: 1 PID: 19187 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 790.330503][T19187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.340566][T19187] Call Trace: [ 790.340622][T19187] dump_stack+0x172/0x1f0 [ 790.340647][T19187] should_fail.cold+0xa/0x15 [ 790.348263][T19187] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 790.358659][T19187] ? ___might_sleep+0x163/0x280 [ 790.363536][T19187] __should_failslab+0x121/0x190 [ 790.368583][T19187] ? proc_free_inode+0x20/0x20 [ 790.373363][T19187] should_failslab+0x9/0x14 [ 790.377895][T19187] kmem_cache_alloc+0x2b2/0x6f0 [ 790.382763][T19187] ? get_pid_task+0xc9/0x190 [ 790.387380][T19187] ? find_held_lock+0x35/0x130 [ 790.392251][T19187] ? proc_free_inode+0x20/0x20 [ 790.397049][T19187] proc_alloc_inode+0x1c/0x1a0 [ 790.401831][T19187] alloc_inode+0x6a/0x1e0 [ 790.406185][T19187] new_inode_pseudo+0x19/0xf0 [ 790.410881][T19187] new_inode+0x1f/0x40 [ 790.414968][T19187] proc_pid_make_inode+0x22/0x230 [ 790.420028][T19187] proc_pident_instantiate+0x82/0x2a0 [ 790.425428][T19187] proc_pident_lookup+0x1ad/0x210 [ 790.430468][T19187] proc_tgid_base_lookup+0x2c/0x40 [ 790.435592][T19187] __lookup_slow+0x27e/0x500 [ 790.440203][T19187] ? vfs_unlink+0x560/0x560 [ 790.444720][T19187] ? __d_lookup+0x433/0x760 [ 790.449261][T19187] ? kasan_check_write+0x14/0x20 [ 790.454223][T19187] lookup_slow+0x58/0x80 [ 790.458504][T19187] walk_component+0x74b/0x2000 [ 790.463294][T19187] ? refcount_dec_not_one+0x1f0/0x1f0 [ 790.468702][T19187] ? kasan_check_read+0x11/0x20 [ 790.473590][T19187] ? path_init+0x18f0/0x18f0 [ 790.478216][T19187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.484484][T19187] ? security_inode_permission+0xd5/0x110 [ 790.490215][T19187] ? inode_permission+0xb4/0x570 [ 790.490233][T19187] link_path_walk.part.0+0x5ab/0x1350 [ 790.490255][T19187] ? walk_component+0x2000/0x2000 [ 790.490268][T19187] ? save_stack+0x5c/0x90 [ 790.490281][T19187] ? save_stack+0x23/0x90 [ 790.490302][T19187] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 790.520069][T19187] ? path_mountpoint+0x1e60/0x1e60 [ 790.525208][T19187] path_lookupat.isra.0+0xe3/0x8d0 [ 790.530340][T19187] ? do_fast_syscall_32+0x281/0xd54 [ 790.535557][T19187] ? path_parentat.isra.0+0x160/0x160 [ 790.540947][T19187] ? cache_grow_end+0xa4/0x190 [ 790.545723][T19187] ? find_held_lock+0x35/0x130 [ 790.550495][T19187] ? cache_grow_end+0xa4/0x190 [ 790.555269][T19187] filename_lookup+0x1b0/0x410 [ 790.560047][T19187] ? nd_jump_link+0x1d0/0x1d0 [ 790.560078][T19187] ? simple_attr_release+0x50/0x50 [ 790.560101][T19187] ? memcpy+0x46/0x50 20:01:21 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r1, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f0000000340)='keyring\x00'}, 0x30) fcntl$setownex(r0, 0xf, &(0x7f00000003c0)={0x0, r3}) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1002}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0xa2c, 0x70bd2c, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x84}, 0x4) r5 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r6 = dup2(r5, r5) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)=ANY=[@ANYBLOB="8c000000", @ANYRES16=r7, @ANYBLOB="040125bd7000ffdbdf2501000000080004000008000068000300080005002c1e00010800010001000000080003000200000014000600fe88000000000000000000000000000114000200626f6e645f736c6176655f31000000000800076b8c24000008000800ff000000050000000000000061703000000000000000000008000600ff030000"], 0x8c}, 0x1, 0x0, 0x0, 0x800}, 0x4) execveat(r6, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 790.560123][T19187] ? getname_kernel+0x223/0x370 [ 790.578734][T19187] kern_path+0x36/0x40 [ 790.582819][T19187] tomoyo_realpath_nofollow+0x74/0xdb [ 790.588215][T19187] ? tomoyo_realpath_from_path+0x730/0x730 [ 790.594053][T19187] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 790.600317][T19187] ? tomoyo_init_request_info+0x105/0x1d0 [ 790.606063][T19187] tomoyo_find_next_domain+0x28c/0x1f8a [ 790.611621][T19187] ? mark_held_locks+0xf0/0xf0 [ 790.616398][T19187] ? mark_held_locks+0xf0/0xf0 [ 790.621182][T19187] ? tomoyo_dump_page+0x510/0x510 [ 790.626213][T19187] ? lock_acquire+0x16f/0x3f0 [ 790.630908][T19187] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 790.636740][T19187] tomoyo_bprm_check_security+0x12a/0x1b0 [ 790.642479][T19187] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 790.648292][T19187] security_bprm_check+0x69/0xb0 [ 790.653221][T19187] search_binary_handler+0x77/0x570 [ 790.658400][T19187] ? kasan_check_read+0x11/0x20 [ 790.663243][T19187] __do_execve_file.isra.0+0x1394/0x23a0 [ 790.669443][T19187] ? copy_strings_kernel+0x110/0x110 [ 790.674716][T19187] ? strncpy_from_user+0x2ac/0x380 [ 790.679821][T19187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 790.686055][T19187] __ia32_compat_sys_execveat+0xf3/0x140 [ 790.691687][T19187] do_fast_syscall_32+0x281/0xd54 [ 790.696700][T19187] entry_SYSENTER_compat+0x70/0x7f [ 790.701818][T19187] RIP: 0023:0xf7fe2849 20:01:22 executing program 3 (fault-call:3 fault-nth:30): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:22 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x80108907, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:22 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000006", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x9effffff00000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:22 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f0000000200)) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESHEX], 0x12) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x101802) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000100)={0x1, 0x200, 0xfffffffffffffff9, 'queue1\x00', 0x100}) r2 = dup2(r0, r0) r3 = fcntl$getown(r2, 0x9) r4 = gettid() tgkill(r3, r4, 0x16) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xe00000000000000}, 0x14}}, 0x0) [ 790.706046][T19187] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 790.725634][T19187] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 790.734042][T19187] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 790.742001][T19187] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 790.749967][T19187] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 790.757928][T19187] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 790.765893][T19187] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xc315000000000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:22 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000007", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:22 executing program 1: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x5) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 790.870383][T19223] FAULT_INJECTION: forcing a failure. [ 790.870383][T19223] name failslab, interval 1, probability 0, space 0, times 0 20:01:22 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf00000000000000}, 0x14}}, 0x0) [ 790.970436][T19223] CPU: 1 PID: 19223 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 790.978038][T19223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.988104][T19223] Call Trace: [ 790.991412][T19223] dump_stack+0x172/0x1f0 [ 790.995766][T19223] should_fail.cold+0xa/0x15 [ 791.000375][T19223] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 791.006201][T19223] ? ___might_sleep+0x163/0x280 [ 791.011068][T19223] __should_failslab+0x121/0x190 [ 791.011085][T19223] should_failslab+0x9/0x14 [ 791.011102][T19223] kmem_cache_alloc+0x2b2/0x6f0 [ 791.011126][T19223] ? lock_downgrade+0x880/0x880 [ 791.030359][T19223] __d_alloc+0x2e/0x8c0 [ 791.034545][T19223] d_alloc+0x4d/0x280 [ 791.038550][T19223] d_alloc_parallel+0xf4/0x1bc0 [ 791.043422][T19223] ? is_dynamic_key+0x1c0/0x1c0 [ 791.048288][T19223] ? mark_held_locks+0xf0/0xf0 [ 791.053076][T19223] ? __d_lookup_rcu+0x6c0/0x6c0 [ 791.057941][T19223] ? find_held_lock+0x35/0x130 [ 791.062720][T19223] ? __d_lookup+0x40c/0x760 20:01:22 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0xc020660b, &(0x7f0000000040)={'bond0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 791.067248][T19223] ? lockdep_init_map+0x1be/0x6d0 [ 791.072291][T19223] ? lockdep_init_map+0x1be/0x6d0 [ 791.077330][T19223] __lookup_slow+0x1ab/0x500 [ 791.081935][T19223] ? vfs_unlink+0x560/0x560 [ 791.086447][T19223] ? __d_lookup+0x433/0x760 [ 791.090988][T19223] ? kasan_check_write+0x14/0x20 [ 791.095952][T19223] lookup_slow+0x58/0x80 [ 791.095973][T19223] walk_component+0x74b/0x2000 [ 791.095988][T19223] ? inode_permission+0xb4/0x570 [ 791.096009][T19223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.096035][T19223] ? path_init+0x18f0/0x18f0 [ 791.105038][T19223] ? walk_component+0x2000/0x2000 [ 791.105055][T19223] ? save_stack+0x5c/0x90 [ 791.105068][T19223] ? save_stack+0x23/0x90 [ 791.105082][T19223] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 791.105105][T19223] ? path_mountpoint+0x1e60/0x1e60 [ 791.145430][T19223] path_lookupat.isra.0+0x1f5/0x8d0 [ 791.150643][T19223] ? do_fast_syscall_32+0x281/0xd54 [ 791.150666][T19223] ? path_parentat.isra.0+0x160/0x160 [ 791.150689][T19223] ? cache_grow_end+0xa4/0x190 [ 791.150705][T19223] ? find_held_lock+0x35/0x130 [ 791.150721][T19223] ? cache_grow_end+0xa4/0x190 [ 791.150740][T19223] filename_lookup+0x1b0/0x410 [ 791.150762][T19223] ? nd_jump_link+0x1d0/0x1d0 [ 791.175696][T19223] ? simple_attr_release+0x50/0x50 [ 791.175723][T19223] ? memcpy+0x46/0x50 [ 791.175741][T19223] ? getname_kernel+0x223/0x370 [ 791.175763][T19223] kern_path+0x36/0x40 [ 791.203216][T19223] tomoyo_realpath_nofollow+0x74/0xdb [ 791.208607][T19223] ? tomoyo_realpath_from_path+0x730/0x730 [ 791.214452][T19223] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 791.214471][T19223] ? tomoyo_init_request_info+0x105/0x1d0 [ 791.214492][T19223] tomoyo_find_next_domain+0x28c/0x1f8a [ 791.214513][T19223] ? mark_held_locks+0xf0/0xf0 [ 791.214535][T19223] ? mark_held_locks+0xf0/0xf0 [ 791.236996][T19223] ? tomoyo_dump_page+0x510/0x510 [ 791.246775][T19223] ? lock_acquire+0x16f/0x3f0 [ 791.251469][T19223] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 791.257301][T19223] tomoyo_bprm_check_security+0x12a/0x1b0 [ 791.263055][T19223] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 791.268896][T19223] security_bprm_check+0x69/0xb0 [ 791.273901][T19223] search_binary_handler+0x77/0x570 [ 791.279123][T19223] ? kasan_check_read+0x11/0x20 [ 791.284008][T19223] __do_execve_file.isra.0+0x1394/0x23a0 [ 791.289686][T19223] ? copy_strings_kernel+0x110/0x110 [ 791.294994][T19223] ? strncpy_from_user+0x2ac/0x380 [ 791.300137][T19223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.306407][T19223] __ia32_compat_sys_execveat+0xf3/0x140 [ 791.312075][T19223] do_fast_syscall_32+0x281/0xd54 [ 791.317122][T19223] entry_SYSENTER_compat+0x70/0x7f [ 791.322240][T19223] RIP: 0023:0xf7fe2849 [ 791.326323][T19223] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 791.346104][T19223] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 791.354520][T19223] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 791.354529][T19223] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 791.354536][T19223] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 791.354544][T19223] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 791.354551][T19223] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:22 executing program 3 (fault-call:3 fault-nth:31): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x4000000000000000}, 0x14}}, 0x0) 20:01:22 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:22 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000009", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:22 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) getdents64(r1, &(0x7f0000000000)=""/40, 0x28) 20:01:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xf0ffffff00000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:22 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\xfd\xfd\xff\xff\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 791.466952][T19258] __nla_validate_parse: 6 callbacks suppressed [ 791.466963][T19258] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xfcffffff00000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:22 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000000a", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x6000000000000000}, 0x14}}, 0x0) [ 791.579993][T19271] FAULT_INJECTION: forcing a failure. [ 791.579993][T19271] name failslab, interval 1, probability 0, space 0, times 0 [ 791.612348][T19271] CPU: 1 PID: 19271 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 791.619930][T19271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.629988][T19271] Call Trace: [ 791.630024][T19271] dump_stack+0x172/0x1f0 [ 791.630049][T19271] should_fail.cold+0xa/0x15 [ 791.630082][T19271] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 791.648079][T19271] ? ___might_sleep+0x163/0x280 [ 791.652953][T19271] __should_failslab+0x121/0x190 [ 791.657899][T19271] should_failslab+0x9/0x14 [ 791.657919][T19271] kmem_cache_alloc+0x2b2/0x6f0 [ 791.657935][T19271] ? lock_downgrade+0x880/0x880 [ 791.657958][T19271] __d_alloc+0x2e/0x8c0 [ 791.667310][T19271] d_alloc+0x4d/0x280 20:01:22 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000011", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:22 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 791.667333][T19271] d_alloc_parallel+0xf4/0x1bc0 [ 791.667353][T19271] ? is_dynamic_key+0x1c0/0x1c0 [ 791.667394][T19271] ? mark_held_locks+0xf0/0xf0 [ 791.694806][T19271] ? __d_lookup_rcu+0x6c0/0x6c0 [ 791.699670][T19271] ? find_held_lock+0x35/0x130 [ 791.704447][T19271] ? __d_lookup+0x40c/0x760 [ 791.708967][T19271] ? lockdep_init_map+0x1be/0x6d0 [ 791.714028][T19271] ? lockdep_init_map+0x1be/0x6d0 [ 791.719087][T19271] __lookup_slow+0x1ab/0x500 [ 791.723687][T19271] ? vfs_unlink+0x560/0x560 [ 791.723703][T19271] ? __d_lookup+0x433/0x760 [ 791.723738][T19271] ? kasan_check_write+0x14/0x20 [ 791.732729][T19271] lookup_slow+0x58/0x80 [ 791.732747][T19271] walk_component+0x74b/0x2000 [ 791.732761][T19271] ? inode_permission+0xb4/0x570 [ 791.732781][T19271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.732802][T19271] ? path_init+0x18f0/0x18f0 [ 791.762491][T19271] ? walk_component+0x2000/0x2000 [ 791.767539][T19271] ? save_stack+0x5c/0x90 [ 791.771886][T19271] ? save_stack+0x23/0x90 [ 791.776229][T19271] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 791.782053][T19271] ? path_mountpoint+0x1e60/0x1e60 [ 791.787179][T19271] path_lookupat.isra.0+0x1f5/0x8d0 [ 791.792387][T19271] ? do_fast_syscall_32+0x281/0xd54 [ 791.797598][T19271] ? path_parentat.isra.0+0x160/0x160 [ 791.802976][T19271] ? cache_grow_end+0xa4/0x190 [ 791.802994][T19271] ? find_held_lock+0x35/0x130 [ 791.803011][T19271] ? cache_grow_end+0xa4/0x190 [ 791.803037][T19271] filename_lookup+0x1b0/0x410 [ 791.822062][T19271] ? nd_jump_link+0x1d0/0x1d0 [ 791.825725][T19285] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 791.826766][T19271] ? simple_attr_release+0x50/0x50 [ 791.826791][T19271] ? memcpy+0x46/0x50 [ 791.845152][T19271] ? getname_kernel+0x223/0x370 [ 791.850030][T19271] kern_path+0x36/0x40 [ 791.854116][T19271] tomoyo_realpath_nofollow+0x74/0xdb [ 791.859498][T19271] ? tomoyo_realpath_from_path+0x730/0x730 [ 791.865323][T19271] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 791.871610][T19271] ? tomoyo_init_request_info+0x105/0x1d0 [ 791.871631][T19271] tomoyo_find_next_domain+0x28c/0x1f8a [ 791.871650][T19271] ? mark_held_locks+0xf0/0xf0 [ 791.871665][T19271] ? mark_held_locks+0xf0/0xf0 [ 791.871682][T19271] ? tomoyo_dump_page+0x510/0x510 [ 791.871705][T19271] ? lock_acquire+0x16f/0x3f0 [ 791.902174][T19271] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 791.908012][T19271] tomoyo_bprm_check_security+0x12a/0x1b0 [ 791.913764][T19271] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 791.919590][T19271] security_bprm_check+0x69/0xb0 [ 791.924551][T19271] search_binary_handler+0x77/0x570 [ 791.929765][T19271] ? kasan_check_read+0x11/0x20 [ 791.934646][T19271] __do_execve_file.isra.0+0x1394/0x23a0 [ 791.940305][T19271] ? copy_strings_kernel+0x110/0x110 [ 791.945698][T19271] ? strncpy_from_user+0x2ac/0x380 [ 791.950832][T19271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.957108][T19271] __ia32_compat_sys_execveat+0xf3/0x140 [ 791.962766][T19271] do_fast_syscall_32+0x281/0xd54 [ 791.967812][T19271] entry_SYSENTER_compat+0x70/0x7f [ 791.972939][T19271] RIP: 0023:0xf7fe2849 [ 791.977039][T19271] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 791.996670][T19271] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 792.005078][T19271] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 792.013049][T19271] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 792.021013][T19271] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 20:01:23 executing program 3 (fault-call:3 fault-nth:32): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:23 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:23 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000023", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xffffff7f00000000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x830f000000000000}, 0x14}}, 0x0) 20:01:23 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x14) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 792.028989][T19271] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 792.036972][T19271] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 792.099350][T19297] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 792.165630][T19308] FAULT_INJECTION: forcing a failure. [ 792.165630][T19308] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 792.178887][T19308] CPU: 1 PID: 19308 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 792.178900][T19308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.178906][T19308] Call Trace: [ 792.178931][T19308] dump_stack+0x172/0x1f0 [ 792.178958][T19308] should_fail.cold+0xa/0x15 [ 792.199877][T19308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 792.199899][T19308] ? mark_held_locks+0xf0/0xf0 [ 792.199921][T19308] should_fail_alloc_page+0x50/0x60 [ 792.199937][T19308] __alloc_pages_nodemask+0x1a1/0x8d0 [ 792.199953][T19308] ? find_held_lock+0x35/0x130 [ 792.199977][T19308] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 792.219482][T19308] cache_grow_begin+0x9c/0x860 [ 792.219502][T19308] ? proc_alloc_inode+0x1c/0x1a0 [ 792.219520][T19308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 792.219541][T19308] kmem_cache_alloc+0x62d/0x6f0 [ 792.219563][T19308] ? find_held_lock+0x35/0x130 [ 792.230132][T19308] ? proc_free_inode+0x20/0x20 [ 792.230149][T19308] proc_alloc_inode+0x1c/0x1a0 [ 792.230167][T19308] alloc_inode+0x6a/0x1e0 [ 792.230186][T19308] new_inode_pseudo+0x19/0xf0 [ 792.230214][T19308] new_inode+0x1f/0x40 [ 792.275661][T19308] proc_pid_make_inode+0x22/0x230 [ 792.275681][T19308] proc_fd_instantiate+0x58/0x1f0 [ 792.275703][T19308] proc_lookupfd_common+0x126/0x1c0 [ 792.284719][T19308] ? tid_fd_update_inode+0xf0/0xf0 [ 792.303992][T19308] ? tid_fd_revalidate+0x230/0x230 20:01:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0xfffffffffffff000, &(0x7f0000000080)=[{&(0x7f00000026c0)="2e0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x9effffff00000000}, 0x14}}, 0x0) 20:01:23 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000003f", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:23 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 792.304011][T19308] ? lockdep_init_map+0x1be/0x6d0 [ 792.304036][T19308] ? lockdep_init_map+0x1be/0x6d0 [ 792.319256][T19308] proc_lookupfd+0x25/0x30 [ 792.319275][T19308] __lookup_slow+0x27e/0x500 [ 792.319292][T19308] ? vfs_unlink+0x560/0x560 [ 792.319306][T19308] ? __d_lookup+0x433/0x760 [ 792.319339][T19308] ? kasan_check_write+0x14/0x20 [ 792.347257][T19308] lookup_slow+0x58/0x80 [ 792.351528][T19308] walk_component+0x74b/0x2000 [ 792.356302][T19308] ? inode_permission+0xb4/0x570 20:01:23 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 792.361260][T19308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.367515][T19308] ? path_init+0x18f0/0x18f0 [ 792.372126][T19308] ? walk_component+0x2000/0x2000 [ 792.377094][T19317] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 792.377179][T19308] ? save_stack+0x5c/0x90 [ 792.390798][T19308] ? save_stack+0x23/0x90 [ 792.395154][T19308] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 792.400986][T19308] ? path_mountpoint+0x1e60/0x1e60 [ 792.406155][T19308] path_lookupat.isra.0+0x1f5/0x8d0 [ 792.411369][T19308] ? do_fast_syscall_32+0x281/0xd54 20:01:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="0a0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 792.416585][T19308] ? path_parentat.isra.0+0x160/0x160 [ 792.421982][T19308] ? cache_grow_end+0xa4/0x190 [ 792.421999][T19308] ? find_held_lock+0x35/0x130 [ 792.422023][T19308] ? cache_grow_end+0xa4/0x190 [ 792.422049][T19308] filename_lookup+0x1b0/0x410 [ 792.441098][T19308] ? nd_jump_link+0x1d0/0x1d0 [ 792.445804][T19308] ? simple_attr_release+0x50/0x50 [ 792.450952][T19308] ? memcpy+0x46/0x50 [ 792.454954][T19308] ? getname_kernel+0x223/0x370 [ 792.459815][T19308] kern_path+0x36/0x40 [ 792.463918][T19308] tomoyo_realpath_nofollow+0x74/0xdb [ 792.469305][T19308] ? tomoyo_realpath_from_path+0x730/0x730 [ 792.475126][T19308] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 792.475144][T19308] ? tomoyo_init_request_info+0x105/0x1d0 [ 792.475165][T19308] tomoyo_find_next_domain+0x28c/0x1f8a [ 792.475187][T19308] ? mark_held_locks+0xf0/0xf0 [ 792.475209][T19308] ? mark_held_locks+0xf0/0xf0 [ 792.502225][T19308] ? tomoyo_dump_page+0x510/0x510 [ 792.507268][T19308] ? lock_acquire+0x16f/0x3f0 [ 792.511960][T19308] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 792.517783][T19308] tomoyo_bprm_check_security+0x12a/0x1b0 [ 792.523519][T19308] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 792.529342][T19308] security_bprm_check+0x69/0xb0 [ 792.534296][T19308] search_binary_handler+0x77/0x570 [ 792.539508][T19308] ? kasan_check_read+0x11/0x20 [ 792.544381][T19308] __do_execve_file.isra.0+0x1394/0x23a0 [ 792.550046][T19308] ? copy_strings_kernel+0x110/0x110 [ 792.555348][T19308] ? strncpy_from_user+0x2ac/0x380 [ 792.555374][T19308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.555396][T19308] __ia32_compat_sys_execveat+0xf3/0x140 [ 792.555420][T19308] do_fast_syscall_32+0x281/0xd54 [ 792.555445][T19308] entry_SYSENTER_compat+0x70/0x7f [ 792.577516][T19308] RIP: 0023:0xf7fe2849 [ 792.586678][T19308] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 792.606291][T19308] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 792.606306][T19308] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 792.606315][T19308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 792.606324][T19308] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 792.606333][T19308] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 792.606342][T19308] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:24 executing program 3 (fault-call:3 fault-nth:33): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:24 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="0f0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:24 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000040", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:24 executing program 1: r0 = memfd_create(&(0x7f0000000140)='*![cp5set\x00I\x8f\x1e\xa1\xde \x9af0u$Kl\x7f\xc9\x9a\xf0\x1f\xe0\xbeK\xc1\xc6\x1b\xb8\x10|\x9d\x0e\xf6\xd1)4\xa7\x8bY\xd3/#6\xcf\xa2\xff\xce.\x7f\x15\xf1q|\x82\x1fD', 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0x52, 0x400, 0x2}) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000000)) execveat(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x3fe) 20:01:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xc00e000000000000}, 0x14}}, 0x0) 20:01:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="140000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:24 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xf0ffffff00000000}, 0x14}}, 0x0) 20:01:24 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff840000000000fe80", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 792.846589][T19350] FAULT_INJECTION: forcing a failure. [ 792.846589][T19350] name failslab, interval 1, probability 0, space 0, times 0 20:01:24 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) sched_getparam(r1, &(0x7f0000000080)) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x20000) sendmsg$inet_sctp(r2, &(0x7f0000001380)={&(0x7f0000000180)=@in6={0xa, 0x4e20, 0xfffffffffffffffa, @mcast1, 0x4}, 0x1c, &(0x7f0000001340)=[{&(0x7f0000000200)="4702afc2f6430fe48d", 0x9}, {&(0x7f0000000240)="ef5ebd071f203f6eac6bd23a9f3fdefa6317bbf40adb9b2c24513265f9a334ace68c55c4c92a1a535ac07ccc32e1609d751c9664c26ce473e906fbb6", 0x3c}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="c39a5cc24b2670e9f5878c4f49294948de06054271c4c5326cc4f182c0821eed6b740de8d9f13bb2ec50fc10e9de3101c2c6940b1566502c91d18540c3fb67f7495948175ef476c99f3f0e8525fb9a8988b9290a27cadf9fbf4a0bee9b6c252e4258aff06542dbc436e111de60424f966f5dc47942a5820e22116ca093cbf66813c590a72daefeba4b539060a25e539ec99345df2f082d5cb29e6861935b6245ce569a9711f4a0455ddfb6db3502935b57649324dd71bea8", 0xb8}], 0x4, 0x0, 0x0, 0x4}, 0x20008001) r3 = dup2(r0, r0) execveat(r3, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000100)=0x2, 0x4) [ 792.928908][T19350] CPU: 1 PID: 19350 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 792.936513][T19350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.946592][T19350] Call Trace: [ 792.949916][T19350] dump_stack+0x172/0x1f0 [ 792.954287][T19350] should_fail.cold+0xa/0x15 [ 792.958925][T19350] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 792.964765][T19350] ? ___might_sleep+0x163/0x280 [ 792.969644][T19350] __should_failslab+0x121/0x190 [ 792.974607][T19350] should_failslab+0x9/0x14 [ 792.979132][T19350] kmem_cache_alloc_trace+0x2d1/0x760 [ 792.984532][T19350] load_elf_binary+0xde/0x53f0 [ 792.990570][T19350] ? lock_downgrade+0x880/0x880 [ 792.995453][T19350] ? search_binary_handler+0x130/0x570 [ 793.000940][T19350] ? find_held_lock+0x35/0x130 [ 793.005730][T19350] ? search_binary_handler+0x130/0x570 [ 793.011216][T19350] ? notesize.isra.0+0x80/0x80 [ 793.016176][T19350] ? lock_downgrade+0x880/0x880 [ 793.021057][T19350] ? kasan_check_write+0x14/0x20 [ 793.026087][T19350] search_binary_handler+0x17f/0x570 [ 793.031405][T19350] __do_execve_file.isra.0+0x1394/0x23a0 [ 793.037082][T19350] ? copy_strings_kernel+0x110/0x110 [ 793.042391][T19350] ? strncpy_from_user+0x2ac/0x380 [ 793.047524][T19350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.053787][T19350] __ia32_compat_sys_execveat+0xf3/0x140 [ 793.059456][T19350] do_fast_syscall_32+0x281/0xd54 [ 793.064516][T19350] entry_SYSENTER_compat+0x70/0x7f [ 793.069641][T19350] RIP: 0023:0xf7fe2849 [ 793.073725][T19350] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 793.093542][T19350] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 793.101979][T19350] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 793.109990][T19350] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 793.117998][T19350] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 20:01:24 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:24 executing program 3 (fault-call:3 fault-nth:34): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:24 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff84000000000080fe", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xffffff7f00000000}, 0x14}}, 0x0) 20:01:24 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="250000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 793.118008][T19350] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 793.118022][T19350] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 793.217560][T19376] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.4'. 20:01:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0xfffffffffffff000}, 0x14}}, 0x0) 20:01:24 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000040", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:24 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 793.282666][T19387] FAULT_INJECTION: forcing a failure. [ 793.282666][T19387] name failslab, interval 1, probability 0, space 0, times 0 20:01:24 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x04', 0x0) epoll_create1(0x80000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x6, 0x8, 0x8, 0x8, 0x2}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e23, 0x1c6d, @dev={0xfe, 0x80, [], 0xb}, 0xcb6b}}, 0xfffffffffffffffb, 0x8, 0x3, 0x7fffffff, 0x9}, &(0x7f0000000200)=0x98) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r2 = dup2(r0, r0) execveat(r2, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) [ 793.383474][T19387] CPU: 0 PID: 19387 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 793.391078][T19387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.401240][T19387] Call Trace: [ 793.404556][T19387] dump_stack+0x172/0x1f0 [ 793.408919][T19387] should_fail.cold+0xa/0x15 [ 793.413549][T19387] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 793.419474][T19387] ? ___might_sleep+0x163/0x280 [ 793.424347][T19387] __should_failslab+0x121/0x190 [ 793.429305][T19387] should_failslab+0x9/0x14 [ 793.433827][T19387] kmem_cache_alloc_trace+0x2d1/0x760 [ 793.439226][T19387] load_elf_binary+0xde/0x53f0 [ 793.444003][T19387] ? lock_downgrade+0x880/0x880 [ 793.448877][T19387] ? search_binary_handler+0x130/0x570 [ 793.448897][T19387] ? find_held_lock+0x35/0x130 [ 793.448916][T19387] ? search_binary_handler+0x130/0x570 [ 793.448943][T19387] ? notesize.isra.0+0x80/0x80 [ 793.464619][T19387] ? lock_downgrade+0x880/0x880 [ 793.464646][T19387] ? kasan_check_write+0x14/0x20 [ 793.464669][T19387] search_binary_handler+0x17f/0x570 [ 793.464693][T19387] __do_execve_file.isra.0+0x1394/0x23a0 [ 793.490137][T19387] ? copy_strings_kernel+0x110/0x110 [ 793.495445][T19387] ? strncpy_from_user+0x2ac/0x380 [ 793.500585][T19387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.506886][T19387] __ia32_compat_sys_execveat+0xf3/0x140 [ 793.512552][T19387] do_fast_syscall_32+0x281/0xd54 [ 793.517604][T19387] entry_SYSENTER_compat+0x70/0x7f [ 793.522727][T19387] RIP: 0023:0xf7fe2849 20:01:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x0, 0x2}, 0x14}}, 0x0) 20:01:24 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x00\x00\x00\xff\xff\xfd\xfd', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) [ 793.526815][T19387] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 793.546609][T19387] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 793.555572][T19387] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 793.563561][T19387] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 793.571547][T19387] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 20:01:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="300000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) [ 793.581706][T19387] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 793.589697][T19387] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:01:25 executing program 3 (fault-call:3 fault-nth:35): r0 = memfd_create(&(0x7f00000000c0)='\x00'/10, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='##d'], 0x3) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x0, 0x4}, 0x14}}, 0x0) 20:01:25 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) r1 = dup2(r0, r0) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) 20:01:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) 20:01:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="5f0000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:25 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\xff\xff\xfd\xfd\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x0, 0xa}, 0x14}}, 0x0) 20:01:25 executing program 0: r0 = socket$inet6(0xa, 0x80803, 0x5f) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\xfd\xfd\xff\xff\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="3b00000002"]}) 20:01:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000026c0)="680000001e000504e6d19df31a9a76cb5f0b01bced0080648c6394f20531d200100003404b480000010000800000", 0x2e}], 0x1}, 0x0) 20:01:25 executing program 5: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000003", 0x30}], 0x1}, 0x0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) [ 793.860862][T19432] FAULT_INJECTION: forcing a failure. [ 793.860862][T19432] name failslab, interval 1, probability 0, space 0, times 0 20:01:25 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x1df) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000008b5987ae5fc1004be60cd41d535d2de87ed8c06c32bb9e3dd103904845cc726bac52169728c9cb336d67818e6a81631de01f8e4430463f47feac5889d101176985925aa6198b789881e87be0dca990c7d4ea36d23fb9daa8eaaf0e0a3ebede3803ca92f561dfec774f6acc391d9952ec8f51fc"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='vfat\x00', 0x40, &(0x7f0000000140)='\x00') r1 = dup2(r0, r0) r2 = request_key(&(0x7f00000002c0)='cifs.spnego\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)='\x00', 0xfffffffffffffffb) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000480)={r3, 0x1000, "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"}, &(0x7f00000014c0)=0x1008) ioctl$NBD_DISCONNECT(r1, 0xab08) set_tid_address(&(0x7f0000001500)) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="55619aa21c9a9d83e48beb404715d4c165ba75a8759a66f01407c99fb13f6d17499653099ee29f8bc979e8f66484d6da957010274c7b8ec0ddbbdffa4c3e36c2243933f5aea79ebb88752da15e3c84f39691fd3f2bd29143ff79ba4ddc807cc1d7dafdb99a1b9d87a2b1", 0x6a, r2) execveat(r1, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0086418, &(0x7f0000001540)={0x1, 0x20, 0x80000001, 0x0, 0x18, 0x97}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) [ 793.978809][T19432] CPU: 0 PID: 19432 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 793.986417][T19432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.996492][T19432] Call Trace: [ 793.999800][T19432] dump_stack+0x172/0x1f0 [ 794.004148][T19432] should_fail.cold+0xa/0x15 [ 794.008762][T19432] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 794.014585][T19432] ? ___might_sleep+0x163/0x280 [ 794.019463][T19432] __should_failslab+0x121/0x190 [ 794.024421][T19432] should_failslab+0x9/0x14 20:01:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x7ffffff9, 0x0, 0xe}, 0x14}}, 0x0) [ 794.028941][T19432] __kmalloc+0x2dc/0x740 [ 794.033198][T19432] ? tomoyo_unix_entry.cold+0x22/0x22 [ 794.038584][T19432] ? tomoyo_encode2.part.0+0xf5/0x400 [ 794.043984][T19432] tomoyo_encode2.part.0+0xf5/0x400 [ 794.049213][T19432] tomoyo_encode+0x2b/0x50 [ 794.053639][T19432] tomoyo_realpath_from_path+0x1c6/0x730 [ 794.059289][T19432] tomoyo_realpath_nofollow+0xc8/0xdb [ 794.064675][T19432] ? tomoyo_realpath_from_path+0x730/0x730 [ 794.070496][T19432] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 794.070512][T19432] ? tomoyo_init_request_info+0x105/0x1d0 [ 794.070530][T19432] tomoyo_find_next_domain+0x28c/0x1f8a [ 794.070550][T19432] ? mark_held_locks+0xf0/0xf0 [ 794.070567][T19432] ? mark_held_locks+0xf0/0xf0 [ 794.070592][T19432] ? tomoyo_dump_page+0x510/0x510 [ 794.082562][T19432] ? lock_acquire+0x16f/0x3f0 [ 794.107284][T19432] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 794.113109][T19432] tomoyo_bprm_check_security+0x12a/0x1b0 [ 794.118843][T19432] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 794.124666][T19432] security_bprm_check+0x69/0xb0 [ 794.129633][T19432] search_binary_handler+0x77/0x570 [ 794.134853][T19432] ? kasan_check_read+0x11/0x20 [ 794.139718][T19432] __do_execve_file.isra.0+0x1394/0x23a0 [ 794.145382][T19432] ? copy_strings_kernel+0x110/0x110 [ 794.150680][T19432] ? strncpy_from_user+0x2ac/0x380 [ 794.155816][T19432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 794.162068][T19432] __ia32_compat_sys_execveat+0xf3/0x140 [ 794.167723][T19432] do_fast_syscall_32+0x281/0xd54 [ 794.172773][T19432] entry_SYSENTER_compat+0x70/0x7f [ 794.177891][T19432] RIP: 0023:0xf7fe2849 [ 794.181969][T19432] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 794.201591][T19432] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 794.209997][T19432] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 794.217954][T19432] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 794.225909][T19432] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 794.233863][T19432] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 794.241819][T19432] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 794.267174][T19432] ERROR: Out of memory at tomoyo_realpath_from_path. [ 794.275105][T19432] Kernel panic - not syncing: MAC Initialization failed. [ 794.282154][T19432] CPU: 0 PID: 19432 Comm: syz-executor.3 Not tainted 5.1.0+ #6 [ 794.289700][T19432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.299767][T19432] Call Trace: [ 794.303070][T19432] dump_stack+0x172/0x1f0 [ 794.307421][T19432] panic+0x2cb/0x65c [ 794.311327][T19432] ? __warn_printk+0xf3/0xf3 [ 794.315937][T19432] ? kfree+0x173/0x230 [ 794.320022][T19432] ? tomoyo_realpath_from_path+0x1d1/0x730 [ 794.325842][T19432] ? kfree+0x173/0x230 [ 794.329929][T19432] ? tomoyo_warn_oom.cold+0x24/0x43 [ 794.335132][T19432] tomoyo_warn_oom.cold+0x35/0x43 [ 794.340154][T19432] tomoyo_realpath_from_path+0x3a8/0x730 [ 794.345786][T19432] tomoyo_realpath_nofollow+0xc8/0xdb [ 794.351148][T19432] ? tomoyo_realpath_from_path+0x730/0x730 [ 794.356939][T19432] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 794.363198][T19432] ? tomoyo_init_request_info+0x105/0x1d0 [ 794.368919][T19432] tomoyo_find_next_domain+0x28c/0x1f8a [ 794.374466][T19432] ? mark_held_locks+0xf0/0xf0 [ 794.379227][T19432] ? mark_held_locks+0xf0/0xf0 [ 794.384006][T19432] ? tomoyo_dump_page+0x510/0x510 [ 794.389038][T19432] ? lock_acquire+0x16f/0x3f0 [ 794.393717][T19432] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 794.399535][T19432] tomoyo_bprm_check_security+0x12a/0x1b0 [ 794.405248][T19432] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 794.411054][T19432] security_bprm_check+0x69/0xb0 [ 794.415999][T19432] search_binary_handler+0x77/0x570 [ 794.421202][T19432] ? kasan_check_read+0x11/0x20 [ 794.426056][T19432] __do_execve_file.isra.0+0x1394/0x23a0 [ 794.431685][T19432] ? copy_strings_kernel+0x110/0x110 [ 794.436960][T19432] ? strncpy_from_user+0x2ac/0x380 [ 794.442083][T19432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 794.448324][T19432] __ia32_compat_sys_execveat+0xf3/0x140 [ 794.453944][T19432] do_fast_syscall_32+0x281/0xd54 [ 794.459065][T19432] entry_SYSENTER_compat+0x70/0x7f [ 794.464188][T19432] RIP: 0023:0xf7fe2849 [ 794.468250][T19432] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 794.487885][T19432] RSP: 002b:00000000f5dde0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000166 [ 794.496309][T19432] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000040 [ 794.504279][T19432] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 794.512245][T19432] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 794.520210][T19432] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 794.528173][T19432] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 794.537320][T19432] Kernel Offset: disabled [ 794.541667][T19432] Rebooting in 86400 seconds..